I'm disappointed you didn't cover the most basic hacker tactic - typing really fast while listening to electronica music. The faster a hacker types, the more l33t they are, and the more hacks they hack.
Great episode! I'm in a class called Defense Against the Dark Arts this semester where we're studying cyber attacks and this episode was a great overview! Keep it up!
@@youtubeaccount0x073 there are spam out there claim to be the Nigerian prince.. He need you to transfer some amount of money to collect royal fortune.. The email is quite funny actually
As someone who self-taught programming and hacking, this video really surprised me in how plainly and coherently it expressed relatively advanced concepts like SQL injection. This course should be required in schools lol
I'm not certain if this was pointed out already or not, I just wanted to add a clarification. Zero Day Exploits are generally only errors that exist in a system "as shipped" in that a system will be vulnerable at Day Zero of run time. The difference being that patches and updates can include additional errors and exploits down the road. It's a small difference and doesn't detract from what's being said. I just felt the need to add in.
skyler vanderpool I never understood that kind of thinking. "We'll teach you about comp sci but we won't fully explain hacking because you might become a hacker'. The knowledge itself isn't evil, like they ironically pointed out by mentioning white hats
Dean Cutler well this was enough to show people how to think like an attacker. Not to mention most of the times those attacks don't work anymore. Buffer overflows, heap overflows and so on were much more prevalent 10 years ago. Now you usually have to chain exploits together to get anywhere. A very fascinating technique to get around DEP / W^X is return oriented programming / return-to-libc. But I digress.
If you think any thing you saw in this will lead to a successful breach I’d love to know. Everything short of social engineering is pretty much the most crude example so you get the idea. It really is true that most hacking is done by calling up random in the company and saying “Hello, this is the password inspector, your account has come under audit. I need you to do some things for me...”
Yea, or the more often call (in bad broken english with Indian or Pakistani accent and with traffic noise in the background as if the call is being made form a corner internet cafe): 'This is XXXX from Microsoft support. We have detected that you have a problem with your computer... ' (Most hilarious when you have not had a windows PC for more than 5 years). Has happened for me at least 3 times and I live in Denmark, so the bad English is often a dead giveaway.
I think they usually say that mostly because you don't just teach hacking in a single, 12 minute video lol. I studied for the CEH for about a year before I could pass that test and I still can't hack anything that isn't deliberately weakened to be vulnerable.
Thanks for mentioning social engineering. I get so frustrated when people don't protect their credentials and then say they've been hacked, as if to no fault of their own.
Saberus Terras sneakers was awesome, except the crypto stuff was completely wrong, but that is my hindsight after I attended a cryptography lecture a few years ago
I'm assuming the SQL injection script is wrong intentionally. Well done CrashCourse. Programmers, pro tip, always use parameter based query statements for your dynamic queries, not string concatenation.
Me Before watching this video: Meh The update can wait and my antivirus will just automatically notify me if there is a malware or trojan or virus Me After Watching this video: *Checks if there is an update every 1 hour* and *constantly does full scans on my antivirus software*
The example SQL injection will cause a syntax error because of the remaining single quote. The text being injected should have included a comment symbol at the end (--) to comment out any SQL that would have come after the injected text.
Recognizing the animations in these videos is always fun. I'm not going to risk a spoiler and will withhold where the white hat and black hat cowboys come from. But it says alot about the perception and self perception of white and black hat hackers
The username / login part where a query gets entered to exploit data, but limit on the number of characters allowed in the username field cannot prevent that ? A query to look up (with a condition) usually has: SELECT (6) FROM (4) WHERE (5) This becomes 15, considering each column name is just 2 letter even then it becomes 2*3 = 6. 15+6 = 21 Characters. If only A-Za-z1-9, with a max length of 15 we could say we have 122,131,734,269,895 unique combinations if I am not wrong!
