ethicalPap_
ethicalPap_
  • Видео 17
  • Просмотров 102 383
OAuth 2.0 for Hackers (Part 2): How to Hack With Insecure OAuth 2 Endpoints
part 1: ruclips.net/video/ZiflmXXhVaA/видео.html
OAuth 2.0 for Hackers (Part 2): How to Hack With Insecure OAuth 2 Endpoints
Easy Guide to Understanding the Basics in OAuth 2 with OIDC
In part 1, we visited an overview of the OAuth 2 in 2024 ( Open Authorization Framework ) process and how it works from a technology perspective, using OpenID Connect (OIDC). In this video, we go over OAuth 2.0 Grant Types, and how to approve OAuth as an ethical hacker. Additionally, we can see how to ensure that OAuth is secured (by doing things like including a "State" parameter. It is important to note that there are other API protection considerations when dealing with OAuth that are not mentioned in this ...
Просмотров: 624

Видео

AI Can't Win If We Hack It.. Learn AI Prompt Injection with GPT
Просмотров 1,7 тыс.14 дней назад
AI Can't Win If We Hack It.. | AI Prompt Injection with GPT for Beginners The easy way to learn AI Prompt Injection, for Beginners. Learn how to hack AI (GPT) by using a technique called prompt injection, for beginners in cybersecurity! In this video, we'll explore the concept of chatGPT, with uses the GPT method (A type of AI). GPT is short for Generative Pre-trained tranformer, and was create...
Reverse Engineering for Beginners: How to Perform Static Analysis on any Piece of Software
Просмотров 73 тыс.28 дней назад
Reverse Engineering 101: How to Perform Static Analysis on any Piece of Software | How to reverse engineer Learn how to perform static analysis on software with this guide, for beginners, to reverse engineering. This video is perfect for those interested in malware analysis, cyber security, and information technology. Discover key techniques using Cutter, but such techniques can work on any too...
The Secret to Becoming a Better Hacker | Beyond Recon
Просмотров 1,1 тыс.Месяц назад
Stuck on recon? There is a reason for that, but there are ways to move past the recon phase. In this video, I show one of many! Video Timeline: 0:00 Intro 1:43 Demo 28:40 Outtro Join the Discord! discord.gg/VZCfME2t Follow my socials: Linkedin: www.linkedin.com/in/vankperry/ Discord: vipv4 Odysee: ethicalPap_
I failed an important interview, but it made me better.
Просмотров 415Месяц назад
This is a story about an embarrassingly failed interview that I have had, that shaped my approach to security overall. Want to Connect? LinkedIn www.linkedin.com/in/vankperry/ Discord discord.gg/uqb7nTUx
OAuth 2.0 for Hackers (Part 1): Easy Guide to Understanding the Basics
Просмотров 2,4 тыс.Месяц назад
As cybersecurity champions, we often fail to understand how a technology works at the core, but rush to understand how the technology is applied instead. Lets take it a step back and MASTER the idea of OAuth! Video Timestamps 0:00 Introduction 5:33 OAuth Overview 16:41 Common Misconfigurations 24:00 Hacking Lab Join our Discord! discord.gg/uqb7nTUx Want to Connect? Follow me on LinkedIn! www.li...
Today's youth are brilliant.
Просмотров 1,3 тыс.Месяц назад
Yo! There is a common saying, that "Future generations are lost". From my perspective, future generations are full of intelligent minds, and people who hold the necessary skills to change the world. Today we get to dive into the life of a young man named Neswin. Neswin is eagerly chasing his dream to be a Penetration Tester! He studies 8 hours a day, in addition to regular school work and extra...
Got an interview in cybersecurity? Here's some advice
Просмотров 244Месяц назад
Lets talk about the reality of getting into cybersecurity. I've had hundreds, if not thousands of interviews in the space - and have begun to MASTER the art of interviewing in recent times. Here's my advice on how to approach 5 different types of interview styles Video Timeline: 0:45 Interview Style 1 3:51 Interview Style 2 6:31 Interview Style 3 7:31 Interview Style 4 13:42 Interview Style 5 J...
GraphQL (Part 2): An Intermediate and Technological Deep Dive for Hackers
Просмотров 7702 месяца назад
Yo, GraphQL is fun! As cybersecurity champions, we often fail to understand how a technology works at the core, but rush to understand how the technology is applied instead. Lets take it a step back and MASTER the idea of GraphQL! Video Timeline: 0:00 Introduction 2:04 Understanding the GraphQL language 49:32 Introspection Overview 52:15 Intermediate Hacking for GraphQL 1:32:27 Conclusion Join ...
Want to break into Cyber Security? Let's Talk
Просмотров 4,9 тыс.2 месяца назад
Lets talk about the reality of getting into cybersecurity. This is the kickoff to a series of videos that I will be working through to help prepare you for a career in cybersecurity. Through it all, I AM ROOTING FOR YOU!
GraphQL (Part 1): A Fundamental and Technological Deep Dive for Hackers
Просмотров 3,3 тыс.2 месяца назад
Yo, GraphQL is fun! As cybersecurity champions, we often fail to understand how a technology works at the core, but rush to understand how the technology is applied instead. Lets take it a step back and MASTER the idea of GraphQL! Video Timeline: 0:00 Intro 4:57 RESTful vs GraphQL 25:14 Common GraphQL misconfiguration 34:40 Exploiting GraphQL Join our discord community! discord.gg/qcBRsc6p
JWT: A Fundamental and Technological Deep Dive
Просмотров 6642 месяца назад
JWT: A Fundamental and Technological Deep Dive
Hello, I'm Pap!
Просмотров 5282 месяца назад
Hello, I'm Pap!

Комментарии

  • @LMB222
    @LMB222 39 минут назад

    Small correction: the Poles made the "bomb", but the process was still partly manual, the decoding took about 15 minutes. This all collapsed when Germans added one extra wheel, making the faily itoces into roughly ~28 years. It was afaik August 1939, so the entire bureau was evacuated from Warsaw to Paris, then to the UK. The rest is very well known. PS Credit to the French secret service, who found a disgruntled German officer, who sold them one Enigma, together with the manual.

  • @lexc.8280
    @lexc.8280 11 часов назад

    James Harden teaching us the good stuff.

  • @Shock-oh5rc
    @Shock-oh5rc 12 часов назад

    This video is very important to watch carefully to undestand code it really helped me

  • @anonsecbro
    @anonsecbro 13 часов назад

    "ethically ofcourse"

  • @worldwar_two2894
    @worldwar_two2894 15 часов назад

    great video mn!

  • @kittoh_
    @kittoh_ 17 часов назад

    Awesome stuff boss! Waiting for part III. 💯

  • @phaneedrakumaribharadwaj2392
    @phaneedrakumaribharadwaj2392 День назад

    Hello can you teach me reverse engineering in deep

  • @DIZZLEBOI44
    @DIZZLEBOI44 День назад

    Ayo this is top dopey 🎉🎉

  • @uaman11
    @uaman11 День назад

    I showed my grandma this at 2x speed she thought I was changing religions

  • @whoismikeyuk
    @whoismikeyuk День назад

    I agree. You hit the algorithm. Your video just popped up on my radar. Not really my subject, but really informative. Thank you. ps. Yes, I subscribed 😊

  • @paulsiro1775
    @paulsiro1775 2 дня назад

    You aint sleek JAMES HARDEN .

  • @BlazeIce-pv4gp
    @BlazeIce-pv4gp 2 дня назад

    heimdal ?

  • @justinglanton5168
    @justinglanton5168 2 дня назад

    You have such great content. Looking forward to those RSA and Diffie-Hellman videos!

  • @DualWieldingDad
    @DualWieldingDad 2 дня назад

    Hey, a Hornets fan 👋

  • @derrickagyemang1259
    @derrickagyemang1259 3 дня назад

    Great video, very thorough explanation

  • @jamesross3939
    @jamesross3939 3 дня назад

    I haven't done reverse engineering since 2005 when I cracked a USB dongle for my boss!! I was surprised that I was able to do it actually. I was using IDA Pro at the time. Previous to that I disassembled some 8 bit MC6809 code in the 1980's ... Reverse engineering is complex, difficult, and time consuming. Makes you wonder what AI tools will emerge that makes it way simpler.

  • @x1101126
    @x1101126 3 дня назад

    Very good content, worth 4 years of college 👍

  • @dennismwangi3573
    @dennismwangi3573 3 дня назад

    Thank yu for sharing. Very informative.

  • @j.megatron
    @j.megatron 3 дня назад

    Str8 up, James Harden has always been one of my favorites, now this n#### gotta hacker channel, lemme get my jersey out! Get em!!!

  • @RichardPalmer-np4hb
    @RichardPalmer-np4hb 4 дня назад

    Enjoyed the entire topic and reminder of reverse engineering. Presented VERY well and look forward to part 2. You have a new subscriber to your channel. Thanks.

  • @robelbelay4065
    @robelbelay4065 4 дня назад

    Yes please part 2!!

  • @dronestrikejr
    @dronestrikejr 4 дня назад

    Hell yea; love ur channel, this what i was looking for. just subbed

  • @bitmanagent67
    @bitmanagent67 4 дня назад

    Takes me back to my WIndows days.

  • @devinmcgee5130
    @devinmcgee5130 4 дня назад

    10/10

  • @david88va
    @david88va 4 дня назад

    Anyone else thought he was saying little Indian and big Indian 😅

  • @uzumakiuchiha7678
    @uzumakiuchiha7678 4 дня назад

    Provide link to part 1 in description please

  • @mrhassell
    @mrhassell 4 дня назад

    on the evolution of processor architectures: x86 Architecture: Initially developed by Intel, the x86 architecture started with the 8-bit 8086 processor in 1978, then evolved to 16-bit and 32-bit versions1. It’s known for its Complex Instruction Set Computing (CISC), which allows for a wide variety of instructions, making it versatile but sometimes slower due to the complexity. en.wikipedia.org/wiki/X86 RISC vs. CISC: Reduced Instruction Set Computing (RISC) was indeed developed to simplify the instruction set, allowing for faster execution of instructions. This approach contrasts with CISC by using a smaller set of simpler instructions. Here, in the task of performing subtraction (reducing an instruction set) addition (becomes the result, when coding and in practical use, which is why RISC failed its original goals and is an open source failure now, with huge money behind it.. meh.. whatever), the program is divided into three parts, i.e., load, operate, and store, which makes RISC programs long and requires more memory to store instructions while needing fewer transistors as the commands are simple and less complex. AMD64 and Intel 64: AMD developed the AMD64 architecture, which extended the x86 architecture to 64 bits. Intel later adopted this architecture, branding it as Intel 642. This extension allows for more memory addressing and improved performance. superuser.com/questions/383711/whats-the-difference-between-intel-64-and-amd64 Microcode Contributions: Both Intel and AMD use microcode updates to fix bugs and improve performance in their processors. While AMD64 (or x86-64) is a significant contribution from AMD, both companies regularly update their microcode to address security vulnerabilities and enhance functionality. techcommunity.microsoft.com/t5/core-infrastructure-and-security/demystifying-microcode-updates-for-intel-and-amd-processors/ba-p/1000845 P.S - 40 years ago, I started with this.

  • @jpphoton
    @jpphoton 4 дня назад

    client id is a weak point over http .. oauth perhaps could be further constrained by imposing a http header say like x-forwarded-for .. but that can be spoofed .. so it ends up being forever non-deterministic .. otherwise we'd have already locked it down .. but alas

    • @ethicalpap
      @ethicalpap 4 дня назад

      Yep! Client-ID In cleartext is very bad and x-forwarded-for can also lead to SSRF. Love the input here!

  • @party4one
    @party4one 4 дня назад

    Great work fella, love the vids❤

  • @XTi9
    @XTi9 5 дней назад

    This man looks like he's born by reverse reproduction

  • @gopinath9986
    @gopinath9986 5 дней назад

    just beacuase you your low sub count but still you proved you have quality content

  • @Mr.SharkTooth-zc8rm
    @Mr.SharkTooth-zc8rm 5 дней назад

    😎👍

  • @abduldione1524
    @abduldione1524 5 дней назад

    great content

  • @matthewdietzen6708
    @matthewdietzen6708 5 дней назад

    Dude... this is JUST what I needed.

  • @KissMyConverseFool
    @KissMyConverseFool 5 дней назад

    great vid.

  • @StynerDevHub
    @StynerDevHub 5 дней назад

    🎉🎉🎉

  • @cheffloppa1
    @cheffloppa1 5 дней назад

    🔥

  • @systemsadministrator2419
    @systemsadministrator2419 5 дней назад

    🎉

  • @ethicalpap
    @ethicalpap 5 дней назад

    Yall, I got a new camera and didn't realize it was zoomed into my face so much, until after the fact. Enjoy the close up.

  • @tefan1379
    @tefan1379 5 дней назад

    Definitely would like part 2!

  • @Dr_Frog
    @Dr_Frog 5 дней назад

    Awesome video. Your presentation is excellent, you have some great graphics, and your knowledge is impressive. Could you keep them coming? On a side note, X86 refers to 16-bit and 32-bit processors, not just 32/64-bit processors. It was only in the Pentium and later series processors that they used 32-bit registers. Thus, from a historical point of view, the X86 would be referring to 16-bit and 32-bit processors in this family. Timeline 1978: The original processor used 16-bit registers. In 1982, 80286 used 16-bit registers, and then, in 1985, the processor with a 32-bit register was released.

  • @otubright5864
    @otubright5864 5 дней назад

    I really enjoy your content! Could we schedule a second session on reverse engineering? I’d love to dive deeper into the details, and if possible, a live demo of a piece of written software would be greatly appreciated. You're doing fantastic work, and I truly value it!

  • @Abigayle-hf7by
    @Abigayle-hf7by 6 дней назад

    i admire your work so much, you’re a true inspiration!

  • @leeoiou7295
    @leeoiou7295 6 дней назад

    Excellent video, bro. The intro was a bit unnecessary but the remaining part of the video was fire and by far the best content on reverse engineering I have seen.

  • @danielzuzevich4161
    @danielzuzevich4161 6 дней назад

    Wish I had time to dive more into this. My brain is currently consumed by machine learning. Bookmarking for a rainy day.

  • @pogo55555
    @pogo55555 6 дней назад

    LIked. Subscribed.

  • @kaihack2
    @kaihack2 6 дней назад

    I shouldn't give you a like for that slander at the beginning 😂 But this was informative.

  • @PBandECHO
    @PBandECHO 6 дней назад

    I fully expected to be overwhelmed but you broke it down in a digestible way. Thank you.

  • @PBandECHO
    @PBandECHO 7 дней назад

    That was honestly amazing. I would love a part 2, and 3, and 4.

  • @Drakkheart
    @Drakkheart 7 дней назад

    Excellent starting point. Thank you so much for making this! You explain things very clearly.