Missing HTTP Security Headers - Bug Bounty Tips

Sdílet
Vložit
  • čas přidán 27. 08. 2024

Komentáře • 170

  • @lukor-tech
    @lukor-tech Před 2 lety +234

    You know what I absolutely love?
    The sheer idea, that he can sit at home, with a shirt that wasn't ironed for the google video. I am not saying he didn't try - it's just the audience more focused on the content than the creator.
    I don't know how many will share the thought with me, but here it is.
    Good stuff.

    • @laja6108
      @laja6108 Před 2 lety +1

      True, we live in amazing times

    • @Menaceirl
      @Menaceirl Před 2 lety +28

      I think a large part, if not the vast majority of the audience this video is intended for are likely sitting at home wearing a shirt that was not ironed.

    • @lukor-tech
      @lukor-tech Před 2 lety +2

      @@Menaceirl ha!
      I didn't even had one!

    • @RaduStancaOnline
      @RaduStancaOnline Před 2 lety +1

      This is the curse of being familiar with the content(aka being 1337 h4ck3r), you start to notice things that generaly you would and that would make the video a little bit better.

    • @Zedoy
      @Zedoy Před 2 lety +1

      didn't even notice wow

  • @saadmgdm706
    @saadmgdm706 Před 2 lety +80

    Nothing makes me more happier than seeing this guy.

    • @JimTheScientist
      @JimTheScientist Před 2 lety

      same :D

    • @LeonardoNicchio
      @LeonardoNicchio Před rokem

      @@JimTheScientist
      Tô aqui na casa dele e vou ficar com o cara do carro e ele me disse que vai ser um

  • @Root-uno6nw
    @Root-uno6nw Před 2 lety +104

    Finally some browser security; this is the stuff that really needs to be taught, it’s practical and real world content. Keep these kind of videos up man.

    • @SirKrazzy
      @SirKrazzy Před 2 lety

      Totally agree bro Ahaha nice seeing you here

    • @Root-uno6nw
      @Root-uno6nw Před 2 lety

      ​@@SirKrazzy This is epic, good to see you here too bro!!

  • @phillawrence9741
    @phillawrence9741 Před 2 lety +27

    Missing security headers are usually out scope on bug bounties program. Nice presentation is worth demonstrating.

  • @gFamWeb
    @gFamWeb Před 2 lety +43

    This seems to really boil down to: "if you can't accurately and specifically articulate how something can be exploited, it's likely not actually vulnerable"

    • @TimLF
      @TimLF Před 2 lety +18

      "POC or GTFO"

  • @TheJobCompany
    @TheJobCompany Před 2 lety +39

    here's my typo bounty submission: at 5:55 in the English subtitles there's a typo - it says "doens't" instead of "doesn't"

    • @LiveOverflow
      @LiveOverflow  Před 2 lety +33

      what's your paypal so I can send you your bounty?

    • @TheJobCompany
      @TheJobCompany Před 2 lety +28

      @@LiveOverflow oh, no, thanks, but I only except payments in high quality cybersecurity videos, if that's cool.. so yea, I'm gonna be needing a couple of these instead, ty

    • @bugr33d0_hunter8
      @bugr33d0_hunter8 Před 2 lety

      @@TheJobCompany yeah apps these days are never getting it right. Same with speech recognition, its going to get me locked up one day for printing out the wrong words.

  • @harshrathod2237
    @harshrathod2237 Před 2 lety +7

    This is really crucial to understand that absence of a particular header doesn't mean the web application is vulnerable. Instead one should try to figure out how the absence of that header impacts the application in general or maybe chain that impact to find a realistic security flaw.

  • @makezi7
    @makezi7 Před 4 měsíci

    Thank you for sharing this informative content. It's interesting to note how the previous Systems Administrator at my workplace was strongly in favor of implementing HTTP Strict Transport Security (HSTS) and advocated for team members to obtain Security+ certification. Unfortunately, his misconfigured setup contributed to some security issues, highlighting that HSTS isn't always a critical requirement for website security. This situation underscores the impact of knowledge gaps and how they can lead to misplaced pressures within teams. Additionally, thank you for sharing the CZcams video-it provided valuable insights, even though it was originally shared on Google. We truly appreciate it.

