Тёмный

Cookie Stealing - Computerphile 

Computerphile
Подписаться 2,4 млн
Просмотров 1,2 млн
50% 1

Cookie Monster isn't the only one fond of cookies - thieves on the Internet are partial too. Dr Mike Pound demonstrates & explains the art of cookie stealing.
Follow the Cookie Trail: • Follow the Cookie Trai...
Cracking Websites with Cross Site Scripting: • Cracking Websites with...
Space Carving: • Space Carving - Comput...
Deep Learning: • Deep Learning - Comput...
Secure Web Browsing: • Secure Web Browsing - ...
Anti Counterfeiting & Conductive Inks: • Anti-Counterfeiting & ...
Object Oriented Programming: • Pong & Object Oriented...
Security of Data on Disk: • Security of Data on Di...
/ computerphile
/ computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscom...
Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

Опубликовано:

 

26 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 832   
@stevensanders9219
@stevensanders9219 6 лет назад
This guy has forgotten more about computers than I'll ever learn
@lmiddleman
@lmiddleman 8 лет назад
Shouldn't this video be called "Biscuit Nicking"?
@ChaosDivides
@ChaosDivides 8 лет назад
What about Jaffa cakes?
@vonantero9458
@vonantero9458 8 лет назад
Those are cakes. Nothing to do with anything mentioned here.
@ChaosDivides
@ChaosDivides 8 лет назад
Exactly my point,
@jarmo_kiiski
@jarmo_kiiski 8 лет назад
That would make sense.
@aliciabaumgartner1406
@aliciabaumgartner1406 8 лет назад
Biccy pinching for Aussies.
@CRJessen
@CRJessen 8 лет назад
Dr. Pound is really good. I want more videos from him.
@atmunn1
@atmunn1 7 лет назад
This guy and Tom Scott are my 2 favorite people on Computerphile. I just wish Tom still made videos on here.
@DarkOracleOfDeath
@DarkOracleOfDeath 6 лет назад
I hate you guys. I have stuff to do, it's almost midnight and I keep on watching your so very interesting videos.
@isaaccool3183
@isaaccool3183 5 лет назад
Try 3am
@connerbuxton3320
@connerbuxton3320 5 лет назад
Isaac Cool try Saturday
@Dutch_G
@Dutch_G 5 лет назад
Saaame
@tank3castaneda82
@tank3castaneda82 5 лет назад
U just reminded me i have to work.
@Wouterferdinand
@Wouterferdinand 5 лет назад
This..
@mistermuffin710
@mistermuffin710 8 лет назад
I love these videos that you and Tom Scott do here on Computerphile with ways people can and do hack websites while providing LEGAL examples. I would really like it if you and Tom Scott do more of these.
@AndrewMeyer
@AndrewMeyer 8 лет назад
11:37 It might be worth emphasising here that the reason this works is because the script specifically read the contents of the cookie and included it in the URL parameters for the image. Normally the browser will not send cookies intended for one site to a completely different one.
@Hasi29347
@Hasi29347 3 года назад
I agree, also worth mentioning little bit about CORS while he's at it.
@OwenMiller9825
@OwenMiller9825 2 года назад
Thanks, I was confused about why this would be happening
@4pThorpy
@4pThorpy 8 лет назад
When I explain session ID's to other people (who usually couldn't care less), I always explain it like this; There are "blind guards" to "doors" in a webpage. At the front of the website there's someone who asks for your secret password, you tell them the password and they give you a special badge with Braille on it. You walk into the website and when you feel like going to another "room" (page)...you walk up to the guard and they grope you and say "oh well...you MUST be that person or they wouldn't have let you in, so I'll show you the stuff that only you are suppose to see"......the problem is when someone else makes a copy of that badge...the guards can't tell the difference. Then I go on about cross-site scripting until they go cross-eyed and then I install the NoScript browser extension for them cause they said "I don't care "how" it works...just make it so they can't do it.
@whydontiknowthat
@whydontiknowthat 3 года назад
That’s a nice example!
@bunnybreaker
@bunnybreaker 8 лет назад
I'm so out of the loop. I didn't even realise this was possible in this way.
