It's not much, but will continue to support your page. Your teaching is a breath of fresh air in a very stale curriculum.
@PandaTheGFX3 жыл бұрын
I don't know if I'm just used to your rhythm of teaching, but this guy's teaching makes me want to open reddit and doomscroll while kinda listening
@Venom-ne4ox3 жыл бұрын
2x speed or more solves your problem
@dashamm982 жыл бұрын
I love r/collapse also
@Evoleo3 жыл бұрын
At this point these are never 100s, but it's still high-quality videos with no BS, so I'm not complaining
@dom84293 жыл бұрын
i mean there is a break after 100s so you get the best of both worlds: if you prefer 100s videos you can close the video there, or keep watching if you want. and fireship gets to upload 10min+ videos which helps with the youtube algorithm, which is a bonus for the channel.
@Evoleo3 жыл бұрын
@@dom8429 nah, even the short ones are 2min +
@DanishShakeel3 жыл бұрын
Next video: Writing good code, or OTP vulnerabilities.
@nameless_95043 жыл бұрын
It's simple A brute force attack or found of apikeys to there sms provider nothing much
@DanishShakeel3 жыл бұрын
@@nameless_9504 Bruteforcing a 6 digit OTP, I doubt it is a good idea. Talking about master OTPs, intercepting requests, are better alternatives.
@DanishShakeel3 жыл бұрын
@@nameless_9504 I mean, I have been doing it for a while. I like Fireship so much that I want a video on this. A few days back, I was testing a website - you could literally change the phone number on which they sent you the OTP and login with a different phone.
@nameless_95043 жыл бұрын
@@DanishShakeel is it even possible? Never heard about it! Give me a example that may help me understand
@DanishShakeel3 жыл бұрын
@@nameless_9504 The website used an API, and they POSTed the number to it in plaintext. I changed the request, and the OTP arrived on the updated number, whereas the webapp logged me in with the actual phone number.
@MM-vr8rj3 жыл бұрын
Holy shit you are literally covering every single corner of IT and all those subjects I learned at school as well.
@bhbblblblllb3 жыл бұрын
'And why do we need CORS?' Should be 'What is CORS?'
@saswotlamichhane58623 жыл бұрын
*My website recently got hacked, but it was so badly coded the hackers ended up giving me the fix to those vulnerabilities, Bad code can help sometimes.*
@dylankendrick273 жыл бұрын
You make my favorite videos - the perfect TL;DR + details
@sheepy01253 жыл бұрын
this doesn't seem like 100 seconds, but i'm watching all of it anyways
@idemchenko-js3 жыл бұрын
@fireship used to publish literally 100 sec videous without going deep into the topic. These days, the first part is 100 sec bird-eye view on the topic and then comes the rest. That's why it is 100 sec of sth.
@erniea58433 жыл бұрын
This channel consistently provides awesome and educational content balanced with good entertainment. Keep up the great work
@shootnado3 жыл бұрын
Omg after 2 years of confusion somebody finally explains sop properly
@poglord._3 жыл бұрын
This is one of the best videos on ethical hacking
@edisonarango2 жыл бұрын
Well, CORS might seem to protect websites from requests of evil origins, but it's super weak, it can be bypassed easily by making requests outside of browsers or just by creating a Proxy, besides, the requests always hit the server, so in the end it's not really that helpful, and instead, it always annoys developers on every single project.
@Norsilca11 ай бұрын
What kind of proxy are you talking about? A proxy running on the user's machine next to the browser? That's a lot harder to do than getting some javascript running in someone's browser.
@edisonarango11 ай бұрын
@@Norsilca No, a server proxy, you can easlily get the response from server to server and then return it with the CORS headers.
@Norsilca11 ай бұрын
@@edisonarango Wouldn't your proxy have to be running at the same origin as the first party website?
@wadexyz11 ай бұрын
@@Norsilcai don't think that guy has a clue what he's talking about based on his response. either that, or he's a genius and we're both baffled.