That single quote at the beginning of your SQL injection shouldn't be there. The way you wrote it, it would be parsed as (''whatever'; DROP TABLE users;') and would surely give a syntax error without causing any damage. The user name should be whatever'; DROP TABLE users;' . Notice the lack of the initial quote
I've experienced a hacking attempt (through malware) one time, and it's so scary. Suddenly all kinds of pictures were being downloaded on my laptop while I wasn't doing anything. I turned off my laptop so fast... After that I started deleting all the suspicious looking files and I've run a malware hunter for about 8 times so I was sure nothing was left. I don't know if I did it right, but I never experienced anything like that again.
"The stereotypical view of a hacker is some unpopular kid sitting in a dark room full of discarded pizza boxes". Umm, that describes me perfectly, and I code and program for fun...
5:29 "Arbitarily" - british slang I don't know about? Great info tho! Especially appreciate the emphasis on social engineering and the indfo about NAND mirroring!
Ohh, my computer's CPU usage is always 100%, not even 99% but just 100%. When I build it, the CPU usage used to be around 5%! I have fairly powerful CPU ryzen5 3600X, and I feel that it is Botnet attack. I didn't know that before watching this vide, thanks!
Hmm, using a username and password field for the buffer overflow example could be a little confusing and misleading. Of course a real buffer overflow is more complicated to explain, but one could misconstrue that example and take it literally and think that hackers can break into a system just by typing long passwords. At least it is simple and understandable as an example.
White hat is the name of an item in rocket league only given to people who are good and let the people of the company know of hacks and glitches that people can do. This is the rarest item in rocket league and the price to get one from one of the people that got it is over 100 dollars. The owners of the game quickly patch glitches and hacks up and give the people that advised them a white hat. To this day there are only about 10 hats given to people and it is a legendary honor to ever equip one of those hats on your car.
I hope one day rocket league adds a black hat item into the game- an item that only the malicious and bad people can get. Then the item would be permanently equipped to their car and rocket league would find all the accounts this single person has and equip black hats to them. I think that would be very cool.
I could understand not correctly terminating the SQL injection text with "--", which denotes the rest of the text being an SQL comment and gets around the issue of that dangling '; on the end... ... but the real way to protect against SQL injection isn't to restrict the characters that a user can enter, or to attempt to sanitise the input (are you sure you're always doing it? Always using the same method? Are you covering all the possible gotchas ? If translating to a different format is the reverse operation always used on output as needed?). No, it's to use a prepared statement so that you're not naively building a string for the command, but instead denoting where there will be input and then passing that input separately. $query_password = $db->prepare('SELECT password FROM users WHERE user = ?' $password = $query_password->execute($input_user) This will result in the query effectively being: SELECT password FROM users WHERE user ="'whatever'; DROP TABLE users;" and, assuming there's no user called ""'whatever'; DROP TABLE users;", it will simply result in "no user found". Note that, no, you can't just put double-quotes (which I only used to make the above line clear) in the user field to get around this as it works by telling the database that the thing to match against for "user = ?" is literally "what's in this buffer", no quote-delimiting going on.
That is not to say that input sanitisation shouldn't be performed. You'd want to at least do some sanity check on the length of the input from the form fields, for example. But denying "special characters" in passwords is just narrowing the possible selection of passwords.
Makes things a lot easier to administer and you can aggregate data about distributed systems easier. Connecting vital infrastructure over the Internet isn't necessarily bad... the problem arises when systems that were NEVER intended for these environments are now being used in them.
+Vandrithable To be fair, in places like the US a lot of those infrastructural systems were never designed with such vulnerabilities in mind and the costs in terms of manhours and money to upgrade them are far from insignificant leading to very slow progress on doing so leaving such potential vulnerabilities in place in the mean time.
+Mike Meyer When TCP/IP was being first designed back in the '70s, Cerf and Kahn apparently wanted to include encryption at the packet level, but on top of significant technical issues (computing speed during the era and the need to keep it from interfering with other computing tasks among them) there were concerns from DARPA and the NSA, among other government interests, about deploying such tech on a public or commercial network which even then seemed like it'd be part of the future uses of such tech. Such concerns, while understandable in the geopolitical climate of that era, are a major reason security got pushed to the end user (both server and client side) rather than where it belongs embedded in the protocols themselves. That aside there was plenty of thought toward security from the '60s through '80s, but it was from a more military focused mindset and concerns about someone with legit access to and working knowledge of these networks committing malicious acts didn't even really come up until the late '80s when Morris made his worm.