@crypticmauler
@crypticmauler 8 лет назад
please tell me you're not making websites for banks or shopping sites :-D
@bunnybreaker
@bunnybreaker 8 лет назад
I just resigned after watching this video. Since I have resigned, the sites are not fixed. :P
@knucklesamidge
@knucklesamidge 8 лет назад
+bunnybreaker You just need to escape all user input values before you print them to the view. That's it. That way it just comes out as text of the code. Just make sure you always do it at the view layer and never close to the DB or controller.
@TheHaughtsauce
@TheHaughtsauce 8 лет назад
+knucklesamidge Absolutely correct. I made another comment about this mistake that was mentioned in the video. People aren't getting it.
@bunnybreaker
@bunnybreaker 8 лет назад
Just to clarify, I was joking in my follow up comment. I haven't made websites in years. I'm more disappointed in myself for not knowing about this from an end user perspective, rather than as a web dev.
@richardv519
@richardv519 7 лет назад
Computerphile drinking game. Take a shot every time he tugs on his sweater.
@freestlz1
@freestlz1 5 лет назад
Yes looks like it’s a tick.
@roseforeuropa
@roseforeuropa 5 лет назад
@richard vicente Take a drink every time he ends a sentence or clause with "okay?"
@2Cerealbox
@2Cerealbox 8 лет назад
Upvote for that blog alone.
@moosetwin9023
@moosetwin9023 5 лет назад
r/wrongplatform
@shantanudahiya5122
@shantanudahiya5122 4 года назад
r/ihavereddit
@AndrewMeyer
@AndrewMeyer 8 лет назад
Might also be worth mentioning the HttpOnly flag for cookies here. I mean, obviously if you're vulnerable to XSS that's a serious problem regardless of what other security measures you've taken to protect users, but at least with HttpOnly set the JavaScript won't be able to steal cookies.
@24NEWS-d8l
@24NEWS-d8l 8 лет назад
Don't get ghostery... It's owned by ad targeting companies.
@Frosty-oj6hw
@Frosty-oj6hw 8 лет назад
Get Privacy Badger, it's made by the EFF and stops tracking of 3rd party cookies.
@addLDN
@addLDN 8 лет назад
its a browser extension. If you click on 'Why Ghostery' then 'for consumers' you should get to the download pages.
@24NEWS-d8l
@24NEWS-d8l 8 лет назад
I'd actually suggest uMatrix - it's by the same person as uBlock Origin and allows complete control of all requests made by your browser.
@Anvilshock
@Anvilshock 8 лет назад
ABP, block any and all ad and tracking sites at 2ndLD-level.
@MrNacknime
@MrNacknime 8 лет назад
If it works, it doesn't matter who made it.
@ghelyar
@ghelyar 8 лет назад
For anyone thinking about pinning an IP address to a cookie, don't. Not only does it change if you move to new wifi network, it changes if you move between wifi and mobile, if you move between cell towers, if you're on public transport which offers free wifi and some ISPs even use a different IP address for every request (albeit usually South East Asian dial up connections). I've had people complain that they couldn't log in to a website before because their IP address changed between submitting a login form and getting the response back. Also, if you really want to secure yourself from SQL injection you should use prepared statements, ideally with stored procedures, and never adjust the base query at all. Escaping is not generally good enough to stop more advanced attacks.
@kimjongun9915
@kimjongun9915 6 лет назад
I steal my grandma's cookies all the time. Much easier than the way you do it. I just reach into the jar.
@moosetwin9023
@moosetwin9023 5 лет назад
ok kim
@BharCode09
@BharCode09 4 года назад
But you are Kim Jong Un!
@dinomra7771
@dinomra7771 4 года назад
@@BharCode09 He stores his cookies in his nukes.
@suola-sirotin
@suola-sirotin 4 года назад
I thought that jar was a .jar java file for a second...
@ClassifiedPerson
@ClassifiedPerson 3 года назад
@@suola-sirotin when you're big brain and can't understand the joke at first glance
@fablungo
@fablungo 8 лет назад
There are lots of complicated and simple methods that you can implement between IP locking the cookie and nothing. Been a while since I had to develop a web app, but a common technique I would use would be that every time a request is made a new session ID (or a secondary ID) is generated and the last one is invalidated. This will mean your session ID keeps changing, reducing the size of each attack window and if your cookie is stolen and used when you next request with the cookie the attacker has invalidated, it can invalidated both sessions and notify the end user/server administrator that there has been a potential security breech. It doesn't stop the attacks completely but its a nice technique to make it harder and notify a user of the issue.
