HTML Ping Attribute Explained ˂ href = ‘

  Рет қаралды 10,837

Hussein Nasser

Hussein Nasser

Күн бұрын

Пікірлер: 63
@armaandhanji7151
@armaandhanji7151 4 жыл бұрын
Hussein, your channel should have 340k subscribers, honestly the highlight of my day whenever I see a new video added by you. As always, thank you for the great context!
@a.yashwanth
@a.yashwanth 4 жыл бұрын
from chrome docs Because a cookie's SameSite attribute was not set or is invalid, it defaults to SameSite=Lax, which prevents the cookie from being sent in a cross-site request.
@hnasr
@hnasr 4 жыл бұрын
Thanks! That looks about right, so we are safe unless user explicitly set SameSite None
@NC_RC
@NC_RC 4 жыл бұрын
That thumbnail... 😄 Perfect. Great job on the video, Hussein. I really don't understand why your channel doesn't have ten times the audience. Keep up the fantastic work; we'll keep learning and sharing!
@hnasr
@hnasr 4 жыл бұрын
Thanks Neil! I am just grateful to have you guys watching, 34K is still a lot and appreciate every single view and comment (L)
@NC_RC
@NC_RC 4 жыл бұрын
@@hnasr oh you're absolutely right, 34k is a massive number! :) I'm just watching your Certificates series and in just two videos you have already cleared up some concepts that I'd been struggling with. I really appreciate your videos and enjoy your delivery. Thank you!
@AdarshMenon
@AdarshMenon 4 жыл бұрын
Really awesome stuff Hussein! Like you said I think this is useful for some cases, but really concerning. Also those use-cases can be implemented without the ping attribute, so in my opinion all browsers should disable this.
@billybunn
@billybunn 4 жыл бұрын
Wow, never heard of this before, thank you!
@ManojKumar-ti8rn
@ManojKumar-ti8rn 4 жыл бұрын
I really can't explain how grateful to you. Really thank you for your work.
@hnasr
@hnasr 4 жыл бұрын
You're very welcome Manjo!! appreciate it !
@Clepsyd_
@Clepsyd_ 4 жыл бұрын
I have something to add to the Firefox bit. At 10:30 you say "They don't lie, they actually show you that it's a google URL". They actually do "lie" in a very sneaky way :D - The original href when the page loads IS the actual URL you're supposed to be redirected to (linkedin.com/hsnaser in that case). If you just hover on a link without clicking it, that's what you'll see at the bottom of the screen, or if you inspect the HTML without doing a right click directly on the link. I suspect it's this `onmousedown` attribute you glossed over quickly, which triggers some JS function which replaces the href to the google's url when you press down the mouse button, and when you release it that's when you actually navigate, to the freshly replaced google.com/?... href value. Really sneaky. Great video otherwise thanks! I didn't know about this ping attribute :D
@patrick-dev
@patrick-dev 4 жыл бұрын
Thank you so much for this informational video. Even though its scary, I feel a lil bit secure in terms of cookies, I always set them up to Lax or Strict.
@lord12790
@lord12790 4 жыл бұрын
Wow didn't knew that it exists, that's why always waiting for your videos, thank you
@BastiDood
@BastiDood 4 жыл бұрын
Thank you for sharing this. I am very disturbed that I only knew about this now. _Perhaps the sneakiness is intentional..._ 🤔 👀
@KostasOreopoulos
@KostasOreopoulos 4 жыл бұрын
It is a POST request, but as you mentioned with no body, so I do not see any actual difference in functionality from a GET request except semantics. Since tracking IS storing information it should be a post request to signal that. The only problem with that is the DDOS attacks that could be orchestrated (but I guess its not that hard to firewall ping requests originating from places you do not want. I wonder how this "circumvents" the no-cookies GDPR clause.
