It's not much, but will continue to support your page. Your teaching is a breath of fresh air in a very stale curriculum.
@Evoleo3 жыл бұрын
At this point these are never 100s, but it's still high-quality videos with no BS, so I'm not complaining
@dom84293 жыл бұрын
i mean there is a break after 100s so you get the best of both worlds: if you prefer 100s videos you can close the video there, or keep watching if you want. and fireship gets to upload 10min+ videos which helps with the youtube algorithm, which is a bonus for the channel.
@Evoleo3 жыл бұрын
@@dom8429 nah, even the short ones are 2min +
@PandaTheGFX3 жыл бұрын
I don't know if I'm just used to your rhythm of teaching, but this guy's teaching makes me want to open reddit and doomscroll while kinda listening
@Venom-ne4ox3 жыл бұрын
2x speed or more solves your problem
@dashamm982 жыл бұрын
I love r/collapse also
@DanishShakeel3 жыл бұрын
Next video: Writing good code, or OTP vulnerabilities.
@nameless_95043 жыл бұрын
It's simple A brute force attack or found of apikeys to there sms provider nothing much
@DanishShakeel3 жыл бұрын
@@nameless_9504 Bruteforcing a 6 digit OTP, I doubt it is a good idea. Talking about master OTPs, intercepting requests, are better alternatives.
@DanishShakeel3 жыл бұрын
@@nameless_9504 I mean, I have been doing it for a while. I like Fireship so much that I want a video on this. A few days back, I was testing a website - you could literally change the phone number on which they sent you the OTP and login with a different phone.
@nameless_95043 жыл бұрын
@@DanishShakeel is it even possible? Never heard about it! Give me a example that may help me understand
@DanishShakeel3 жыл бұрын
@@nameless_9504 The website used an API, and they POSTed the number to it in plaintext. I changed the request, and the OTP arrived on the updated number, whereas the webapp logged me in with the actual phone number.
@MM-vr8rj3 жыл бұрын
Holy shit you are literally covering every single corner of IT and all those subjects I learned at school as well.
@erniea58433 жыл бұрын
This channel consistently provides awesome and educational content balanced with good entertainment. Keep up the great work
@dylankendrick273 жыл бұрын
You make my favorite videos - the perfect TL;DR + details
@saswotlamichhane58623 жыл бұрын
*My website recently got hacked, but it was so badly coded the hackers ended up giving me the fix to those vulnerabilities, Bad code can help sometimes.*
@poglord._3 жыл бұрын
This is one of the best videos on ethical hacking
@fpspsyduck3 жыл бұрын
Love this channel!!
@edisonarango2 жыл бұрын
Well, CORS might seem to protect websites from requests of evil origins, but it's super weak, it can be bypassed easily by making requests outside of browsers or just by creating a Proxy, besides, the requests always hit the server, so in the end it's not really that helpful, and instead, it always annoys developers on every single project.
@Norsilca11 ай бұрын
What kind of proxy are you talking about? A proxy running on the user's machine next to the browser? That's a lot harder to do than getting some javascript running in someone's browser.
@edisonarango11 ай бұрын
@@Norsilca No, a server proxy, you can easlily get the response from server to server and then return it with the CORS headers.
@Norsilca11 ай бұрын
@@edisonarango Wouldn't your proxy have to be running at the same origin as the first party website?
@wadexyz11 ай бұрын
@@Norsilcai don't think that guy has a clue what he's talking about based on his response. either that, or he's a genius and we're both baffled.
@jugertmucoimaj90172 жыл бұрын
This 11 min video taught me what stckoverflow and other complicated explaining never taught me!!!
@shootnado3 жыл бұрын
Omg after 2 years of confusion somebody finally explains sop properly
@bhbblblblllb3 жыл бұрын
'And why do we need CORS?' Should be 'What is CORS?'
