2021 OWASP Top Ten: Cryptographic Failures

Поделиться
HTML-код
  • Опубликовано: 12 янв 2025

Комментарии • 12

  • @ruthfehilly8640
    @ruthfehilly8640 2 года назад +7

    Really really good videos. Quick and to the point

    • @devcentral
      @devcentral  2 года назад

      Thanks Ruth! Glad you enjoyed them and we appreciate the comment!!

  • @juliozaelsantillanruiz8997
    @juliozaelsantillanruiz8997 2 месяца назад

    Very clear, thanks man, nice video 👍

  • @covfefe2936
    @covfefe2936 Год назад +2

    Amazing video!! Love this straight forward format easy to remember

    • @devcentral
      @devcentral  Год назад

      Thanks for the comment and glad you enjoyed the video!!

  • @EasyPickens999
    @EasyPickens999 2 года назад +2

    Hi, first of all many thanks for the videos. In your first example you mention to avoid auto-decryption. Do you mean between the DB and the app? In the case of a user querying CC numbers, you would eventually need to decrypt, would this be done in the app?

  • @skselim8536
    @skselim8536 2 года назад +2

    Awesome 🌟

    • @devcentral
      @devcentral  2 года назад

      Glad you liked it and thanks for the comment!

  • @vishaliselvaraj1340
    @vishaliselvaraj1340 4 месяца назад

    perfect
    sir!

  • @BhargavRajaram
    @BhargavRajaram 2 года назад +4

    These guys have just narrated what's there on OWASP website.

  • @hammasahmed5592
    @hammasahmed5592 2 года назад

    Failure, I was expecting a failure in the algorithm that would lead to data exposure, not a failure in cryptographic setup.
    The good point its the downgrade attack, if it's possible to downgrade a version of cryptos, this would actually be a failure.

  • @seyedmohammadmortezasanaie8346
    @seyedmohammadmortezasanaie8346 Год назад +2

    Your explanation was very bad. This beautiful type of attack could have much better examples 👎