@hnasr
@hnasr 4 жыл бұрын
Kostas Oreopoulos correct its a POST with a body of PING so very similar to GET, we confirmed with google Dev team that SameSite lax cookies won’t be sent. How would you block ping POST request on the firewall if those are encrypted(Https) to prevent DDOS ?
@KostasOreopoulos
@KostasOreopoulos 4 жыл бұрын
@@hnasr You are correct. I forgot about the https. They is not an automated way to stop that DDOS attack
@parlor3115
@parlor3115 3 жыл бұрын
About this feature being a security risk, I don't see how because it can't share the main page's cookies so it's not vunerable to CSRF nor can it execute scripts so it's not XSS vunerable.
@deshkarabhishek
@deshkarabhishek 4 жыл бұрын
I will never stop watching if you upload these type of videos
@Nurckye
@Nurckye 4 жыл бұрын
Nice content, keep it rolling
@hnasr
@hnasr 4 жыл бұрын
Always
@mohammedissam3651
@mohammedissam3651 3 жыл бұрын
Thanks, Hussein. Useful lesson.
@VinuP2023
@VinuP2023 4 жыл бұрын
Thank you so much for all your videos. Please don't stop making these tutorials. Can you please make some .net related videos?
@hnasr
@hnasr 4 жыл бұрын
Been a while since I made a .NET video here is playlist on VB.NET kzbin.info/aero/PLQnljOFTspQX-XZChZg-b06MJ27nAJQS9 I also have a C# crash course C# by Example Crash Course kzbin.info/www/bejne/rZnYlJaiZ6uBn6s
@VinuP2023
@VinuP2023 4 жыл бұрын
Hussein thanks for the quick response. I will surely watch these videos. I hope you make .net related stuff in future :)
@shreshtharora
@shreshtharora 4 жыл бұрын
Thanks man for this amazing video. 👏👏
@panossavvaidis6086
@panossavvaidis6086 4 жыл бұрын
so, I guess that in case you own a server and you want to stop malicious activity, couldn't you discard requests that come with 'text/ping' content type?
@artso003
@artso003 4 жыл бұрын
Great video. Keep it going!
@adrianfgutierrez2836
@adrianfgutierrez2836 4 жыл бұрын
Good job Hussein 👍🏾
@hnasr
@hnasr 4 жыл бұрын
Thank you Adrian!!
@6365bharath
@6365bharath 4 жыл бұрын
I had no idea this existed. Thanks as always Hussein. Do you have any videos on Elastic Search?
@hnasr
@hnasr 4 жыл бұрын
Bharath Kumar thank you Bharath ! I don’t but planning on making one on ES. It is a popular requested video
@shashikantsharma3551
@shashikantsharma3551 4 жыл бұрын
Thanks you for the info.... wasn't aware of it.
@sariksiddiqui6059
@sariksiddiqui6059 4 жыл бұрын
I was thinking if a website doesnt uses SSL(say abc) , you can just post a link
@hnasr
@hnasr 4 жыл бұрын
lets say you are logged in to facebook.com, which means you have a cookie on your browser. Lets say SameSite=None for that cookie. Now I give you a link to my evil.com website which has the following click here to visit facebook The act of clicking the link will send a POST request to facebook.com/post.php (because of ping) and because you are already logged in, and you have a cookie SameSite=None, than the browser will also send the cookies to facebook.com/post.php and that event creates a post on your behalf. you can as similarly delete a post, a video, picture or do so many other things on behalf of the user by just clicking a link! Obviously this example will not work because facebook uses samesite=lax cookies which will not send the cookies (need to confirm what happens with ping)
@sariksiddiqui6059
@sariksiddiqui6059 4 жыл бұрын
Makes sense. Am not sure if you could actually attach payload to these pings . Chrome doesnt even show request type for these pings(but we could see we hit post). Also wandering what’s stopping from a rival company to use the google ping url and bombard it with fake random data