@sheepy01253 жыл бұрын
this doesn't seem like 100 seconds, but i'm watching all of it anyways
@idemchenko-js3 жыл бұрын
@fireship used to publish literally 100 sec videous without going deep into the topic. These days, the first part is 100 sec bird-eye view on the topic and then comes the rest. That's why it is 100 sec of sth.
@sarcasticdna3 жыл бұрын
Notification Squad, attendance here, with a 👍.
@Diamonddrake3 жыл бұрын
Cors only applies to JSON and is enforced by the Client. It hardly prevents cross site scripting. The requests go through fine, you just can’t read the results.
@niton64742 жыл бұрын
I dont understand what CORS is even usefull for. He only explained what it blocks and not WHY. I dont see the benefit - i am searching for this and the title suggests that he explains it
@udaykumarmettu Жыл бұрын
Lol please i am dying to know
@wiri23912 жыл бұрын
I agree with the others, your voice, pacing and structure are just ..“easily enjoyable“, which is highlighted in contrast to the other guy.
@DevOpsBoss2 жыл бұрын
Being featured in Jeff's video is the ultimate accolade a content creator can earn - so jealous of Bartosz 😍
@DK-ox7ze3 жыл бұрын
Great content like always. Can you do a video on designing backend apis with a focus on creating the right endpoints (from a front-end engineer's perspective)?
@yark6183 жыл бұрын
Your videos are pure gold. Thank you.
@realgoogleuser3 жыл бұрын
100 Seconds of XML is much needed
@Zolodar8 ай бұрын
Are you a time traveling developer from 1995?
@akashdeepnandi3 жыл бұрын
Off topic, was wondering if you can provide some insight to this question or anyone for that matter. I'm a javascript developer, love doing frontend development with react progressing towards fullstack but I'm a bit confused about what after fullstack? What are some viable career paths to choose, I'm open to branching out to other fields in relevance, I am learner and love to see my limits(Also interested in security but found my niche in web development due to low entry barrier) Feedbacks are much appreciated.
@soniablanche56722 жыл бұрын
You can also load an external image to but you won't be able to modify it
@IshanKBG3 жыл бұрын
We needed this You are my inspiration I have decided to open my own programming youtube channel like you but in my own regional language
@husler74243 жыл бұрын
Really mind boggling explanation, thank you very much, i would like to see more videos like this.
@Michael-Martell2 жыл бұрын
Honestly If my web security doesn’t have a Slavic accent idk if I could fully trust him/her. This guy really knows his target market.
@JR-um3kt3 жыл бұрын
First Edit: Second Gold Is there any reward after 10? Love your videos!
@sadhlife3 жыл бұрын
yup
@sadhlife3 жыл бұрын
congratulations you won... idk what
@Fireship3 жыл бұрын
Gold! 🥇
@gerolmed3 жыл бұрын
I still dont quite get what this prevents. If i make a page i wont add in any requests to servers I dont want them to go. An attacker couldn't modify my page or inject any api calls. So why would I want a cors policy to be not widely open in that case
@anouar-fadili3 жыл бұрын
Thanks, I have no luck... This video was uploaded after my interview... So yeah 🙃
@13hdni373 жыл бұрын
This channel was made in heaven
@manishgarhwal71193 жыл бұрын
You wouldn't believe it, But this tool is what I was trying to figure out yesterday and today, so that I can check CCAvenue Payment Gateway Integration vulnerability in my app. 🙏🙏🙏
@AhmadBarghouthi3 жыл бұрын
You suouldnt be thanking for watching dude We who have to thank you for amazing materials
@DEVDerr3 жыл бұрын
You can simply pronounce "Bartosz" as "Bartosh" 😁 Good video as always!
@DevAcademyCom3 жыл бұрын
😂
@PabloGnesutta2 жыл бұрын
And why is it that static files are allowed (including executables scripts) but calling the API is not?
@killerdroid992 жыл бұрын
because of allowed origins in the server side cors settings, only the whitelisted hosts are allowed to fetch or mutate data that is why you have to declare those hosts in the environment variables
@sefterm-zade97443 жыл бұрын
I wish I had teacher like you. thanks man😍😍😍
@kevinbasence11473 жыл бұрын
As always, quality and informative videos!
