Turns out that I did not figure out any of these vulnerabilities which means that I have been shipping vulnerable code all this time 😬Thanks for the awesome tuts. Time to debug prod 😅
@nishantdalvi94705 ай бұрын
Keep Shipping vulnerable code, This keeps penetration testers like us in job : >
@random_guy1024 Жыл бұрын
Finally!!!!!!! Just the tutorial I was looking for learning code review. As a security researcher and CTF player, this is a very Vital skill one should master. Or at least try to learn basic Thanks a lot ❤️
@davidtosin6995 Жыл бұрын
i can teach you a better way around this. simply but complex but simple and fast to grasp.
@random_guy1024 Жыл бұрын
@@davidtosin6995 how do I contact you? And if you don't mind, will you do it for free? Cause I'm broke.
@developerGRohit7 ай бұрын
I really enjoyed your coding style, the clarity in presenting scenarios, and your explanations. I look forward to watching more of your videos. Additionally, I believe it's crucial to stay informed about security topics, especially given their significance in today's landscape.
@AbAb-q3p5 ай бұрын
Does this guy have a course online? What a teacher
@ВиталийОвчаренко-и1н7 ай бұрын
Some common security vulnerabilities in JavaScript include Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). These vulnerabilities can be addressed by following correct development techniques, implementing the same origin policy, and using tools like JavaScript security testing tools and GuardRails for automated security testing. It is important for developers to remain proactive and defensive in securing their JavaScript applications to prevent malicious attacks and keep the web safe.
@ceciljoel9577 Жыл бұрын
Giving examples is a good idea you should give more of them in your courses
@jayseb Жыл бұрын
Thanks for including proper error management in the second example. I so often see during my tests apps sending global 200's or 500's - not really taking the time to correctly management them -> thus poor having logging information. Many teams should watch this video. Cheers.
@germantoenglish89813 күн бұрын
Thank you, this was a great refresher. 😃👍
@johnsansevere9787 Жыл бұрын
Please change the color of your comment. I can't read it on a black screen, but otherwise you have a fantastic video.
@मुरलीधरसिंह6 ай бұрын
understood nothing but loved it! Watched almost 9 minutes of this tut, will come back later after learning the basics of js. Still trying to make a tic-tac-toe game> Wish me luck!
@saltymiche Жыл бұрын
Very nice + quick intro to secure code review!
@dreamofyesterday Жыл бұрын
Awesome video as always. Would love to see more videos about cyber security/ethical hacking/pentesting!!
@kooldandy Жыл бұрын
Good one. Would like to see more on this.
@patrickchan25032 ай бұрын
wow, amazing quick fire tips, thanks
@keilerguardo21649 ай бұрын
That was an incredible tutorial, thank you very much for share with us.
@johny962 Жыл бұрын
That is so helpful. Thank you!
@gk_eth Жыл бұрын
Looking forward for more videos like this.. it's lit💥
@alexbird1507 Жыл бұрын
Great idea, would be really cool to increase font size and install more contrast theme just for the video, because I can't see comments from my phone and barely can read other code. But nevertheless, thanks!
@TopsecretArtpc9 ай бұрын
The last could be IDOR i mean we can use anothers user ID or others user email, btw learning about JS security
@stea27 Жыл бұрын
Really nice tutorial with how simple modifications make difference in code. But next time please use a different color for code comments. Grey on grey background makes it really hard to read.
@TheJohndward01 Жыл бұрын
Thank you so much, this is incredible!
@chenmoasis11 ай бұрын
Thank you for this amazing video! Very informative.
@rubenverster250 Жыл бұрын
Super nice interview questions :)
@Khal_Rheg011 ай бұрын
Great video, thanks!
@ismailmadeit Жыл бұрын
Thank you Brandon ❤
@79Nardo7 ай бұрын
Nice explanation! thanks :)
@soumadip_banerjee Жыл бұрын
Short n sweet! ❤
@paras.developer Жыл бұрын
great video about security information
@WebWonders1 Жыл бұрын
Awsome keep the serious long please
@Teardrop-u4z Жыл бұрын
thanks man! you are good
@jdmayfield8810 ай бұрын
Nice. Thank you for that. Can you do a vid on incorporating 2FA/MFA? Preferably something you can do for free with only something you control. I.E. no dependancy on servers you don't control.