  • @HD_Heresy
    @HD_Heresy Před 2 lety

    I'm new to Cyber Security and have been denying third party application access based on bad results from HTTP header scans, this video has helped me so much thank you!!!

  • @elevatecyber5031
    @elevatecyber5031 Před 2 lety

    Very thought-provoking video! No one else is talking about this.

  • @sayamqazi
    @sayamqazi Před 2 lety +3

    5:33 This is exactly what I was trying to explain to a client that if a 3rd party npm module is being used in a static client size electron app the vulnerabilities reported by npm have ZERO impact because those only apply if the module is being using to process a user provided input in a route handler in a server app.

  • @7guitarlover
    @7guitarlover Před 2 lety

    This is surely one of my favorite Channel on youtube !!!!

  • @jesslopez2494
    @jesslopez2494 Před 2 lety

    Honestly, in the stratus of people out there being "Security Content Creators" L.O. has always come across as a passionate hacker. Even when advertising something, not trying to sell it.
    I appreciate that you aren't a grifter man, because there are plenty in this field.

  • @benjaminnewman3833
    @benjaminnewman3833 Před 2 lety +3

    Vulnerability scanners are brilliant at what they do and its just that, they give you a static output without providing any context, they cut out all the manual crap you have to go through to assess a web apps/infra vulnerabilities. But people seem to use them as gospel when in fact they should be used to determine the posture of that thing you are scanning. If the output you receive shows a bunch of critical and high ratings then it's probably best to either get an actual pen test conducted or you need to start looking at who is developing and either assess their capability at protecting your data or up-lifting sending them on training courses. Too many orgs I go to and consult for just blindly think because they have Qualys or a similar DAST tool that they have "really good security," when in fact they don't understand what the tool is actually trying to show

  • @SeMoDrix
    @SeMoDrix Před 2 lety

    I never knew why i had hsts set up, just did it because it was good practice but never knew how it worked… very informational video, even if it was just for google!

  • @chiragartani
    @chiragartani Před 2 lety +4

    Trust me nowadays people are more interested in this kind of videos I mean bug bounty niche, instead of Buffer Overflow or binary exploitation things. I mean this is what people can easily learn and earn through it.
    Your last Apisix video was amazing too.
    Keep it up, Great video. 👏🌟
    Thank you!

  • @realslimchaggy
    @realslimchaggy Před 2 lety

    I recommand subscribing to bug bounty reports explained for the best bug bounty knowledge

  • @mohitjaswal7657
    @mohitjaswal7657 Před rokem

    Amazing video. Please keep posting such real life examples of how to assess these reports generated by pen testing automation tools!!

  • @ashvinbhuttoo
    @ashvinbhuttoo Před 2 lety

    Web dev here, i actually learned something, great content👌

  • @000t9
    @000t9 Před 2 lety +2

    Love your videos! So much informative!

  • @pentestical8265
    @pentestical8265 Před 2 lety +3

    Great video as always, but I think one thing could be slightly incorrect. Sometimes (at least the last time I checked) authorization headers are automatically submitted by the browser. HTTP Basic Authentication credentials are cached so you don't need to fill out the prompt every time you visit a new page. A CORS misconfiguration in this case could allow data from a user authenticated with basic with to have data stolen. I think the same also applies to client certificate based auth, but I've never tested this one myself.

  • @brymko
    @brymko Před 2 lety +1

    ayyyy nice to see that you also still have the offcon covid wristband on your wrist :P

  • @ReposHaug
    @ReposHaug Před 2 lety +2

    To be fair if we only applied CSP to sites with a known existing XSS, that would be a solid way to broadcast a known issue on your site :)