@feldinho
@feldinho 8 лет назад
Until the user opens multiple tabs… You don't need to break the web in order to keep your users safe from XSS, just escape all the user-generated HTML and you're done!
@fablungo
@fablungo 8 лет назад
Felds Liscia If I am not mistaken, cookies are per computer, not per tab, do some page load on one and when you do to do one on another it should send the cookie as updated in the first tab. Not sure if it can be broken with close concurrency though (i.e request one page and then another before the browser has handled the response to the first). I probably wouldn't implement anything this strict except in an administration backend but this protects from more than XSS. Obviously you should always escape inputs no matter what and that is the minimum level of protection required because XSS can do more than just cookie hijacking.
@OfficialPirateFraser
@OfficialPirateFraser 8 лет назад
alert("Just testing... :P")
@AgentM124
@AgentM124 8 лет назад
*RU-vid is Smarter Than That*
@OfficialPirateFraser
@OfficialPirateFraser 8 лет назад
Agent M Of course, google just throw loads of money at it so obviously...
@DaRealMaus
@DaRealMaus 8 лет назад
*
@knucklesamidge
@knucklesamidge 8 лет назад
+OfficialPirateFraser It's pretty fkin simple to get around it. You escape it just like you do with database statements.
@d3line
@d3line 8 лет назад
AFAIK you can just replace < with &lt; and > with &gt; That's it, no html tags could get through this...
@deineoma1301
@deineoma1301 4 года назад
It would be awesome if you could provide your test website codes so one could try out for themselves and follow along Thanks for the awesome content
@MrEnderChop
@MrEnderChop 6 лет назад
4:02 "Your blog is bad, and you should feel bad." Futurama reference.
@goeiecool9999
@goeiecool9999 8 лет назад
I actually heard a story of the valve steamworks not being protected against XSS which would allow a rogue developer to put HTML tags in the description of their app description and steal the cookies of any valve administrator visiting the info of his app.
@goeiecool9999
@goeiecool9999 8 лет назад
dicription of their app description. :/
@acruzp
@acruzp 7 лет назад
Mike Pound is my favorite Computerphile host
@kvelez
@kvelez 2 года назад
0:49 Requests 1:50 Cookies 2:42 Stealing 3:30 XSS
@knucklesamidge
@knucklesamidge 8 лет назад
Fantastic video!! I already knew all this stuff but still very enjoyable to watch. More web dev stuff please!
@ocoro174
@ocoro174 6 лет назад
god bless this man. what a legend
@WannabeWant3D
@WannabeWant3D 8 лет назад
That's still vulnerable to sql injection, because you used mysql_real_escape_string, instead of mysqli_real_escape_string. The i stands for "improved", so obviously that's the one we should use. The other one has some subtle bugs, mainly character encoding ones.
@mohamedhabas7391
@mohamedhabas7391 2 года назад
Thank you for always providing clear content Mike
@Kishibe84
@Kishibe84 8 лет назад
I love MIke Pound's videos!
@shayansec
@shayansec 2 года назад
"I get back an image and I think nothing's gone wrong but they've now got my cookies" scariest words.
@j2simpso
@j2simpso 4 года назад
Trading a browser cookie for a photo of the Cookie Monster? Seems like a fair trade to me! 🤣
@kowalityjesus
@kowalityjesus 8 лет назад
so over my head, but nice to have an inkling of what it means!
@The_Tribute_Maker
@The_Tribute_Maker 3 года назад
Looked up ghostery as soon as you mentioned it and installed it to both browsers I use. Thanks!
@TylerMatthewHarris
@TylerMatthewHarris 8 лет назад
Better not steal my cookies
@IEJ7654321
@IEJ7654321 Год назад
This is how Linus got hacked
@arturssosnars811
@arturssosnars811 4 года назад
One thing that would be nice in these videos, imo, would be simplest ways in few words, how to defend yourself from most known exploits for new Web developers, uni students etc
@Doct0r0710
@Doct0r0710 8 лет назад
I remember when Facebook didn't require https for their mobile site. Soo many users details were visible in my school when I fired up FaceNiff or Firesheep. (ARP poisoning, traffic sniffing, cleartext cookies)
@Doct0r0710
@Doct0r0710 8 лет назад
+pm79080 bu that's effort. I don't like doing effort.