@ahmedkhudhair8035
@ahmedkhudhair8035 4 жыл бұрын
Very interesting , can I use this for sending email , instead of making new thread to send email , because it runs asynchronously ?
@hnasr
@hnasr 4 жыл бұрын
Sure!! You can send an email when a user clicks on a link. The ping will do a POST and you can send the email from the backend
@hnasr
@hnasr 4 жыл бұрын
Great usecase
@sairam-lj6zu
@sairam-lj6zu 4 жыл бұрын
Great video nasseir. I don't think it will be a security threat as if you mention other domain url the cookies won't be passed because of Same origin policy. It could be dangerous when a hacker can inject links in the content using html Injection vulnerabilities where in that case hacker can point the ping url to same site to some sensitive endpoint like delete account, change status etc., etc.,
@FordExplorer-rm6ew
@FordExplorer-rm6ew 4 жыл бұрын
Never knew this exist. Thank u
@DamjanDimitrioski
@DamjanDimitrioski 4 жыл бұрын
Odd, I enable send_pings in Firefox Nightly, and also disabled the enhanced protection, still, Google doesn't add the ping attribute, I think It's playing safe :D.
@hnasr
@hnasr 4 жыл бұрын
Oh Firefox has ping now! Interesting
@davilinkicefire
@davilinkicefire 3 жыл бұрын
Google probably check the UserAgent header of the request to figure out if it need to add the ping attribute or the fallback tracking method
@bhavesh_thakur
@bhavesh_thakur 4 жыл бұрын
Fantastic !! I am thinking how I can use this exploiting CSRF vulnerability.
@deshkarabhishek
@deshkarabhishek 4 жыл бұрын
You can't do it
@SR-sz9zh
@SR-sz9zh 4 жыл бұрын
Thanks, you make good content :)
@hnasr
@hnasr 4 жыл бұрын
I appreciate that! THANK!!! Much love
@大盗江南
@大盗江南 4 жыл бұрын
Thx bubby 😁😁😁
@supersu6138
@supersu6138 3 жыл бұрын
Oh boy so thats y Firefox is a bit slower
@evolagenda
@evolagenda 4 жыл бұрын
Would've been cool if you also tried duckduckgo
@hnasr
@hnasr 4 жыл бұрын
Oh man! I forgot! I bet they don’t.. (just checked they dont$
@evolagenda
@evolagenda 4 жыл бұрын
@@hnasr I flred up a session myself, would just have been a nice addition to show people. The results aren't as good but it's worth it.
@takshpatel8109
@takshpatel8109 3 жыл бұрын
that was awesome
@LordNementon
@LordNementon 4 жыл бұрын
Don't worry, banks use CSRF token, or at least you shall change of banks if they doesn't support basic security 😜
@alexmattyou
@alexmattyou 3 жыл бұрын
Ping don't work in Microsoft edge. I think that's safe
@sabuein
@sabuein 2 жыл бұрын
Thank you.
@mohammedabahussain4562
@mohammedabahussain4562 4 жыл бұрын
Intersting
21 Awesome Web Features you’re not using yet
8:31
Fireship
Рет қаралды 989 М.
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН
Гениальное изобретение из обычного стаканчика!
00:31
Лютая физика | Олимпиадная физика
Рет қаралды 4,8 МЛН
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН
HTTP Request Smuggling Explained
10:33
Hussein Nasser
Рет қаралды 5 М.
What are Third Party Cookies, How do they work?
16:28
Hussein Nasser
Рет қаралды 15 М.
How I Coded An Entire Website Using ChatGPT
18:22
Nick White
Рет қаралды 1,9 МЛН
How to test ping attribute in Cypress?
11:34
QA Box Let's Test
Рет қаралды 464
Can you Cancel a REST HTTP Request?
12:45
Hussein Nasser
Рет қаралды 4 М.
Retro MS-DOS Coding - Recreating the Iconic Award BIOS Screen
18:16
NCOT Technology
Рет қаралды 50 М.
Learn web development as an absolute beginner
12:57
Coder Coder
Рет қаралды 2,9 МЛН
TLS/SSL Certificate Pinning Explained
12:03
Hussein Nasser
Рет қаралды 59 М.
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН