The HTTP/2 Rapid Reset attack - This attack is called Rapid Reset because it relies on the ability for an endpoint to send a RST_STREAM frame immediately after sending a request frame, which makes the other endpoint start working and then rapidly resets the request
Join me with Master Hacker OTW for an insightful dive into the protocol vulnerability, learn how hackers exploiting it and more important learn how to defend against it and protect your org from such attacks
Disclaimer: This video is for educational purposes only. We do not promote hacking or any illegal activities. Remember, hacking without explicit permission is illegal. Stay safe and ethical in your cybersecurity explorations
OccupyTheWeb Books - Affiliate links:
1. Become a master Hacker - amzn.to/3Eq6vX4
2. NEW BOOK - Network basics for hackers - amzn.to/3YNd1iz
3. Linux Basics for Hackers - amzn.to/3Sdoh5i
OccupyTheWeb Community - Hackers-Arise: - 20% coupon for everything in store ("YANIV")
Chapters
00:00-00:41 Opening
00:41-01:41 OTW!!
01:41-02:30 Educational HTTP2
02:30-03:15 Importance of DD0s Attacks
03:15-04:09 DD0s Examples Educational
04:09-05:07 New Attacks...
05:07-07:28 HTTP/1.1 VS HTTP/2
07:28-08:59 Unlimited Number of request!!
08:59-09:38 33% Of Servers In The Worlds use HTTP/2!!
09:38-13:15 Wireshark
13:15-16:42 Typical HTTP/2 Server...
16:42-17:14 SecengJef
17:14-18:04 Hackers Arise
18:04-22:06 Básics of The....
22:06-23:05 GitfHub
23:05-25:01 Múltiple Forms of Mitigation
25:01-25:26 if You don't Have that...
25:26-28:51 DD0s Protection
28:51-30:45 OTW DD0s Experience
30:45-32:50 Cyber Eras
32:50-36:49 Beginning of a New Era
Watch more cyber security Video's
1. Does SQL injection still work ? Lessons by Master Hacker - • SQL for Hackers by Mas...
2. Behind Darknet Diaries with Jack Rhysider - • Jack Rhysider Darknet ...
3. Shield Your Wi-Fi from Hackers with these Essential Security Measures • Hacking home WIFI with...
5. How to become a master hacker (With OTW) - • how to become a master...
6. Hacking SCADA systems - • hacking industrial con...
7. SW define radio hacking - • radio hacking with a m...
8. Pegasus spyware - • pegasus the spyware te...
9. Stuxnet - • Explaining cybersecuri...
10. API Hacking - • How Hacking APIs Works...
11. DNS Hacking - • DNS hijacking | Cybers...
12. How to Build a hacking Box - • how to build your hack...
13. NotPetya - • notpetya attack
14. OSINT - Open Intelligence tools - • OSINT framework Explai...
Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: cutt.ly/YanivHoffman
Thank you for being here!
Stay Safe and Healthy,
Yaniv Hoffman
#cybersecurity
#occupytheweb
#hacker
30 июл 2024