@Doct0r0710
@Doct0r0710 8 лет назад
+pm79080 that's even more effort. You just can't match with my laziness
@knucklesamidge
@knucklesamidge 8 лет назад
+pm79080 what do you mean? Google returned nothing
@crypticmauler
@crypticmauler 8 лет назад
you should do a video on Content Security Policy (CSP) and show how it can be used to protect against these types of attacks when having to use 3rd party applications which you may have little control of how they did their security.
@ImGeoX
@ImGeoX 4 года назад
Great video and explanation. However, it would be nice to have a section on how to protect yourself from XSS.
@Ivo--
@Ivo-- 8 лет назад
Ghostery itself does tracking. It's pretty messed up.
@The0x539
@The0x539 8 лет назад
Privacy Badger for the win, or Disconnect.
@Ivo--
@Ivo-- 8 лет назад
The0x539 Yeah, I use disconnect personally.
@N....
@N.... 8 лет назад
AdBlock also does tracking, which is why people recommend the completely separate project AdBlock Plus
@Ivo--
@Ivo-- 8 лет назад
Nicholas Braden I suggest ublock origin over adblock plus.
@Ivo--
@Ivo-- 8 лет назад
hcblue I couldn't really say. Privacy badger is made by the EFF, which counts for something IMO. I haven't used it myself though.
@CatnamedMittens
@CatnamedMittens 8 лет назад
Why did they choose the name "cookie"?
@EKULvideos
@EKULvideos 8 лет назад
Comes from fortunes cookies I think. They hold small bits of information, like fortune cookies.
@holdream
@holdream 8 лет назад
thorin might know :>
@CatnamedMittens
@CatnamedMittens 8 лет назад
iZz⤴c Thanks.
@CatnamedMittens
@CatnamedMittens 8 лет назад
+holdream Maybe :>
@hellterminator
@hellterminator 8 лет назад
Truth is nobody knows. There are several theories, the most likely of which seems to be that it's a reference to “magic cookies” (basically the same thing, but in pre-web age and nobody knows why those were called that either), but nobody really knows.
@gyroninjamodder
@gyroninjamodder 8 лет назад
This video seems like it might transition into a video about CSRF pretty well.
@alexwolfeboy
@alexwolfeboy 5 лет назад
You guys should do a series on stuff like this and how to try and prevent it. Since not too many people realise stuff like this especially when they begin coding - even Twitter has this happen not that long ago. I see how you show how it’s done, but you didn’t show how to prevent it ( an easy way that I use, is replace all angle brackets with the HTML code for it - it’s an ampersand and some text - now it won’t be valid HTML ). Heck, maybe even videos on how to secure your server itself.
@DampeS8N
@DampeS8N 8 лет назад
:( Use the mysqli interface or PDO and prepared statements - do not use mysql_real_escape_string() any more. Come on Mike.
@CrazyLogic
@CrazyLogic 8 лет назад
glad i wasn't the first to notice!!
@crypticmauler
@crypticmauler 8 лет назад
haha, noticed that too. but let's keep in mind this application was not intended to be best practice let alone secure. he may be using the same app as an example for what not to do.
@Betacak3
@Betacak3 8 лет назад
I really, really, really hope that this is not what he does when he actually writes a DB application :D
@DampeS8N
@DampeS8N 8 лет назад
x In the video he specifically called out that he protected his database in the code. And he has.... provided there are no 0-day vulnerabilities with the current version of mysql-r-e-s() and that he's using the current version. Which are the reasons he should be using prepared statements.
@RiccardoBello98
@RiccardoBello98 8 лет назад
well don't use mysql_real_escape_string() at all, coz that's been deprecated as of php5.5 and removed as of php7.. (all of the mysql module was removed as of php7, replaced by mysqli) (ofc prepared statements is the best way to go overall)
@AlbertSirup
@AlbertSirup 7 лет назад
the interviewer really sounds like the guy from sonicstate. I always thought Brady was doing the interviews...