@Minecodes3 жыл бұрын
I am learning this already and i found one problem on reddit, i found it when i was trying to use a normal user as a bot. I already reported it.
@ashuzon3 жыл бұрын
This video is? I mean if you know fetch, js, some online wordlists and how to press F12, you don't need to step out of your browser to do all penetration tests. F12 in browser is OP. Every aspect can be checked via developer tools, the networking, request/response, data manipulation, js manipulation and many more.
@doontz1113 жыл бұрын
Your voice is like a soft caramel.. I love listening to you
@nickvelos95713 жыл бұрын
Please make 100 second & beyond videos for social media APIs like Instagram Twitter KZbin Facebook tiktok etc
@okie90253 жыл бұрын
Do JWT authentication next if you haven't already (access tokens, refresh tokens, etc.)
@weshuiz13253 жыл бұрын
Learn to google before you ask
@okie90253 жыл бұрын
@@weshuiz1325 I could learn anything using Google, you're missing the point entirely lol
@weshuiz13253 жыл бұрын
@@okie9025 hey already did jwt if you looked for it
@crycetruly3 жыл бұрын
@@weshuiz1325 😂😂😂😂😂😂😂😂😂😂😂😂😂😂
@samlama62233 жыл бұрын
Wondering cross policy is only for frontend. If anyone try to fetch using backend language, then it ignores cross policy.
@shaynepreston60553 жыл бұрын
Can you explain a little why stylesheets and scripts were fine to grab from the external server but the api call was blocked? I understand the premise of CORS but is there a reason that css and scripts were ignored? Is there other things that CORS ignores as well?
@cloudfox19083 жыл бұрын
Edit: This is WRONG: The basic premise is that you can receive/download assets from the external origin, but you cannot send anything to it.
@shaynepreston60553 жыл бұрын
@@cloudfox1908 got it. What about something like an HTTP GET request? While I’m not sending anything to my server is that still a part of the CORS model?
@cloudfox19083 жыл бұрын
@@shaynepreston6055 ah I led you wrong before. When you download/GET a page, you are still making a request to a server for those resources. The reason it may be allowed is because "For security reasons, browsers restrict cross-origin HTTP requests initiated from within scripts." I'm assuming it's ok since it wasn't within a script, but this stuff is quite confusing for me too. Reference: stackoverflow.com/a/42605316/14056792
@shaynepreston60553 жыл бұрын
@@cloudfox1908 ah that makes more sense. Thanks!
@cubeofcheese55743 жыл бұрын
So you can retrieve static files from and external server but not call its api
@efari3 жыл бұрын
But then why do the external stylesheets and scripts and images get loaded? They are also cross-origin but yet they are not blocked by the browser???
@HP_Tubcraft3 жыл бұрын
dude your channel is priceless.
@kristiandaugaard74953 жыл бұрын
Nice video. Would have been nice if the video included an example where the external api was whitelising origin a
@letsbuildseries3 жыл бұрын
When you're ready to lean how to do Smart Contracts? I've been writing a Truffle tutorial on how to use react and MetaMask.
@JohnDoe-pr6yf3 жыл бұрын
What is the difference between first GET to 8081 to fetch css and js during page rendering and later GET to 8081 triggered by button?
@niton64742 жыл бұрын
The mime type. script/js, style/css, application/json. Json is forbidden - but it doesn't matter since he only explained what is blocked. not WHY as the title suggests
@kendedetar3 жыл бұрын
Great video! What icon set do you use? These colorful icons are beautiful 🤩
@johnlee47782 жыл бұрын
@7:40 he doesn't explain how making this request and getting the static files is possible through the external origin. Is it because the Express 'get()' acts as a middleware? Or is it because somehow 'public' folder is recognized as the same origin(url) due to its folder structure/location..?
