HSTS - HTTP Strict Transport Security - Protect against SSL Stripping attack - Practical TLS

Поделиться
HTML-код
  • Опубликовано: 22 дек 2024

Комментарии •

  • @PracticalNetworking
    @PracticalNetworking  2 года назад +8

    📢 *Black Friday / Cyber Monday Promotion*
    👉 Practical TLS for only $50 (originally $297)
    💻 Use code *BFCM2024* --> pracnet.net/tls
    📅 Offer expires Dec 6

  • @scottspa74
    @scottspa74 2 года назад +16

    I just sent this to my computer info systems and digital forensics current instructors to point out to them how much they're failing us. You, Ed, are doing the greatest work, you're a hero

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      Ha. Thank you Scott. I appreciate the shares =). Hope they sign up for my course!

  • @Jamesaepp
    @Jamesaepp 2 года назад +7

    Followed this from reddit, binged the whole playlist. Just wanted to comment that this is incredibly well done.
    * I love the fading pen marks. I imagine this is great for learners for whom English is not a primary language, and it's great for when I'm reviewing/filling in small gaps while watching at 2x. :)
    * THANK YOU for including a couple episodes with actual math. You explained this more concisely and with better examples/context than the computerphile videos. I'll be recommending your series to anyone I know in the future who wants to better understand digital cryptography.

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      Hi James. Thank you for the kind words. I'm really happy you enjoyed this content as much as you did =).
      Yes, I love the math! Not math itself, granted, but the simpler Crypto examples really helped it click for me when I first learned all this, so I was eager to do the same to others watching the video.
      Do me a favor... if you're willing, do you mind posting a link or two to some of the other videos on Reddit? Self promotion is always looked at with suspicion, but a fellow Sysadmin referring good content is typically well received. No pressure either way. Thanks again for the kind words =).

  • @Larry-nx8ho
    @Larry-nx8ho 2 года назад +1

    I've seen this make many wifi guest portals not be able to redirect, too. Great video, as always!

  • @shahdharmik1919
    @shahdharmik1919 Год назад +1

    In this case of using HSTS, use of following is still vulnerable?
    1. Browser extensions interception just like M-I-M attack? The manually installed ones!
    2. Use of any non-standard browsers, i.e tor, lunaspace, uc browser, brave?
    Just curious to knw

  • @chartypes
    @chartypes 2 месяца назад

    OMG what a such amazing video ! Thank you so much for this content and the resources as well. 🙌🏻

  • @wildmanjeff42
    @wildmanjeff42 2 года назад +3

    Thanks for the video, very informative and easy to understand

  • @thriveniraghav4356
    @thriveniraghav4356 2 года назад +2

    All your videos are very informative. Thank you.
    Can you make videos on SD-WAN technology.

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      You're welcome, Thriveni. SD-WAN isn't in my expertise to teach on, I'm afraid.

  • @kotemanoble1734
    @kotemanoble1734 2 года назад +2

    Interesting, thanks for putting this out there.

  • @navinreddy-xx1vo
    @navinreddy-xx1vo 11 месяцев назад +1

    no words, awesome videos, Thanks for video

  • @jeremiahm5487
    @jeremiahm5487 2 года назад +1

    Been a while since we heard from you.
    Fantastic video BTW.

  • @Alexanderslaxis
    @Alexanderslaxis 2 года назад +3

    Hey man, your tutorials are brilliant. Can you please create a new series to discuss optical networks and their components?(SONET/SDH, TDM,WDM,ROADM,RAMAN,WSS, G.709 OTN, FEC, OTN Alarms, OTN TCM, TTI, etc).

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      Hi Alexander, glad you're enjoying these.
      You listed a lot =). That is a big ask. ^_^
      Regrettably, none of the acronyms seem to be within my expertise to teach =/

  • @1Esteband
    @1Esteband 11 месяцев назад

    Excellent presentation. Thank you!

  • @DonatoProce
    @DonatoProce 2 года назад +1

    excellent description - thanks!!

  • @sonyphilipp3345
    @sonyphilipp3345 2 года назад +1

    Brilliant work

  • @ayyapanr
    @ayyapanr Год назад +1

    Hey Ed.. great explanation on ssl stripping. However I am wondering what happens if the MITM strips the HSTS headers on the response traffic in the scenario of Server MITM Client.

