Request Forgeries - SY0-601 CompTIA Security+ : 1.3

preview_player
Показать описание
- - - - -
An attacker can take advantage of legitimate cross-site requests and turn them into a malicious exploit. In this video, you’ll learn about cross-site request forgeries and server-side request forgeries.
- - - - -

FOLLOW PROFESSOR MESSER:
Рекомендации по теме
Комментарии
Автор

This is the only series that gives some real-world context for these concepts. Thank you for taking the time and effort because there's a lot of us stressing over this . . . not projecting or anything though lol

CodyCookMusic
Автор

Professor, I think you give the best real world examples. That's honestly the only reason I am understanding any of this as complete noob

britox.
Автор

Was studying this morning and this video was immediately followed up by an ad for Capital One and I think that that’s the best thing ever haha

jim_tennant
Автор

This is the most clear and simple instruction regarding S+. I am taking multiple courses for S+ through different resources. Some of them are really confusing by the way they organize their classes, I find myself always go back to the classes from Prof. Messer because so far this series is the most easy one to navigate.

junliu
Автор

Everything you need to and clear to the point..as always...!!
Love your work prefessor....

Tarun_Kotagiri
Автор

Another great video Prof! I've been reading the book then coming here to fully understand what I just read in the book. Also, kind of funny thing. After your capital one example, the ad before the next video was a capital one ad/commercial 😅

dirtyddz
Автор

Wait hold up... That is a of data in one spot Capitol One! They really need to regulate how/where/WHEN data should be stored by companies.. 14years of data in one spot is just irresponsible imo..

Frawkesish
Автор

Im trying to understand how the actual request is created when performing this attack. Is this done on the site that the attacker sends as a hyper link?

markivashinko
Автор

Professor, would a CSRF attack be similar to a reflected XSS attack? Because you are using a crafted link or crafted code to perform an arbitrary action?

jordanalex
Автор

Can’t we get compensation from Capital One for that breach?

Anw
Автор

What the difference between Directory Traversal and Server-side request forgery?

Bryant
Автор

Ahh, I just love this content, so much

mohdymi
Автор

a SSRF can also be a type of injection attack right?

rrx