@nO_d3N1AL
@nO_d3N1AL 8 лет назад
It seems like a bit of a contrived example. Nicely explained, but I'd like to know whether this actually happens, how often it happens and how trivial it is to prevent it.
@Hasi29347
@Hasi29347 3 года назад
There is a computer worm called Samy. A guy wrote a script that executes whenever someone visits your myspace profile. I suggest you to check it.
@MegaMrMarlboro
@MegaMrMarlboro 8 лет назад
An alternative to XSS and often used in Spam emails, is Clickjacking. Look it up if you're a web dev, or perhaps a video on this would be nice +Computerphile
@Overgreen
@Overgreen 8 лет назад
When he said, "Can I change the shipping address?" a FedEx truck passed by my house o_o
@efraimg8543
@efraimg8543 4 года назад
Thank you As far I am aware, if an attacker will gain the session ID he won't be able to use it again because it was already used by the original user.
@MikeTrieu
@MikeTrieu Год назад
Reauth when performing important tasks is one method of hardening security. Another might be to challenge again if geoip logs detect impossible travel (i.e. it suddenly looks like you're on the other side of the world or, at least, a completely different Autonomous System).
@pcpmtiservicos9855
@pcpmtiservicos9855 5 лет назад
Great explanation about this issue. Thank you very much.
@yashovardhanjha9274
@yashovardhanjha9274 5 лет назад
RU-vid is Smarter Than That
@Twisted_Code
@Twisted_Code 4 года назад
alert("if you see this alert, either now or in the future, they really aren't") "if you see this alert, either now or in the future, they really aren't" who knows, they could introduce a change at some point that RETROACTIVELY makes this exploit work...
@nils-erikolsson3539
@nils-erikolsson3539 5 лет назад
Very interesting and eye-opening videos, pedagogically told. Simply great.
@AntoshaPushkin
@AntoshaPushkin 8 лет назад
Who is this guy? He is the coolest one to tell about computers at this channel, the videos about computer vision are totally amazing and this one was great too despite I've known all the information long before I've seen it. But if I need to tell someone what "XSS" is, I will definitely give the link to this video
@SikoSoft
@SikoSoft 4 года назад
I steal cookies from myself all the time due to my employers blasted authentication policies. We started using Azure DevOps, and they require you to authenticate via their ActiveDirectory, which only works on the company intranet. However, this is just for authentication; DevOps traffic isn't controlled in any way. And since all consultants work on their own machines, I didn't want to have to switch to company computer to use Azure DevOps, so I downloaded a Chrome cookie session plugin that lets me dump a session after I've validated on the company computer, and load those cookies up on my own machine, and bam: I'm in Azure DevOps on my own machine. :D
@helloworld8583
@helloworld8583 4 года назад
Why server does not use an IP address instead of cookie when it wishes to track clients requests and let's say shopping card? Because server can see only external IP address and can not see a local address of device. Is it the reason?
@justin3594
@justin3594 5 лет назад
I love that he’s using MariaDB
@JacobBrunsonBurner
@JacobBrunsonBurner 8 лет назад
mysql_real_escape_string() is deprecated!
@jarmo_kiiski
@jarmo_kiiski 8 лет назад
htmlspecialchars() & stripslashes()
@filemot25
@filemot25 8 лет назад
that function name, php looks horrid.
@JacobBrunsonBurner
@JacobBrunsonBurner 8 лет назад
Yeah. Thankfully there are frameworks like Laravel that abstract all the ugliness away.
@iporcupinetree
@iporcupinetree 4 года назад
@@JacobBrunsonBurner $result = mysql_query("SELECT * FROM users WHERE username='".$userinput."'"); 👍👍👍👍👍
@OFfic3R1K
@OFfic3R1K 3 года назад
As is escape() that he used for XSS.
@JerenVelletri
@JerenVelletri 8 лет назад
oh man why do so many good videos come out after midnight
@dsnunes
@dsnunes 6 лет назад
Even a "myimage.jpg" can perfectly be a php file (or any other scripting language, fwiw). The "file extension" concept have no place in HTTP protocol, so the browser doesn't actually know if "image.jpg" is an image or anything else named like that (including a folder). It doesn't even have to exist on the server, as you have multiple configuration options for your routing and rewriting of the request paths once the request hits the server.