Barnard Rabenold "Who thought it would be a good idea to hook up vital systems to the internet?" Lol, DARPA. To be fair, they never planned to use the internet for NON-vital systems, so...
then there are the state reps that can just hack in whenever they want to because they can i am not to pissed off at the state rep for doing that just more annoyed especially since he knows the NSA is interested in me thx for this awesomely ha bisky vid i love this series
I'm disappointed you didn't cover the most basic hacker tactic - typing really fast while listening to electronica music. The faster a hacker types, the more l33t they are, and the more hacks they hack.
Osiris Malkovich this channel is to give people basic technical knowledge of computers, that hacking technique is way too advanced for this video.
being in a dimly lit room gives you moar performance, so does wearing a leather jacket
Lulz
can you hack
xXx_HamSandwich123_xXx
r/woooosh
Great episode! I'm in a class called Defense Against the Dark Arts this semester where we're studying cyber attacks and this episode was a great overview! Keep it up!
Drew Lytle
Wait
Hol up.
Aahh?
Best class name ever!
Aww man. I really thought that I was friends with a Nigerian prince.
IKR
all foreigner are not rich
TofuTerror I don’t get it???
@@youtubeaccount0x073 there are spam out there claim to be the Nigerian prince.. He need you to transfer some amount of money to collect royal fortune.. The email is quite funny actually
NEVER BE A HACKER THAT IS BAD
"cyberwarfare" is great, but tbh, it's a missed opportunity to call it "world war web"
Computer science student here. I have to say y'all really do take accuracy seriously. I really appreciate that.
Where you from
@Glass Where you from
@Glass Where you from
@Glass daaaaaaaaaamn XD
1:43 fake phishing mail. No spelling errors.
@wrainexc1 "We have _recieved_ notice . . . " (should be "received").
hi Im a nigerian prence
Received is spelt wrong lol and not ALL phishing mails have spelling errors aha it really depends who sends it
Also discrepency
KingsleyIII 🧐👏👏👏
"Like John Green in College" he's going to need medical attention for that burn
Someone should let Healthcare Triage know.
I am really enjoying this series and I'm old enough to have punched cards and paper tape. Thank you for your time.
As someone who self-taught programming and hacking, this video really surprised me in how plainly and coherently it expressed relatively advanced concepts like SQL injection. This course should be required in schools lol
sql injection is advanced?
Bob Bob Well considering the video is a tutorial, meaning most likely directed at those with little knowledge, then for the target audience, yes.
I'm not certain if this was pointed out already or not, I just wanted to add a clarification. Zero Day Exploits are generally only errors that exist in a system "as shipped" in that a system will be vulnerable at Day Zero of run time. The difference being that patches and updates can include additional errors and exploits down the road. It's a small difference and doesn't detract from what's being said. I just felt the need to add in.
"we're not going to teach you how to hack" this is the most clear explanation of hacking ive seen.
skyler vanderpool I never understood that kind of thinking. "We'll teach you about comp sci but we won't fully explain hacking because you might become a hacker'.
The knowledge itself isn't evil, like they ironically pointed out by mentioning white hats
Dean Cutler well this was enough to show people how to think like an attacker. Not to mention most of the times those attacks don't work anymore. Buffer overflows, heap overflows and so on were much more prevalent 10 years ago. Now you usually have to chain exploits together to get anywhere. A very fascinating technique to get around DEP / W^X is return oriented programming / return-to-libc. But I digress.
If you think any thing you saw in this will lead to a successful breach I’d love to know.
Everything short of social engineering is pretty much the most crude example so you get the idea.
It really is true that most hacking is done by calling up random in the company and saying “Hello, this is the password inspector, your account has come under audit. I need you to do some things for me...”
Yea, or the more often call (in bad broken english with Indian or Pakistani accent and with traffic noise in the background as if the call is being made form a corner internet cafe):
'This is XXXX from Microsoft support. We have detected that you have a problem with your computer... '
(Most hilarious when you have not had a windows PC for more than 5 years).
Has happened for me at least 3 times and I live in Denmark, so the bad English is often a dead giveaway.
I think they usually say that mostly because you don't just teach hacking in a single, 12 minute video lol. I studied for the CEH for about a year before I could pass that test and I still can't hack anything that isn't deliberately weakened to be vulnerable.
I loved the XKCD reference to johnny droptables
Pamgin Little Bobby Tables!
Surprise voice cameo by Emily Graslie! Nicely done.
+
Thanks for mentioning social engineering. I get so frustrated when people don't protect their credentials and then say they've been hacked, as if to no fault of their own.
Anyone else notice "Ghost in the Wires" on the shelf? The attention to detail in this series is tremendous... well done.
Wait....are you saying the movie Hackers wasnt realistic?!
microbuilder well. In hackers they showed a few things that were real (like phreaking). So it was more realistic than others, to be fair.
Sneakers was much closer to reality.
The Matrix Reloaded had more realistic hacking than that movie. I’m not even being hyperbolic.
Hackers was a fun movie, I had completely forgotten about Sneakers...
Saberus Terras sneakers was awesome, except the crypto stuff was completely wrong, but that is my hindsight after I attended a cryptography lecture a few years ago
Me : Clicks on the hacking video from cc to hack
Carie : "We are not gonna teach u that"
Watching this again after one year, and it's still the best for me!
The man in Black from Westworld in the thumbnail 👍
Yay, new Crash Course episode!
Oh wait, hang on, I've got an email from the Prince of Nigeria.
oh wow, that old Mac in the background lol. great episode, even though it was 6 years ago helps with understanding the basics.
That XKCD reference made me laugh so hard!
I'm assuming the SQL injection script is wrong intentionally. Well done CrashCourse. Programmers, pro tip, always use parameter based query statements for your dynamic queries, not string concatenation.
9:44 Microsoft seems to be doing a good job with its 24/7 updates.
Love the XKCD reference.
I have an IT test on Thursday. Completed this series in a week. Much confident now ! Thanks !
Me Before watching this video: Meh The update can wait and my antivirus will just automatically notify me if there is a malware or trojan or virus
Me After Watching this video: *Checks if there is an update every 1 hour* and *constantly does full scans on my antivirus software*
The example SQL injection will cause a syntax error because of the remaining single quote. The text being injected should have included a comment symbol at the end (--) to comment out any SQL that would have come after the injected text.
Honestly comparing the internet to the Wild West seems to make sense more the more I learn about cyber security
Recognizing the animations in these videos is always fun.
I'm not going to risk a spoiler and will withhold where the white hat and black hat cowboys come from. But it says alot about the perception and self perception of white and black hat hackers
Wow, randomly clicked on this video with no background whatsover. So interesting
Thanks
The username / login part where a query gets entered to exploit data, but limit on the number of characters allowed in the username field cannot prevent that ?
A query to look up (with a condition) usually has:
SELECT (6)
FROM (4)
WHERE (5)
This becomes 15, considering each column name is just 2 letter even then it becomes 2*3 = 6.
15+6 = 21 Characters.
If only A-Za-z1-9, with a max length of 15 we could say we have 122,131,734,269,895 unique combinations if I am not wrong!
That single quote at the beginning of your SQL injection shouldn't be there. The way you wrote it, it would be parsed as (''whatever'; DROP TABLE users;') and would surely give a syntax error without causing any damage. The user name should be whatever'; DROP TABLE users;' . Notice the lack of the initial quote
And that's why I need to study more SQL XD I didn't even catch that error.
The rest of the video was awesome though. I was quite impressed.
I've experienced a hacking attempt (through malware) one time, and it's so scary. Suddenly all kinds of pictures were being downloaded on my laptop while I wasn't doing anything. I turned off my laptop so fast... After that I started deleting all the suspicious looking files and I've run a malware hunter for about 8 times so I was sure nothing was left. I don't know if I did it right, but I never experienced anything like that again.
Turning off the connection is also a good idea.
And now I shall look at the "remind me tomorrow" option of mac updates in a different light
She spoke about upcoming cyber warfare, and in 2022 here it is!