@jugertmucoimaj90172 жыл бұрын
This 11 min video taught me what stckoverflow and other complicated explaining never taught me!!!
@realgoogleuser3 жыл бұрын
100 Seconds of XML is much needed
@Zolodar8 ай бұрын
Are you a time traveling developer from 1995?
@Diamonddrake3 жыл бұрын
Cors only applies to JSON and is enforced by the Client. It hardly prevents cross site scripting. The requests go through fine, you just can’t read the results.
@niton64742 жыл бұрын
I dont understand what CORS is even usefull for. He only explained what it blocks and not WHY. I dont see the benefit - i am searching for this and the title suggests that he explains it
@udaykumarmettu Жыл бұрын
Lol please i am dying to know
@DK-ox7ze3 жыл бұрын
Great content like always. Can you do a video on designing backend apis with a focus on creating the right endpoints (from a front-end engineer's perspective)?
@fpspsyduck3 жыл бұрын
Love this channel!!
@DevOpsBoss2 жыл бұрын
Being featured in Jeff's video is the ultimate accolade a content creator can earn - so jealous of Bartosz 😍
@wiri23912 жыл бұрын
I agree with the others, your voice, pacing and structure are just ..“easily enjoyable“, which is highlighted in contrast to the other guy.
@PabloGnesutta2 жыл бұрын
And why is it that static files are allowed (including executables scripts) but calling the API is not?
@killerdroid992 жыл бұрын
because of allowed origins in the server side cors settings, only the whitelisted hosts are allowed to fetch or mutate data that is why you have to declare those hosts in the environment variables
@IshanKBG3 жыл бұрын
We needed this You are my inspiration I have decided to open my own programming youtube channel like you but in my own regional language
@okie90253 жыл бұрын
Do JWT authentication next if you haven't already (access tokens, refresh tokens, etc.)
@weshuiz13253 жыл бұрын
Learn to google before you ask
@okie90253 жыл бұрын
@@weshuiz1325 I could learn anything using Google, you're missing the point entirely lol
@weshuiz13253 жыл бұрын
@@okie9025 hey already did jwt if you looked for it
@crycetruly3 жыл бұрын
@@weshuiz1325 😂😂😂😂😂😂😂😂😂😂😂😂😂😂
@yark6183 жыл бұрын
Your videos are pure gold. Thank you.
@anouar-fadili3 жыл бұрын
Thanks, I have no luck... This video was uploaded after my interview... So yeah 🙃
@soniablanche56722 жыл бұрын
You can also load an external image to but you won't be able to modify it
@doontz1113 жыл бұрын
Your voice is like a soft caramel.. I love listening to you
@DEVDerr3 жыл бұрын
You can simply pronounce "Bartosz" as "Bartosh" 😁 Good video as always!
@DevAcademyCom3 жыл бұрын
😂
@AhmadBarghouthi3 жыл бұрын
You suouldnt be thanking for watching dude We who have to thank you for amazing materials
@husler74243 жыл бұрын
Really mind boggling explanation, thank you very much, i would like to see more videos like this.
@sefterm-zade97443 жыл бұрын
I wish I had teacher like you. thanks man😍😍😍
@sarcasticdna3 жыл бұрын
Notification Squad, attendance here, with a 👍.
@nickvelos95713 жыл бұрын
Please make 100 second & beyond videos for social media APIs like Instagram Twitter KZbin Facebook tiktok etc
@akashdeepnandi3 жыл бұрын
Off topic, was wondering if you can provide some insight to this question or anyone for that matter. I'm a javascript developer, love doing frontend development with react progressing towards fullstack but I'm a bit confused about what after fullstack? What are some viable career paths to choose, I'm open to branching out to other fields in relevance, I am learner and love to see my limits(Also interested in security but found my niche in web development due to low entry barrier) Feedbacks are much appreciated.
@Michael-Martell2 жыл бұрын
Honestly If my web security doesn’t have a Slavic accent idk if I could fully trust him/her. This guy really knows his target market.