@ДиванныйМонстр-ъ8с Жыл бұрын
Amazing course. Thank you sooooooo much for publishing it. Very usefull.
@i_am_dumb1070 Жыл бұрын
Please make a similar video for solidity . I would say it would help if fcc can upload the famous Secureum Bootcamp for Smart Contract Security Auditing...... it would be very beneficial 🙏
@dipayancodes Жыл бұрын
Branden teaching Brendan's language 🎉
@OnurKAFALI Жыл бұрын
You re all stars
@FeFeronkaMetallica Жыл бұрын
Damn this was a cool video. The === surprised me
@ASDevelopersTutorials Жыл бұрын
Thanks for this !! Very informative
@anisdragan Жыл бұрын
About the Mass Assignment Attack, it seems like you've only made it more challenging for the attacker without completely preventing the attack. This is because req.body.username can still contain any value. I believe it's necessary to validate the data you receive in addition to the measures you've taken to enhance security.
@jnath Жыл бұрын
Of course validation is implied. The point is to prevent user from assigning data to a parameter that they're not supposed to.
@sosolowkey9318 Жыл бұрын
Can you guys do a RPA Development Tutorial?
@toyin5522 Жыл бұрын
Timing attacks make sense
@SASA_maxillo5 ай бұрын
for the first one, an attacker can enter a https link which links to his unsafe website and then execute code, isn't that unsafe too?
@OS-wp5ew2 ай бұрын
Yes , Open redirect vulnerability
@Mari_Selalu_Berbuat_Kebaikan8 ай бұрын
Let's always do alot of good ❤️
@FeFeronkaMetallica Жыл бұрын
Can we get more of these? Does Brandon has a channell?
@LoneWolfCodingProfessional Жыл бұрын
what about server side validation? since client side is exposed to end user
@iamashwincherian Жыл бұрын
Yes, server side validation should be there no matter what. But there will still be vulnerabilities like SQL injections if not handled properly
@s.p.sanjay4253 Жыл бұрын
Please launch a internet of things course
@nullcarry6893 Жыл бұрын
Vue doesn’t have this issue because it prescribes a router for you to use that has param / query sanitization built in.
@captainalpha4853 Жыл бұрын
In 14:35, in this case won't we get an error before even entering the find method? because the request's body is in JSON format but the username is an object that can't be inserted into the request's body.
@mynameisrezza Жыл бұрын
Gold Bro!
@krispern Жыл бұрын
19:07 Number 8 is missing the intro/explanation part
@ahmed.systems Жыл бұрын
This guy is literally Ryan from The Office
@richardprakash4630 Жыл бұрын
RYAN STARTED THE FIRE 🔥🔥😂
@ahmed.systems Жыл бұрын
@@richardprakash4630 Fire Guy *insert kevin giggle*
@brandon_wallace Жыл бұрын
Very nice.
@NewPath-w9h Жыл бұрын
Are these videos allowed to download?
@kephas-media8 ай бұрын
I heard search Param, saw redirect and started laughing 😂😂😂
@adeni4359 Жыл бұрын
Does he have a KZbin channel?
@As74ful Жыл бұрын
what the heck is that hand in the thumbnail of this video
@aboutaline3423 Жыл бұрын
Great tutorial, but most of vulnerabilities you've talked about are not really vulnerabilities, this video should be renamed to some bug you may have in your project
@Hardwork012 Жыл бұрын
Please upload android development full course using kotlin
@hack_crack Жыл бұрын
Excelente
@sitter2207 Жыл бұрын
I don't get the first vulnerability. Since when is just clicking links dangerous ? What can a malicious js code running in browser do at worst ?
@treebucket5382 Жыл бұрын
Lookup same-origin policy, it can allow the javascript to be run as if you were on the host website, potentially leaking tokens, cookies etc.