Was that an XKCD reference with the stick person because you're talking about sanitizing your input fields?
Ya
A
"Sanitizing input" will not work if you forget it just once. And not allowing special characters sound pretty "fake line of defence".
I just turned my anti virus on after watching this video. Thanks for awareness on cyber security, and great video as well!
2:34 Oh no! You should take that call and check your settings. Lol
leuke video lil pump ga zo door schat.
7:50 is actually technically incorrect. The username would **not** start with a '.
Just a small quibble :)
You should give link of previous or when available next video link in description
Drop Tables. We call him Bobby Tables
XKCD is lovely
This is amazing! Thank you
"The stereotypical view of a hacker is some unpopular kid sitting in a dark room full of discarded pizza boxes". Umm, that describes me perfectly, and I code and program for fun...
Love the Westworld reference
NIce video! Your SQL injection won't work though, there's a single quote at the start of the username. It'll stop listening after that.
What a beautiful Carrie Anne in this episode :)
Bobby tables strikes again!
Oh wow such an obscure reference, no one has ever read an xkcd comic ever, so edgy!
I'm a little surprised there was no mention of Defcon.
... they did last episode.
I'm a big fan of your. Love yoyr teaching methodology and love you.
2:30 those damn canadian hackers.
Lol!
Sounds more like Alaska or ND
(I'm from Toronto)
Everybody gangsta till the Indian man downloads a rat on your windows 69
5:29 "Arbitarily" - british slang I don't know about? Great info tho! Especially appreciate the emphasis on social engineering and the indfo about NAND mirroring!
"Oh yes, Little Bobby Tables, we call him." (Thumbs up if you know the reference)
I know the reference, xkcd is an overrated piece of poo. And I didn't thumb up your comment, quite the opposite. Kid.
totalnastoka you must be fun at parties
Ye.
You know the thumbs down button does nothing, right?
Mrs Roberts visible at 7:40
Love this series.
Respect for you sister genius. 😊😊😊😊☺
Ohh, my computer's CPU usage is always 100%, not even 99% but just 100%. When I build it, the CPU usage used to be around 5%! I have fairly powerful CPU ryzen5 3600X, and I feel that it is Botnet attack. I didn't know that before watching this vide, thanks!
Awesome job on this video! :)
Hmm, using a username and password field for the buffer overflow example could be a little confusing and misleading. Of course a real buffer overflow is more complicated to explain, but one could misconstrue that example and take it literally and think that hackers can break into a system just by typing long passwords. At least it is simple and understandable as an example.
Been waiting for this!!!
This is really helpful for me, was about to make user login that is vulnerable to code injection 😂
Nasx always sanitize your inputs. XSS is still one of the most common vulnerabilities.
As of the time of posting, the PBS KODI PBS Application does not have this episode.
White hat is the name of an item in rocket league only given to people who are good and let the people of the company know of hacks and glitches that people can do. This is the rarest item in rocket league and the price to get one from one of the people that got it is over 100 dollars. The owners of the game quickly patch glitches and hacks up and give the people that advised them a white hat. To this day there are only about 10 hats given to people and it is a legendary honor to ever equip one of those hats on your car.
I hope one day rocket league adds a black hat item into the game- an item that only the malicious and bad people can get. Then the item would be permanently equipped to their car and rocket league would find all the accounts this single person has and equip black hats to them. I think that would be very cool.
There are two kinds of organizations. Those who know that they're security has been compromised... and those who don't know.
thank you it's great video, well done
I could understand not correctly terminating the SQL injection text with "--", which denotes the rest of the text being an SQL comment and gets around the issue of that dangling '; on the end...
... but the real way to protect against SQL injection isn't to restrict the characters that a user can enter, or to attempt to sanitise the input (are you sure you're always doing it? Always using the same method? Are you covering all the possible gotchas ? If translating to a different format is the reverse operation always used on output as needed?). No, it's to use a prepared statement so that you're not naively building a string for the command, but instead denoting where there will be input and then passing that input separately.
$query_password = $db->prepare('SELECT password FROM users WHERE user = ?'
