Sources and Sinks - Code Review Basics

Поделиться
HTML-код
  • Опубликовано: 11 окт 2024

Комментарии • 48

  • @philippetrov4881
    @philippetrov4881 6 лет назад +11

    Learning about "sources and sinks" is a good starting point for understanding the need of using design patterns to achieve secure programming. Great video and good explanation!

  • @AaronSilber
    @AaronSilber 6 лет назад +3

    This is a great explanation. I frequently find myself grepping for potentially unsafe functions when cleaning hacked WordPress sites. Almost nobody has a legitimate use for PHP exec, shell_exec, passthru, or eval, yet almost every packed PHP web shell I've encountered uses some variant for decoding and exploitation.

  • @Weasel_Squeezer
    @Weasel_Squeezer 6 лет назад +16

    "sources" and "sinks" are also common terminology in stream processing among other software engineering related things.

    • @celivalg
      @celivalg 6 лет назад +1

      a good example is pulseaudio

  • @Gelio1234
    @Gelio1234 6 лет назад +24

    By the way, innerHTML is not a function, but a property on DOM elements

    • @LiveOverflow
      @LiveOverflow  6 лет назад +5

      oooops.

    • @Gelio1234
      @Gelio1234 6 лет назад +5

      No worries, I just wanted to mention that :) I believe you have an awesome channel and I have learned a lot. Don't take this as nitpicking :)

  • @flTobi
    @flTobi 6 лет назад +33

    Meinem Schlafrythmus gefällt das

  • @Joshverd
    @Joshverd 6 лет назад +1

    Very interesting. I do this a lot and never knew the name of the method! 🤔

  • @taba1950
    @taba1950 6 лет назад +1

    In electronics and control they are used to explain if the device is connected between the controller/processor and ground or Vcc

  • @justanormalperson
    @justanormalperson 6 лет назад

    these videos are so useful for learning new stuff

  • @martinp.4797
    @martinp.4797 6 лет назад

    Backwards > all !!! When you were young and you got the game with multiple wire and 1 solution, I just followed from the end the wire to know the solution !

  • @begrateful3405
    @begrateful3405 4 года назад

    wäre dann die IF anweisung mit exit ein Sanitizers. Muss nächste Woche präsentation über Code tainting halten

  • @fosatech
    @fosatech 6 лет назад

    Great video! Thanks again

  • @domaincontroller
    @domaincontroller 3 года назад

    Excellent !

  • @yuyuko_s75
    @yuyuko_s75 6 лет назад

    Hold shift right when the linux OS starts to get into grub, then go into advanced options, then recovery mode and go into the terminal as root. Then you have access to all the files and rm -rf / does not require a sudo, but there's no gui.

    • @yuyuko_s75
      @yuyuko_s75 6 лет назад +1

      I'm a local server guy, I use Ubuntu because it's nice to use with my server.

    • @floriandaler5327
      @floriandaler5327 6 лет назад +3

      Lassigamer Three things: Idk which Version of Ubuntu u use, but with 16.04 you get prompted the root password when booting into recovery mode for a shell . Second, rm -rf / doesn't work for known reasons, you have to pass --no-preserve-root to delete / . Third, if someone has physical acess to a PC with a malicious intent, you are clearly fucked. In GRUB, the attacker could add init=/bin/bash to the Kernel cmd line, and voilà, you are booting straight into a root Shell. Or He could use a live CD / remove the HDD to add a backdoor / change the root pwd or add other privileged users, 2nd of which might be less obvious.
      PS: sry for my Bad spelling, i'm from Germany and only 16 y/o

  • @emmsthefemms
    @emmsthefemms 3 года назад

    i like to think of the sinks as consumers of the data generated from sources. e.g. event listeners

  • @FahadAlQallaf
    @FahadAlQallaf 6 лет назад

    Great video, thanks .

  • @MrJvdAli
    @MrJvdAli 2 года назад

    today I got an interview call and after an introduction they asked my experience in java after that they asked "and sunk security "where i replied "I am not familiar with that term " and that's it . I rejected . but my point to comment here is this topic/term "sunk security" so common in IT?, please someone guide me , i am getting curious to understand this topic which i never encounter in my past but everybody know about this . is this come under testing category in software field. did i understand correctly ?

  • @punitdarji1871
    @punitdarji1871 6 лет назад

    Such a great video...