@tjgdddfcn2 жыл бұрын
Express.js (and all other backend libraries) disables CORS by default on static files
@dennisbarzanoff90253 жыл бұрын
Dear Mr. Jeff Fireship, If you opt for quality in your videos, then ensure more quality control in the collabs because they are sometimes boring and do not match the rest of the video.
@sylvereleipertz9553 жыл бұрын
I might be wrong but i though that it was the preflight request that failed in case of CORS policy and not the actual Request/Response.
@benhalicki97493 жыл бұрын
Good video, thanks for sharing. Can you please explain how a hacker could take advantage of a website not implementing CORS correctly? From what I understand this does nothing to protect the API as CORS is enforced by the browser. Thanks
@tjgdddfcn2 жыл бұрын
CORS is there to protect the Client, not the Server
@arjuns22193 жыл бұрын
Pls do something on DevOs, MLOps
@JimmyS23 жыл бұрын
Compared to Burp commercial ( free) version, i find ZAP more appealing in features and usability
@niton64742 жыл бұрын
I would rename "And why do we need CORS?" to "What does CORS do?" because the reason of the blocking (what i urge to understand) is not explained at all. The title is a little missleading
@md.tahmeedhossain94093 жыл бұрын
can you please provide a roadmap or guide on how to get started with ethical hacking. thanks a lot.
@rimzzlabs3 жыл бұрын
Interesting topic, even tho im still learning ES6 JS
@dieperfektemakaroni15282 жыл бұрын
1:25 It's really hard to hack and takes a lot of years ... you just click "start attack"
@SudhanshuIGI3 жыл бұрын
Please do a reverse engineering on Apple’s new iPad Pro webpage. Their web designs are on completely next level.
@kusumojha5ojha8493 жыл бұрын
Can you please make a video on webgl?
@Fireship3 жыл бұрын
That's on the list
@sufler71803 жыл бұрын
Ayyyy, hi Poland!
@DevAcademyCom3 жыл бұрын
👋😻
@SwapnilSoni3 жыл бұрын
Yeah I'm a Full DevOps Stack Hacker
@xxbomelxx8743 жыл бұрын
Can't I just run a proxy and add the 'Access-Control-Allow-Origin' manually and bypass the browser's security?
@rhettmelton3 жыл бұрын
Someone please respond to this. I have the same concern
@paddyspencer67623 жыл бұрын
Am I stupid or have u done an auth vid. Of not pls do. And like not with fire base. Thx. EDIT - thx for all the great vid. Keep em up, I love this channel.
4:56 oups: the browser will comunicate with Origin B but when i receive the response if the header allow-origine is not there i will kick out the response
@thedelanyo2 жыл бұрын
The line between the role of the hat (hat_role) is just intention. On the other hand, those that are using the the tools are they the hackers?
@lepepito2 жыл бұрын
Nice video dude
@moon911x2 жыл бұрын
Me after 3 years of hacking journey when first see the title (Ethical Hacking in 100 Seconds) :)
@br93773 жыл бұрын
Gonna put this on 2x speed and learn it in 50 seconds 😎
@ExplosiveKaboom3 жыл бұрын
put me in the woosh
@khadimhusen3 жыл бұрын
Good video, but title is misleading.
@krtirtho3 жыл бұрын
How do you always know what I need😃?! I was wandering around entire internet for way of preventing some security issues in one of my project. CORS is of course one of 'em. Thanks Fireship❤ & of course huge thanks to Bartosz🙏 for explaining the whole process so easily...
@DevAcademyCom3 жыл бұрын
I am really happy you like it! 😍
@GosuHub3 жыл бұрын
Do php and manipulation of databases
@aanchaltiwari92053 жыл бұрын
Apologies for asking something irrelevant,.. what is the bg music?
@original_anu3 жыл бұрын
I'm here for my daily tech knowledge bytes :D
@mohitdas52923 жыл бұрын
Great video 👍
@ravichandra33833 жыл бұрын
Next video: Chrome Extension and Outlook Add-ins
@winterboltgames3 жыл бұрын
Nice video! Can you give ReScript a try and let us know your opinion about it?
@tomihawk013 жыл бұрын
4:50 What am I missing here? If Origin B is the potentially malicious server, why is it Origin B that whitelists Origin A? And what is the browser protecting me from by preventing outward communication with Origin B? Or is Origin B the thing that CORS is protecting? I don't get it.
@Aakrarvaxa3 жыл бұрын
I can explain partially. The browser is protecting you from another origin’s attack. If you have one tab open in the browser and open the second one with malicious software - JavaScript on this website can do anything that you can do on that 1st page (as a user). So for example it may be able to view sensitive data, read messages, or analyze DOM as you type in your password etc. Same origin policy does not allow these two tabs (origins) to communicate on this level. The browser checks if the JavaScript comes from an HTML page on the same origin or if it comes from an external origin. If that is the case - access is blocked by the browser.
@Dxpress_3 жыл бұрын
From the diagram, it looks like Origin A wants to request the images, CSS styles, and scripts from Origin B. In this case, Origin A is the potentially malicious one, since it's the one requesting the data.
@tomihawk013 жыл бұрын
@@Aakrarvaxa It makes a little bit of sense but it also contradicts what the image shows. You say "Same origin policy does not allow these two tabs (origins) to communicate on this level" but tabs aren't origins. The servers are the origins. And how did this become about two tabs communicating?
@tomihawk013 жыл бұрын
@@Dxpress_ I don't see anything in the diagram showing Origins requesting data. Origin A and B are the servers. They don't request anything.
@Dxpress_3 жыл бұрын
@@tomihawk01 You're right actually, the diagram is drawn a bit weirdly. And yeah, I don't know what the guy was on about with the two browser tabs either. I think what they meant to imply was that the website displayed in the browser is hosted on Origin A. When the website requests data, the origin sent in the request is not the user's origin, it is still Origin A, since that's where the site is hosted.
@MIXT4PEmessiah3 жыл бұрын
Bro I'm also Bartosz and I got the same shirt 😅 Good vid
@DevAcademyCom3 жыл бұрын
😂😂😂
@omanavarghess68473 жыл бұрын
I was so fast there are no dislikes!
@alvaro.makes.music13 жыл бұрын
Anyone knows where can I find the gif at 1:25? I'd love to use it in my lectures
@samuelbartik52653 жыл бұрын
Next video: oAuth 2.0 in 100 Seconds and beyond
@sachinaasuri3 жыл бұрын
can we get strict mode in 100sec.
@oussamamaatallah03 жыл бұрын
make a video about best practices of a REST api design or the purpose of header and body and so on...
@AliBerro-c1s11 ай бұрын
“Given us permission” as they say
@alejomakevids3 жыл бұрын
Finally, I can stop being a script kiddie that install Kali along with a desktop environment.
@hart12542 жыл бұрын
What i never understood is: so how APIs work. Lets say my react app that works on port 3000 needs some resource from an external api, how does this work
@tjgdddfcn2 жыл бұрын
APIs configure their response headers to allow for other sites to access them
@hart12542 жыл бұрын
@@tjgdddfcn thank you, so that's the way to go, i thought that was just a hack or some unsecure option
@josemanuel52053 жыл бұрын
video idea: 100 seconds of laravel
@paweszewczyk35373 жыл бұрын
What is the name of this music ?
@SolomonTheStoryTeller3 жыл бұрын
please a video on the new Angular State management StateAdapt!!!
@HijabiCoder3 жыл бұрын
Loool right in the middle of security class too 😂 so strange
@kanakbagga38243 жыл бұрын
Please do a video on DGraph :)
@dystopianNinja12893 жыл бұрын
Amazing video but i was annoyed by the fact that his video was difficult to watch with all that editing cuts
@ahmedabdelwadod58233 жыл бұрын
Go in 100 seconds please!
@Noah-vm8id3 жыл бұрын
Lol, I had this error yesterday but fixed it by doing another approach