OWASP API Top 10 - Broken Authentication

  Рет қаралды 1,762

Medusa

Medusa

Күн бұрын

Пікірлер: 17
@bertrandfossung1216
@bertrandfossung1216 5 ай бұрын
Médusa you’re just the best. Your explanations of complex processes are second to none. Please keep up with this series. This is a real gem 💎
@Medusa0xf
@Medusa0xf 4 ай бұрын
Means a lot 💚
@abdullahjaved2371
@abdullahjaved2371 4 ай бұрын
The time it'd have taken to edit this, goddamn. Keep up the content meds.
@Medusa0xf
@Medusa0xf 4 ай бұрын
Thanks ❤
@bughunter9072
@bughunter9072 28 күн бұрын
Wow ❤nice explanation
@Medusa0xf
@Medusa0xf 25 күн бұрын
Thanks!
@amoh96
@amoh96 4 ай бұрын
i really like this type of video really cool keep it like this simple and give us examples thank u
@Medusa0xf
@Medusa0xf 4 ай бұрын
glad!
@crueljed1
@crueljed1 5 ай бұрын
Nice explanation ❤
@Medusa0xf
@Medusa0xf 4 ай бұрын
Hope it helped!
@jxkz7
@jxkz7 4 ай бұрын
Great content ❤
@Medusa0xf
@Medusa0xf 4 ай бұрын
thank you!
@IBO.ATTACKS
@IBO.ATTACKS 4 ай бұрын
شكرا؟ = thanks 🤩
@thechannelofmine
@thechannelofmine 4 ай бұрын
The second report is closed as informative that means it's not a valid bug. for this to be impactful the attacker has to redirect the user to his malicious page than steal those tokens using the Referer header from the victim request.
@Medusa0xf
@Medusa0xf 4 ай бұрын
that's another case in itself 😄
@thechannelofmine
@thechannelofmine 4 ай бұрын
@@Medusa0xf If you take a look again at the report you will see that it's closed as informative that means it's not a vulnerability, as he didn't show a real exploit senario, and it's not vulnerable to man-in-the-middle attack because it's secured as https method. Btw are you active on hackerone?
@arjuna902-
@arjuna902- 4 ай бұрын
i love your voice
ССЫЛКА НА ИГРУ В КОММЕНТАХ #shorts
0:36
Паша Осадчий
Рет қаралды 8 МЛН
Counter-Strike 2 - Новый кс. Cтарый я
13:10
Marmok
Рет қаралды 2,8 МЛН
She wanted to set me up #shorts by Tsuriki Show
0:56
Tsuriki Show
Рет қаралды 8 МЛН
NEVER HAD THAT HAPPEN BEFORE...
14:51
Red Panda Mining
Рет қаралды 3,7 М.
Authentication Vulnerabilities | Complete Guide
31:03
Rana Khalil
Рет қаралды 18 М.
Server-Side Parameter Pollution in REST APIs
14:29
Medusa
Рет қаралды 1,1 М.
How To Exploit SSRF To Fetch AWS Credentials
9:07
Medusa
Рет қаралды 1,6 М.
OAuth 2.0 - a dead simple explanation
9:16
Jan Goebel
Рет қаралды 26 М.
2017 OWASP Top 10: Broken Authentication
10:07
F5 DevCentral
Рет қаралды 134 М.
Subdomain Enumeration ALL KINDS!
9:36
Medusa
Рет қаралды 914
ССЫЛКА НА ИГРУ В КОММЕНТАХ #shorts
0:36
Паша Осадчий
Рет қаралды 8 МЛН