    • @rezamirzazadefarkhani6915
      @rezamirzazadefarkhani6915 Год назад

      Great question. Preloading is supposed to partially address this issue by making the very first request in HTTPS. However, Preloading does not scale up to the whole internet. Therefore, if the website is not in the Preloading list and if the attacker can strip the HSTS headers by MITM, then the attack scenario you mentioned is possible.

  • @etpienaar
    @etpienaar 5 месяцев назад

    really well thought out and explained :)

  • @michawojcik1519
    @michawojcik1519 2 года назад +1

    Very informative mate, thanks a lot

  • @Alex-hn3lc
    @Alex-hn3lc Год назад

    Very well explained thank you.🙏

  • @chadsexinton
    @chadsexinton Год назад

    What specifically on the browser does it use to remember that 63M seconds ?

  • @waverache8296
    @waverache8296 2 года назад +2

    Nice explanation

  • @Weaver0x00
    @Weaver0x00 22 дня назад

    I don't understand how 307 redirect is able to make the /end/ client (browser) do anything without sending instructions to that client's /end/, therefore having to get through the mitm. The browser must receive the HSTS header to take any action, that header must go through the mitm to get to the browser, and do so on the initial connection, HTTP, unencripted, meaning mitm should be able to just remove that header from the response.
    And as for HSTS preload, I don't understand that as well. Does it mean that every browser stores static secrets of a number of websites that are required to make HTTPS connection without any negotiation? Isn't that a security risk? And if that's the case, why can't all websites connect immediately through HTTPS?

  • @AliRem
    @AliRem 2 года назад +1

    Perfect !

  • @sushilshiwaniwal
    @sushilshiwaniwal 8 месяцев назад

    Thanks for the shared information.

  • @HubertHeller
    @HubertHeller 2 года назад +1

    Aside from security, how much will it make my website faster?

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +2

      The speed gain is negligible. It could save you a round trip, in certain cases, but the main benefit of implementing HSTS should be security, not speed (that's a side perk).

    • @HubertHeller
      @HubertHeller 2 года назад +1

      @@PracticalNetworking what about HS TS preload? Any speed advantage there?

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +3

      @@HubertHeller Again, there would be a slight advantage (in some cases) ... but speed shouldn't be the main driver of implementing HSTS =).
      For instance, if the user already initiated a session to the https version of the site.. there would be no visible affect to speed whether you implement HSTS and/or preload

  • @AshishMishra-kw2zm
    @AshishMishra-kw2zm 2 года назад +1

    Wow ... Amazing Video ❤️❤️ ... Need session on SDN as well... VMware NSX-T please 🙏🙏

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      Glad you enjoyed it =).
      There are so many videos on my list to make. SDN is going to be a ways back. VMware probably isn't on the list, I'm afraid =(

  • @abdirahmanabdullahi1150
    @abdirahmanabdullahi1150 2 года назад +1

    Ed thank you 😊

  • @subee128
    @subee128 5 месяцев назад

    Thanks

  • @nosajix
    @nosajix 10 месяцев назад

    What about self signed warnings?

  • @DebasishMandal
    @DebasishMandal 3 месяца назад

    great video; thansk!

  • @govindraj1092
    @govindraj1092 2 года назад +2

    Hello Master could you share me STP protocol & FHRP.. Details please

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +1

      I hope to make some STP videos at some point, yes.
      While not explicitly about FHRP, I wrote an article on Gratuitous ARP that touches on how HSRP works, slightly. If you're interested:
      www.practicalnetworking.net/series/arp/gratuitous-arp

    • @pavankumarkj255
      @pavankumarkj255 2 года назад +2

      STP is explained by Keith barker here on YT. Definitely check that out. And always banger video form PN.

  • @munirajulu
    @munirajulu 2 года назад +1

    Thanks Sir 🙏

  • @youssefblt9839
    @youssefblt9839 Год назад

    thanks verry infomative

  • @kornelijekovac9793
    @kornelijekovac9793 6 месяцев назад

    Why all this? Can't they just enforce SSL connection at browser level for all websites?

    • @casper64
      @casper64 5 месяцев назад

      The point is not to protect users but protect your self with encryption. If you use HSTS you can enforce encryption yourself instead of having to rely on the client

  • @fekkon_rasulegando
    @fekkon_rasulegando 5 месяцев назад

    ❤❤❤

  • @BrendaSnead-z7d
    @BrendaSnead-z7d 3 месяца назад

    Enoch Field