@gerolmed3 жыл бұрын
I still dont quite get what this prevents. If i make a page i wont add in any requests to servers I dont want them to go. An attacker couldn't modify my page or inject any api calls. So why would I want a cors policy to be not widely open in that case
@niton64742 жыл бұрын
I would rename "And why do we need CORS?" to "What does CORS do?" because the reason of the blocking (what i urge to understand) is not explained at all. The title is a little missleading
@13hdni373 жыл бұрын
This channel was made in heaven
@JR-um3kt3 жыл бұрын
First Edit: Second Gold Is there any reward after 10? Love your videos!
@sadhlife3 жыл бұрын
yup
@sadhlife3 жыл бұрын
congratulations you won... idk what
@Fireship3 жыл бұрын
Gold! 🥇
@kristiandaugaard74953 жыл бұрын
Nice video. Would have been nice if the video included an example where the external api was whitelising origin a
@Minecodes3 жыл бұрын
I am learning this already and i found one problem on reddit, i found it when i was trying to use a normal user as a bot. I already reported it.
@shaynepreston60553 жыл бұрын
Can you explain a little why stylesheets and scripts were fine to grab from the external server but the api call was blocked? I understand the premise of CORS but is there a reason that css and scripts were ignored? Is there other things that CORS ignores as well?
@cloudfox19083 жыл бұрын
Edit: This is WRONG: The basic premise is that you can receive/download assets from the external origin, but you cannot send anything to it.
@shaynepreston60553 жыл бұрын
@@cloudfox1908 got it. What about something like an HTTP GET request? While I’m not sending anything to my server is that still a part of the CORS model?
@cloudfox19083 жыл бұрын
@@shaynepreston6055 ah I led you wrong before. When you download/GET a page, you are still making a request to a server for those resources. The reason it may be allowed is because "For security reasons, browsers restrict cross-origin HTTP requests initiated from within scripts." I'm assuming it's ok since it wasn't within a script, but this stuff is quite confusing for me too. Reference: stackoverflow.com/a/42605316/14056792
@shaynepreston60553 жыл бұрын
@@cloudfox1908 ah that makes more sense. Thanks!
@letsbuildseries3 жыл бұрын
When you're ready to lean how to do Smart Contracts? I've been writing a Truffle tutorial on how to use react and MetaMask.
@rimzzlabs3 жыл бұрын
Interesting topic, even tho im still learning ES6 JS
What is the difference between first GET to 8081 to fetch css and js during page rendering and later GET to 8081 triggered by button?
@niton64742 жыл бұрын
The mime type. script/js, style/css, application/json. Json is forbidden - but it doesn't matter since he only explained what is blocked. not WHY as the title suggests
@manishgarhwal71193 жыл бұрын
You wouldn't believe it, But this tool is what I was trying to figure out yesterday and today, so that I can check CCAvenue Payment Gateway Integration vulnerability in my app. 🙏🙏🙏
@samlama62233 жыл бұрын
Wondering cross policy is only for frontend. If anyone try to fetch using backend language, then it ignores cross policy.
@efari3 жыл бұрын
But then why do the external stylesheets and scripts and images get loaded? They are also cross-origin but yet they are not blocked by the browser???
@johnlee47783 жыл бұрын
@7:40 he doesn't explain how making this request and getting the static files is possible through the external origin. Is it because the Express 'get()' acts as a middleware? Or is it because somehow 'public' folder is recognized as the same origin(url) due to its folder structure/location..?
@tjgdddfcn2 жыл бұрын
Express.js (and all other backend libraries) disables CORS by default on static files
@ashuzon3 жыл бұрын
This video is? I mean if you know fetch, js, some online wordlists and how to press F12, you don't need to step out of your browser to do all penetration tests. F12 in browser is OP. Every aspect can be checked via developer tools, the networking, request/response, data manipulation, js manipulation and many more.
@cubeofcheese55743 жыл бұрын
So you can retrieve static files from and external server but not call its api
@benhalicki97493 жыл бұрын
Good video, thanks for sharing. Can you please explain how a hacker could take advantage of a website not implementing CORS correctly? From what I understand this does nothing to protect the API as CORS is enforced by the browser. Thanks
@tjgdddfcn2 жыл бұрын
CORS is there to protect the Client, not the Server
@moon911x2 жыл бұрын
Me after 3 years of hacking journey when first see the title (Ethical Hacking in 100 Seconds) :)
@md.tahmeedhossain94093 жыл бұрын
can you please provide a roadmap or guide on how to get started with ethical hacking. thanks a lot.
@kevinbasence11473 жыл бұрын
As always, quality and informative videos!
@ravichandra33833 жыл бұрын
Next video: Chrome Extension and Outlook Add-ins
@dieperfektemakaroni15282 жыл бұрын
1:25 It's really hard to hack and takes a lot of years ... you just click "start attack"
@JimmyS23 жыл бұрын
Compared to Burp commercial ( free) version, i find ZAP more appealing in features and usability
@kendedetar3 жыл бұрын
Great video! What icon set do you use? These colorful icons are beautiful 🤩
@arjuns22193 жыл бұрын
Pls do something on DevOs, MLOps
@samuelbartik52653 жыл бұрын
Next video: oAuth 2.0 in 100 Seconds and beyond
@HP_Tubcraft3 жыл бұрын
dude your channel is priceless.
@m.b7863 жыл бұрын
4:56 oups: the browser will comunicate with Origin B but when i receive the response if the header allow-origine is not there i will kick out the response
@kusumojha5ojha8493 жыл бұрын
Can you please make a video on webgl?
@Fireship3 жыл бұрын
That's on the list
@sylvereleipertz9553 жыл бұрын
I might be wrong but i though that it was the preflight request that failed in case of CORS policy and not the actual Request/Response.
@xxbomelxx8743 жыл бұрын
Can't I just run a proxy and add the 'Access-Control-Allow-Origin' manually and bypass the browser's security?
@rhettmelton3 жыл бұрын
Someone please respond to this. I have the same concern
@amgmg25212 жыл бұрын
Ethical hacking is like you are developing nuclear power just to use it for peaceful purposes. 😄
@br93773 жыл бұрын
Gonna put this on 2x speed and learn it in 50 seconds 😎
@ExplosiveKaboom3 жыл бұрын
put me in the woosh
@alvaro.makes.music13 жыл бұрын
Anyone knows where can I find the gif at 1:25? I'd love to use it in my lectures
@thedelanyo2 жыл бұрын
The line between the role of the hat (hat_role) is just intention. On the other hand, those that are using the the tools are they the hackers?
@krtirtho3 жыл бұрын
How do you always know what I need😃?! I was wandering around entire internet for way of preventing some security issues in one of my project. CORS is of course one of 'em. Thanks Fireship❤ & of course huge thanks to Bartosz🙏 for explaining the whole process so easily...
@DevAcademyCom3 жыл бұрын
I am really happy you like it! 😍
@SwapnilSoni3 жыл бұрын
Yeah I'm a Full DevOps Stack Hacker
@oussamamaatallah03 жыл бұрын
make a video about best practices of a REST api design or the purpose of header and body and so on...
@Noah-vm8id3 жыл бұрын
Lol, I had this error yesterday but fixed it by doing another approach
@kanakbagga38243 жыл бұрын
Please do a video on DGraph :)
@khadimhusen3 жыл бұрын
Good video, but title is misleading.
@SolomonTheStoryTeller3 жыл бұрын
please a video on the new Angular State management StateAdapt!!!
@winterboltgames3 жыл бұрын
Nice video! Can you give ReScript a try and let us know your opinion about it?
@AliBerro-c1s11 ай бұрын
“Given us permission” as they say
@dennisbarzanoff90253 жыл бұрын
Dear Mr. Jeff Fireship, If you opt for quality in your videos, then ensure more quality control in the collabs because they are sometimes boring and do not match the rest of the video.
@sufler71803 жыл бұрын
Ayyyy, hi Poland!
@DevAcademyCom3 жыл бұрын
👋😻
@HijabiCoder3 жыл бұрын
Loool right in the middle of security class too 😂 so strange
@MIXT4PEmessiah3 жыл бұрын
Bro I'm also Bartosz and I got the same shirt 😅 Good vid
@DevAcademyCom3 жыл бұрын
😂😂😂
@original_anu3 жыл бұрын
I'm here for my daily tech knowledge bytes :D
@paddyspencer67623 жыл бұрын
Am I stupid or have u done an auth vid. Of not pls do. And like not with fire base. Thx. EDIT - thx for all the great vid. Keep em up, I love this channel.
@ahmedabdelwadod58233 жыл бұрын
Go in 100 seconds please!
@SudhanshuIGI3 жыл бұрын
Please do a reverse engineering on Apple’s new iPad Pro webpage. Their web designs are on completely next level.
@GosuHub3 жыл бұрын
Do php and manipulation of databases
@lepepito2 жыл бұрын
Nice video dude
@josemanuel52053 жыл бұрын
video idea: 100 seconds of laravel
@aanchaltiwari92053 жыл бұрын
Apologies for asking something irrelevant,.. what is the bg music?
@thewafflemancer3 жыл бұрын
I'd like to suggest .ENV in 100 seconds.
@omanavarghess68473 жыл бұрын
I was so fast there are no dislikes!
@hart12542 жыл бұрын
What i never understood is: so how APIs work. Lets say my react app that works on port 3000 needs some resource from an external api, how does this work
@tjgdddfcn2 жыл бұрын
APIs configure their response headers to allow for other sites to access them
@hart12542 жыл бұрын
@@tjgdddfcn thank you, so that's the way to go, i thought that was just a hack or some unsecure option
@Akshay-Raut3 жыл бұрын
"Guys, we're in".
@ChrisFotosMusic3 жыл бұрын
I would gladly have my credit card on the dark web if it meant I never had to deal with CORS again
@mohitdas52923 жыл бұрын
Great video 👍
@jeffreyjdesir3 жыл бұрын
You're certainly a mind hacker...
@tomihawk013 жыл бұрын
4:50 What am I missing here? If Origin B is the potentially malicious server, why is it Origin B that whitelists Origin A? And what is the browser protecting me from by preventing outward communication with Origin B? Or is Origin B the thing that CORS is protecting? I don't get it.
@Aakrarvaxa3 жыл бұрын
I can explain partially. The browser is protecting you from another origin’s attack. If you have one tab open in the browser and open the second one with malicious software - JavaScript on this website can do anything that you can do on that 1st page (as a user). So for example it may be able to view sensitive data, read messages, or analyze DOM as you type in your password etc. Same origin policy does not allow these two tabs (origins) to communicate on this level. The browser checks if the JavaScript comes from an HTML page on the same origin or if it comes from an external origin. If that is the case - access is blocked by the browser.
@Dxpress_3 жыл бұрын
From the diagram, it looks like Origin A wants to request the images, CSS styles, and scripts from Origin B. In this case, Origin A is the potentially malicious one, since it's the one requesting the data.
@tomihawk013 жыл бұрын
@@Aakrarvaxa It makes a little bit of sense but it also contradicts what the image shows. You say "Same origin policy does not allow these two tabs (origins) to communicate on this level" but tabs aren't origins. The servers are the origins. And how did this become about two tabs communicating?
@tomihawk013 жыл бұрын
@@Dxpress_ I don't see anything in the diagram showing Origins requesting data. Origin A and B are the servers. They don't request anything.
@Dxpress_3 жыл бұрын
@@tomihawk01 You're right actually, the diagram is drawn a bit weirdly. And yeah, I don't know what the guy was on about with the two browser tabs either. I think what they meant to imply was that the website displayed in the browser is hosted on Origin A. When the website requests data, the origin sent in the request is not the user's origin, it is still Origin A, since that's where the site is hosted.