  • @ThisIsTheInternet
    @ThisIsTheInternet Před 2 lety +2

    English CC @ 8:08 "[todo checj recording]", just FYI

  • @RoterFruchtZwerg
    @RoterFruchtZwerg Před 2 lety +8

    While I do agree with most, I think with HSTS you missed some important points.
    You kinda made it look like HSTS is not really important and sites that use https are fine not setting it. But here I disagree. Setting HSTS is important. We can argue if it's bug bounty level important though...
    First of all, "Browsers do it anyways" is not correct. Browsers will access the site via http if you tell them to. Your experiment was kinda misleading. Your proxy log didn't show a second http request because the browser served the redirect from its cache, not because it prefers https in any way. (devtools will show you it still does an http request)
    The cache can simply be circumvented by adding query parameters or simply requesting an URL you didn't load before. HSTS works for the complete domain (and subdomains!) and is kept even if you clear the cache, while your example of "browser does it anyways" relies on the browser cache, caching headers, correct redirect type and only works for resources you already visited explicitly (exact URL).
    Also, as you stated, HSTS preload exists. While HSTS kinda requires TOFU (Trust on first use), HSTS preload does not. But even without preload, HSTS does a good job for sites that are frequently used by users (e.g. all sites with logins etc).
    Not setting HSTS leaves your site open to MITM attacks (which are not uncommon on open wifis etc), while setting it does a good job in preventing them.
    And in case someone tries to MITM an https request, it will also prevent the user from ignoring the warning and clicking "visit anyways" which probably some would do otherwise.
    So while some security headers really have no benefit at all in some cases, HSTS always increases security.

    • @shinjihirako8598
      @shinjihirako8598 Před 2 lety +1

      excellent points !

    • @_clavita
      @_clavita Před 2 lety

      thanks! so much learning today :P

    • @effsixteenblock50
      @effsixteenblock50 Před 2 lety

      You can enforce HTTPS server-side.

    • @RoterFruchtZwerg
      @RoterFruchtZwerg Před 2 lety +1

      @@effsixteenblock50 you cannot. As long as the client accepts http a MITM can proxy http to https. Only the client can enforce https and that's why HSTS is important.

    • @effsixteenblock50
      @effsixteenblock50 Před 2 lety

      @@RoterFruchtZwerg You're talking about proxying with a tool such as Burp with an installed cert? I know some try to enforce SSL with javascript (a joke - I've had crappy shared hosting providers recommend it). Or are you saying even if SSL is enforced server-side, the client can force a downgrade to http?

  • @The-solo
    @The-solo Před 2 lety

    As always the video is so Informative. I'm a beginner and I'm about to start my bug bounty journey. I must say it helped me a lot.

  • @manuelfrosi2799
    @manuelfrosi2799 Před rokem +1

    Great video, i would have liked that the cache header was also explained

  • @ca7986
    @ca7986 Před 2 lety +1

    What an amazing explanation

  • @leok6717
    @leok6717 Před rokem +1

    Great video!!

  • @anilrp112
    @anilrp112 Před rokem

    Atleast you said it!! So happy

  • @dan-garden
    @dan-garden Před 2 lety

    lookin more like John by the day my dood, keep it up

  • @kamande_john
    @kamande_john Před 10 měsíci

    Great insights. Thank you !

  • @hernanduran4142
    @hernanduran4142 Před 2 lety +2

    I constantly have to deal with customer pentest reports stating I have a vulnerability because I don’t have HTTPOnly on cookies that are clearly non-sensitive.

  • @renakunisaki
    @renakunisaki Před 2 lety +2

    You need to proofread your captions. The tags got eaten, and at one point there's a todo note.

  • @oldGoatMilk
    @oldGoatMilk Před 2 lety

    Great video! I'm going to watch it again, a lot of good information.

  • @OmegaZ2
    @OmegaZ2 Před 2 lety

    Very informational video, thank you as always for the nice content!!

  • @mistercyber1848
    @mistercyber1848 Před 2 lety +1

    love your videos

  • @qm3ster
    @qm3ster Před 2 lety +2

    Is there a reason not to set "Secure" and "HttpOnly" on all my cookies?

  • @PaulFisher
    @PaulFisher Před 2 lety

    In order to make the transition truly seamless you should have also ripped off your festival wristband. What an oversight!

  • @tech3425
    @tech3425 Před rokem +1

    In other words "You don't have to lock your door if there's nothing valuable inside the house"

  • @allslash7540
    @allslash7540 Před rokem +1

    Is there any security vulnerability for server if it exposes the content disposition header?