@karlsmile7054
@karlsmile7054 6 лет назад
Really amazin So well described So exciting
@Dusk-MTG
@Dusk-MTG 4 года назад
People seeing this image might not realise what just happened... A part it's a cookie monster.
@ammobake
@ammobake 8 лет назад
Is it possible to use a similar concept to hijack someone else's toolbars/browser add-ons? I've heard of manipulating or tricking a user's browser to open a blank toolbar. This toolbar runs a script that allows you to access the user's local drives/files. Though I'm not sure it's seemless (not a true remote session). It seems strange that it would be possible but I can confirm I've seen it happen.
@lalalalexie
@lalalalexie 5 лет назад
Waiting for CERN's vpm
@pablostreams
@pablostreams 6 лет назад
BRUH this guy really knows his stuff wow.........makes me wanna drop electrical and pick up programming/coding
@toxicdesire8811
@toxicdesire8811 5 лет назад
Okay, someone was telling me to not to store token in localstorage. As I'm watching this, things are not quite different tbh
@undefBehav
@undefBehav 3 года назад
That's exactly why cross origin resource sharing policies exist.
@moebrowne
@moebrowne 8 лет назад
Lots of PHP frameworks will now change your session ID on each request (while keeping the data associated to the new ID), this prevents these types of attacks as the ID that gets stolen is immediately invalid
@AlexGW
@AlexGW 5 лет назад
7:14 Code like that, takes me waaay back 😂
@caparazo3488
@caparazo3488 5 лет назад
Put that cookie down, now!
@alexwolfeboy
@alexwolfeboy 5 лет назад
It’s scary how easy doing these sorts of things are sometimes. If I recall, however, XSS attacks aren’t nearly that much of a threat because because of SSL. The request is private, and you’d have to forge the certificate, which is nearly impossible. Do I understand correctly?
@prillewitz
@prillewitz 2 года назад
Very clear! Read more books though!
@jopaki
@jopaki 8 лет назад
Excellent breakdown.
@realmikekotsch
@realmikekotsch 7 лет назад
Can you get this guy to explain software models, functions, attributes … I understand so many things for the first time when he is explaining it.
@WorkFromHomeFriday
@WorkFromHomeFriday 8 лет назад
Curious how many folks will now try XSS here in the YT comments now. ;) alert('Weyhey!');
@CiroDiMarzioComorra
@CiroDiMarzioComorra 6 лет назад
bruh you can't perform a XSS attack on yt dumbass
@GlueDonkey
@GlueDonkey 5 лет назад
@@CiroDiMarzioComorra Do you know what a joke is?
@cosminxxx5287
@cosminxxx5287 5 лет назад
Wheyhey!
@bluecatdk
@bluecatdk 5 лет назад
Michael Mihalek woooosh?
@markusTegelane
@markusTegelane 4 года назад
@@CiroDiMarzioComorra But what about third party RU-vid clients using its APIs to show the comment section?
@hornchannel
@hornchannel 4 года назад
crosseyed what? awesome, thanks
@DarioVolaric
@DarioVolaric 8 лет назад
I have seen an article that mysql_real_escape_string() is still open to SQL injection. That is why it's best to use PDO
@jarmo_kiiski
@jarmo_kiiski 8 лет назад
Or in php you could use str_replace() instead.
@zwembadsniper6883
@zwembadsniper6883 7 лет назад
Dario Volaric or use prepared statements
@DarioVolaric
@DarioVolaric 7 лет назад
Zwembad Sniper That's what I said. PDO
@Crazytomm
@Crazytomm 4 года назад
This would be good to go through if your going to take your Comptia Security + test
@Seegalgalguntijak
@Seegalgalguntijak 8 лет назад
Mike, Ghostery is fine, but if you really want to have control over what the websites you're visiting do with your computer, I'd recommend tools like uBlock Origin, uMatrix (which is awesome!), NoScript and of course self-destructing cookies. RequestPolicy however is obsolete if you set up the "u-Addons" (uBlock/uMatrix) accordingly, because they can be set up in such a way that no cross-site-requests are being followed. Of course, most websites don't work in that setting, but then you can allow individual FQDNs (in uBlock Origin) and what is allowed to be loaded from an individual FQDN (in uMatrix), and in such a way websites can display their content, but don't execute the script that is intended to detect a tracking blocker, and so on.