$password = $query_password->execute($input_user)
This will result in the query effectively being:
SELECT password FROM users WHERE user ="'whatever'; DROP TABLE users;"
and, assuming there's no user called ""'whatever'; DROP TABLE users;", it will simply result in "no user found". Note that, no, you can't just put double-quotes (which I only used to make the above line clear) in the user field to get around this as it works by telling the database that the thing to match against for "user = ?" is literally "what's in this buffer", no quote-delimiting going on.
That is not to say that input sanitisation shouldn't be performed. You'd want to at least do some sanity check on the length of the input from the form fields, for example. But denying "special characters" in passwords is just narrowing the possible selection of passwords.
0:34 Westworld reference! :D
good video. thanks
But updates take so long or fill up storage...
But What If You Get A Fake Update For Fake Security? How Do You Tackle That?
very helpful thank you
Why did you mention bitcoin mining as a usage for a botnet? It’s ridicules as the current hash rate needed is way much bigger than botnets.
Who's idea was it to connect vital infrastructure through the Internet anyways? It seems like common sense to not do that.
Makes things a lot easier to administer and you can aggregate data about distributed systems easier. Connecting vital infrastructure over the Internet isn't necessarily bad... the problem arises when systems that were NEVER intended for these environments are now being used in them.
+Vandrithable To be fair, in places like the US a lot of those infrastructural systems were never designed with such vulnerabilities in mind and the costs in terms of manhours and money to upgrade them are far from insignificant leading to very slow progress on doing so leaving such potential vulnerabilities in place in the mean time.
+Mike Meyer When TCP/IP was being first designed back in the '70s, Cerf and Kahn apparently wanted to include encryption at the packet level, but on top of significant technical issues (computing speed during the era and the need to keep it from interfering with other computing tasks among them) there were concerns from DARPA and the NSA, among other government interests, about deploying such tech on a public or commercial network which even then seemed like it'd be part of the future uses of such tech. Such concerns, while understandable in the geopolitical climate of that era, are a major reason security got pushed to the end user (both server and client side) rather than where it belongs embedded in the protocols themselves.
That aside there was plenty of thought toward security from the '60s through '80s, but it was from a more military focused mindset and concerns about someone with legit access to and working knowledge of these networks committing malicious acts didn't even really come up until the late '80s when Morris made his worm.
He never claimed to have invented the Internet.
www.snopes.com/quotes/internet.asp
Barnard Rabenold "Who thought it would be a good idea to hook up vital systems to the internet?"
Lol, DARPA.
To be fair, they never planned to use the internet for NON-vital systems, so...
Hi I just embed this video and the previous one. thanks
can we a have an episode on bitcoins?
DO NOT LOAD THE CURRENT IPHONE OS UPDATE! None of my apps connect to their severs now.
Great teacher!
the majority of hacks are socially engineered . . .
So you are telling me that for all this time I could have put billions of '1's in the password field to gain adming access to a website
Hey, is there a web which tracks cyberattacks in real time?
Understood most 😁
"Describe John Green in college." HAHAHAHAHAHA
0:55 Damn, came at his life xD
Hi, i learnt something from your videos, but the speed you talk is too fast especially for someone who is very new to all cyber security
So that email with only one word was bad?
When she said "John Green "!!😀😄😍
so glad they didn't mention russian hackers
4:34 Where I started to get lost lol
8:53 No need honey, we already know how to
Imagine a Call of Duty Cyber Warfare, how would the gameplay be?
Not trying to gain access or anything. Just saying you look nice in that top.
Whoa is that a creeper figurine? *like*
Hacking is hard to counter, but some hackers were employed by companies to determine their system's vulnerabilities.
Thankfully a crash course video where the presenter doesn’t speak at a hundred miles an hour and stops to take the occasional breath.
then there are the state reps that can just hack in whenever they want to because they can
i am not to pissed off at the state rep for doing that just more annoyed especially since he knows the NSA is interested in me
thx for this awesomely ha bisky vid i love this series
if you want to be hackers there is a book that touch dome of the basics of being a jacker called "Hacking the art of exploitation"
Hey can you please send me the link of your thumbnail of this video.
Thank you!
aap kis aap se edit krte ho