  • @git-tauseef
    @git-tauseef Před 2 lety

    What an explanation 🙌

  • @gk_eth
    @gk_eth Před 2 lety

    Woww!! Simply loved the quality of the content in this video! looking forward for much more quality content from you ..✌️✌️

  • @Ormaaj
    @Ormaaj Před 2 lety +2

    Yep all good stuff. High-level application level stuff obviously. A ton of that (HSTS, OCSP stapling, HPKP) is largely kludge to mitigate SNI and (much later) ECH coming along far too late with far to much legacy baggage to fully deploy. So we pushed a bunch of workarounds up to the application layer and hope that all of them together are enough to cover our asses long enough for the legacy to become irrelevant.
    Yep this all requires context and it's always complicated context. CORS also makes a bit more sense if you know it historically came around in part as a means of permitting cross-site websocket access (it's a prerequisite really). Both partly a response to uglier "AJAX" type hacks that were required before there was any other means of "inter-tab" communication, that nobody needs to care about anymore.

  • @JuanBotes
    @JuanBotes Před 2 lety

    Thank you for sharing your knowledge and clear explanations \o/

  • @_clavita
    @_clavita Před 2 lety

    i work in a mobile app (that doesnt use webview) and we had a dude reporting to us that we were missing the HSTS, x-frame-options, and others headers that we didnt need!!!! thanks to him we had to delay the production date and it endend ofc being a false positive -_-

  • @OthmanAlikhan
    @OthmanAlikhan Před 11 měsíci

    Thanks for the video =)

  • @887310954
    @887310954 Před 2 lety

    one of the most under estimated security issues, which actually can help a lot

  • @soniablanche5672
    @soniablanche5672 Před 2 lety

    img and form tags ignore CORS policy for backward compatibility I'm assuming ?

  • @TimLF
    @TimLF Před 2 lety

    Just feeding the algorithm here.

  • @mattsionkowski
    @mattsionkowski Před 2 lety

    I found a lack of X-Frame-Options tag and thought I conquered the world. It took tens of hours before I could turn it into anything usable...

  • @cadeathtv
    @cadeathtv Před 2 lety

    hope VA tool guys understand this, they should not be scaring people because of a VA results without understanding

  • @shaheenfazim
    @shaheenfazim Před 2 lety

    Is password input vulnerable to clickjacking considered a vulnerability by Google.

  • @bjorndunderbeck
    @bjorndunderbeck Před 2 lety

    a non related question buut you guys might be able to help me?? my mum in hospital post stroke has wrongly entered her pin to open her ipad so now it is so locked it doesnt even appear when I plug it into her pc. I get how it is supposed to protect a stolen ipad being accessed but I dont understand why her laptop cant talk to it. any ideas on how to get to the pin input stage again? at the moment its just an expensive coaster. oh I know the pin but theres no way to talk to the ipad, it turns on and thats it.

  • @andyelgangster5320
    @andyelgangster5320 Před 2 lety

    Very informative 😎

  • @charlie5tanley
    @charlie5tanley Před 2 lety

    excellent content. thank you.

  • @cuty5372
    @cuty5372 Před 2 lety

    Once you try to deploy an API-Endpoint, you know to hate those headers... Wait, the frontend code that talks to my api works, bit only on Firefox? Because Chrome acts slightly differently with no CORS headers set? Just plain annoying.

  • @jan_en_ik
    @jan_en_ik Před 2 lety +2

    Are you going to make a video about the mc server research?

    • @LiveOverflow
      @LiveOverflow  Před 2 lety +1

      Yes, of course. But it will be a few weeks/months

    • @jan_en_ik
      @jan_en_ik Před 2 lety

      I was also interested why a java object was logged while a normal leave message just logs the name.