@vortyx090
@vortyx090 8 лет назад
very nice videos, computerphile, keep the good job
@photonicsauce7729
@photonicsauce7729 4 года назад
hey test
@rrni2343
@rrni2343 8 лет назад
Spot the Parker cube!
@BillySugger1965
@BillySugger1965 8 лет назад
BUT... Amazon has now forced Instant Transactions on customers which bypass pre-transaction authentication. Is Amazon now unsafe, or do they gave alternative cross site scripting safety measures against hackers posting reviews, comments and Amazon Marketplace listings?
@TechXSoftware
@TechXSoftware 8 лет назад
Who stole the cookie from the cookie Jar?
@DreckbobBratpfanne
@DreckbobBratpfanne 5 лет назад
sry
@katowo6521
@katowo6521 7 лет назад
NO IT'S NOT A COOKIE! IT'S AN ORANGE! *IT'S AN ORANGE!!*
@Seegalgalguntijak
@Seegalgalguntijak 8 лет назад
03:46 shows a Samsung subnotebook with a TrackPoint. Which model is it? I really need my TrackPoint, because TouchPads are crappy to use and whenever I have to use them, I feel the need to smash the machine against the wall. So what laptops are there that have a TrackPoint - except for Lenovo ThinkPads, of course??
@paveltikhonov8780
@paveltikhonov8780 6 лет назад
Cookies need love like everyone does
@photonicsauce7729
@photonicsauce7729 4 года назад
test
@osiris5449
@osiris5449 6 лет назад
Great video. I already know all this but know; PHP Sessions and Cookies are WAY different. Just like LocalStorage.
@RoshanSingh-qr1vx
@RoshanSingh-qr1vx 4 года назад
Seems like camera man is doing sting operation of Dr Pound
@martixy2
@martixy2 8 лет назад
Now do CSRF :D
@kopuz.co.uk.
@kopuz.co.uk. 8 лет назад
This takes me back to redirecting quest books.
@youtuberocks8397
@youtuberocks8397 8 лет назад
You are a crafty man thanks for the lesson..........
@andreo4511
@andreo4511 4 года назад
Is that code still vulnerable to SQL injection? I thought it should be using prepared statements and enforcing UTF-8?
@incorporealnuance
@incorporealnuance 8 лет назад
You used to be able to do this on Neopets, they used it for this, but they also used it to put silly pictures in post that shouldn't normally let you do it. People are funny sometimes.
@Beniled
@Beniled 8 лет назад
Install what? I couldn't make out what you suggested people install at the beginning of the video.
@stingaling
@stingaling 3 года назад
Right at the start you recommend installing an app to stop cookies 'tracking our whereabouts' but I couldn't understand what you said. Ghost something?
@trooper8464
@trooper8464 8 лет назад
This is why good programmers should always sanitize client strings to prevent XSS attacks.
@PlexusTen
@PlexusTen 5 лет назад
Excellent video
@TriggerHappyRC1
@TriggerHappyRC1 3 года назад
Am I understanding this correctly or am I missing something? The script that he sent is now a permanent part of the website as it will be loaded from the database as soon as a user requests to view the blog entries. When the script is loaded, the client will run it and send their cookie to the attacker's website. The user doesn't need to do anything other than load that blog post in order to send off their cookie?
@kkloikok
@kkloikok 5 лет назад
alert("probably didn't work")
@vincentliu2110
@vincentliu2110 3 года назад
alert("Attak you!")
Далее
Log4J & JNDI Exploit: Why So Bad? - Computerphile
26:31
Wana Decrypt0r (Wanacry Ransomware) - Computerphile
15:19
Hacking Out of a Network - Computerphile
25:52
Просмотров 240 тыс.
Slow Loris Attack - Computerphile
8:25
Просмотров 1 млн
Cross Site Request Forgery - Computerphile
9:20
Просмотров 764 тыс.
Babbage's Puzzle - Computerphile
13:18
Просмотров 73 тыс.
Diceware & Passwords - Computerphile
10:56
Просмотров 306 тыс.
Taming Kerberos - Computerphile
16:06
Просмотров 323 тыс.
Hacking Websites with SQL Injection - Computerphile
8:59
Running a Buffer Overflow Attack - Computerphile
17:30