Don't make random HTTP requests.

preview_player
Показать описание
In this episode we'll explore the world of SSRFs.

✨ Info
➜ Tools used are: Adobe Animate, Adobe Premiere Pro, Adobe Illustrator & Audacity.
➜ VSCode: Monokai Pro Theme, Dank Mono Font.
➜ Video Production time: 60-ish hours.
➜ 6 Gatorades were consumed.

🎵 Track: Lost Sky - Dreams
Рекомендации по теме
Комментарии
Автор

This is the BEST explanation of SSRF I've ever heard and I finally understand it now. Thank you.

AhrenBaderJarvis
Автор

the funny thing about this channel is that it always flew under my radar because i thought by the graphics in the thumbnails that it wouldn't dive too deep into the topics. I guess I'll never judge a book by its cover again. Real nice vid, keep it up!

floridamanfloridaman
Автор

I love this videos. Every time I see one I understand around 30% of what he's saying but I'm still watching 'till the end.

adygombos
Автор

Great video, thank's for introducing SSRFs in a practical, hands on and easy to understand way.

phanirithvij
Автор

Really great video. I love your editing skills, so slick, nice job.

cybercdh
Автор

Just found your channel and I think it's heavily underrated. Keep making more videos plz, even tho I don't do security stuff myself I find it really interesting and your explanations are super easy to understand for noobs like me too. Love it!

KentoNishi
Автор

I don't know why you guys stopped making such content. You were doing great. I am a fan. The way this channel goes on to explain, it is awesome

TShadw-Sec
Автор

I was in the middle of this video, but I set it down and when I came back, the video was off youtube. Glad to see its back so I can finish it lmao

ModernAtomX
Автор

this channel is as good as it gets man, props

luandasilva
Автор

I swear i've heard someone jokingly say "CRLF injection" before, and although i've seen that fuck with UI only intended for single lines (chat text boxes in some games, Muck for example and you can impersonate others in chat), but i never thought it would be an actual security vulnerability in a real application that can actually cause damage without another human element lol

sodiboo
Автор

This one is definitely make my day...!

basspotion
Автор

11:50 rubocop reported that line for a reason apparently.

sanderd
Автор

So remember when connecting to random URLs: Either bind your client to an IP which only has public internet access (i.e. via firewall settings); Use a client library which has an option to only connect to public addresses (or can do so via an access control callback); Or funnel all the requests through a proxy which denies access to any internal addresses.

triularity
Автор

Cool video, and your english is terrific. I almost didn’t notice that you weren’t a native english speaker.

Dziaji
Автор

Amazing work my brother! Lots of Love! Keep making awesome contents like this.

mohamedfatheem
Автор

Good vid bud, thanks for making it! And have a nice day

potatoonastick
Автор

Thank you for these explanations. I was waiting for a video on this type of problem. Your diagrams and your speech (rather slow) are a plus for me which sucks in English: ').

fmenguy
Автор

You give me such LiveOverflow vibes haha
I like it

Ikxi
Автор

Your channel has helped me out greatly. Tysm!

chiefkeeflover
Автор

Probably the Best Explanation So far, Thanks bud

verolyn