  • @MrMartinZockt
    @MrMartinZockt 6 лет назад

    Bei 0:54 habe ich die ganze Zeit überlegt was dieser schwarze Fleck bedeutet. Bis ich aus dem Vollbild raus bin und gemerkt habe, dass das "i"-Icon hinterlegt werden sollte. Aber bei einem Monitor mit 21:9 ist das Icon ausserhalb vom Video =P

    • @LiveOverflow
      @LiveOverflow  6 лет назад

      Oh guter Tipp. Vllt mache ich das nicht mehr

  • @santypk5
    @santypk5 6 лет назад +1

    Can you post the link to the github repo with sinks for domxsss?

    • @liquidtags
      @liquidtags 6 лет назад

      Simple google search... that's all it took

  • @tonipejic2645
    @tonipejic2645 6 лет назад

    why is there a weird whisper at 7:18 lol and i think i've heard one before too but i've ignored it. It kinda sounds like a german word "oder" which means "or" and you've said or afterwards, and I know that you are german so maybe you've said oder instead of or and then edited it but it's still here somehow. Why am I even thinking about this xD

    • @tonipejic2645
      @tonipejic2645 6 лет назад

      probably, yeah. I just like to think too much about non important things

  • @Yotanido
    @Yotanido 6 лет назад +2

    PHP has a regex match function that can execute code...
    The more I learn about PHP, the less I like it. It's like they are TRYING to make it insecure. I mean, come on.
    Or if the file passed to the PHP interpreter can't be found, just take the closest one. WTF PHP.

  • @IIAOPSW
    @IIAOPSW 6 лет назад

    Just use the Divergence Theorem

  • @Himanshu-yb9kz
    @Himanshu-yb9kz 6 лет назад

    Where i can get the starting tone?

  • @punitdarji1871
    @punitdarji1871 6 лет назад

    Make a video from where person can start learnexploits like hacking, penetration testing etc

  • @abiralshrestha2998
    @abiralshrestha2998 6 лет назад +2

    4:28 ... i heard echo

  • @planktonfun1
    @planktonfun1 6 лет назад

    what is the concept of regex, I can do it, but I can't really explain it very well to anyone

    • @MrAntiKnowledge
      @MrAntiKnowledge 6 лет назад +2

      regex= regular expression. It's a way to filter strings which match a certain pattern.
      A pretty basic example: "^Hello [a-zA-Z]+\." matches if the String starts(^) with "Hello " followed by a character between a-z or A-Z *once or more*(+) and ends with a fullstop (the "\" removes the special meaning of ".")
      The program checks the String character by character if it matches the given expression and stops if it hits any character that does not match (String doesnt match pattern) or reaches the end of the expression (String matches pattern)
      It's basicly just a syntax to tell the program what kind of pattern you are looking for in the String.
      You can visit regex.com to play around with it and get all the special characters and short explainations what they do.

    • @planktonfun1
      @planktonfun1 6 лет назад

      MrAntiKnowledge Great explanation! but I think its not enough for people to understand it clearly and completely, I might try to make a code equivalent for each regex samples, which is a lot of work. :(

    • @MrAntiKnowledge
      @MrAntiKnowledge 6 лет назад +1

      Well it depends on who you want it to explain to and for what reason. Maybe you could try explaining it as kind of a advanced version of a wildcard (*.txt) since that seems to be something even techilliterate people are sometimes familiar with.
      If you audience is more techliterate you could use finite state automatons to explain it.
      Or are you more interested in the actual implementation of the "matching".

    • @planktonfun1
      @planktonfun1 6 лет назад

      The actual implementation of matching, from quantifiers matching to lookahead captures and recursion capture, I would say the audience and tech literate programmers, they also use linux but not so much for the grep, sed and other stuff with reg expression. The reason is so that not many people interrupt me with regex questions while working. Teach a man a fish and they will eat everyday as they say.

  • @Rednesswahn
    @Rednesswahn 6 лет назад +1

    #sourcesandsinks

  • @brian-pf5dk
    @brian-pf5dk 6 лет назад

    4:55 komma ? that must be a german :P

  • @zedd-x8171
    @zedd-x8171 6 лет назад

    First one 💪

  • @chasewnutpistachio
    @chasewnutpistachio 5 лет назад

    who else come here for sink & source in plants?? 🤓

  • @arsen3783
    @arsen3783 6 лет назад

    hi

  • @harshakumar8970
    @harshakumar8970 6 лет назад

    Can't wait for the "first" comments...

  • @zsdanix
    @zsdanix 6 лет назад

    Not considered on topic or good, classic stackoverflow. Not letting good questions live :(

  • @karibikals4574
    @karibikals4574 3 года назад

    Bruh I came here for plants

  • @Zzznmop
    @Zzznmop 6 лет назад

    taint analysis huh, not sure about this field.