    • @LiveOverflow
      @LiveOverflow  Před 2 lety

      Mh I don’t know what exactly you mean. If you send me an email with your question I will check it out :)

    • @Root-uno6nw
      @Root-uno6nw Před 2 lety +1

      @@LiveOverflow I think he means the logj4 vulnerability

  • @umar7110
    @umar7110 Před 2 lety +1

    Great ❤️❤️

  • @yy6u
    @yy6u Před 2 lety +1

    lol the quality difference, its almost as you can tell it been filmed months before :)

  • @lakshanperera9735
    @lakshanperera9735 Před 2 lety

    thank you this video

  • @git-tauseef
    @git-tauseef Před 2 lety

    We would love to have a more systematic video uploads like a series about CTF what you do how you studied ,good resources , just started with picoCTF but unable to solve many crypto , binary like things ....
    Reply much appreciated ❣️❣️ thanks

  • @talalkalai8748
    @talalkalai8748 Před 2 lety

    what would u recommend as the best resource for structured learning all the headers you mentioned, and in-depth http in general ? (something like your THE BEST ON THE INTERNET, HANDS DOWN binary playlist. (am aware of your web hacking playlist))

  • @sobertillnoon
    @sobertillnoon Před 2 lety

    Is this your first time having glasses? I think the ones you chose are nice looking.

  • @arm2644
    @arm2644 Před 2 lety

    Can you please talk about the Expect-CT security header and how it is set right! I cannot find any true worthy information of this header and how it is set right in apache servers!

  • @rivhaaken9763
    @rivhaaken9763 Před 2 lety

    Love it !

  • @alvionjames5925
    @alvionjames5925 Před 2 lety

    Hello can you please do a video about http smuggling request 🙏🙏

  • @chizzlemo3094
    @chizzlemo3094 Před 2 lety

    Great video

  • @takeshikovacs667
    @takeshikovacs667 Před 2 lety +4

    Missing HTTP Security Headers is out of scope 99% of Bug Bounty Programs. It's more a thing about penetration testing reported as good practice information depending of the context. But yeah I agree that many HTTP headers are useless like the X-XSS-Protection (because not implemented in any browser) while some are useful like HSTS or CSP.
    Yeah if there is an XSS and there is HTTPOnly flag you can still then an XHR but you can't leak the cookie. So if the attacker has only a reflected XSS and not a stored one he will have a far less permanent access.
    PS: I know the title is just for clickbait

    • @LiveOverflow
      @LiveOverflow  Před 2 lety +5

      yeah it's out of scope, and still there are many reports about it. So this video hopefully helps those people understand why it's usually not rewarded ;)
      But what's clickbait about the title? The video is about HTTP Security Headers. That's literally the most accurate boring title lol

    • @takeshikovacs667
      @takeshikovacs667 Před 2 lety +1

      @@LiveOverflow I found the "Bug Bounty Tips" clickbaity. Lot of vloger use the word "bug bounty" as a shiny word when it's only general security not specific to bug bounty. The title could have been "HTTP Security Headers real impact" or "HTTP Security Headers - What not to report on Bug Bounty" if you really wanted to use the term "bug bounty". But as I said it is always out of scope of bug bounty so putting it in the title is weird, the title could have been "HTTP Security Headers - Pentest tips" and just saying a parenthesis : HTTP Security Headers are out of scope of BB programs 99% of the time so we'll focus on pentest. But nowaday "bug bounty" is such a trendy word where youg people think they can become rich with it that youtuber use it for every infosec video to get more clicks.

    • @reduced1420
      @reduced1420 Před 2 lety +3

      bro the video was literally made for google to give tips to people using their bug bounty program, shut up lmaoo

  • @hashimmirdad8678
    @hashimmirdad8678 Před 2 lety

    what is the exact difference between ( HSTS, secure attribute)?

    • @huntit4578
      @huntit4578 Před 2 lety +1

      4
      This strategy protects against passive eavesdropping by making it hard for an attacker to trick your user into using something other than SSL to access your site. It also probably ensures that any bookmarks users store will point to the https URLs, which is good. However, HSTS still offers advantages in the event of a man-in-the-middle attack.
      The core of the problem that HSTS tries to solve is that the browser doesn't know whether a given site should be using SSL or not. And most users don't explicitly try SSL first; if they type in a URL, they generally go to the non-SSL http site first, and usually they're just following links. If an attacker can trick your user into going to your site via an http URL and can sit in the middle of the user's traffic (by being their wireless AP, for example), that attacker can launch a man-in-the-middle attack against your site by proxying the user's traffic to your site and presenting the site to the user without SSL (this is a type of downgrade attack). Since the user won't see SSL, their browser won't recognize that the attacker doesn't have a valid certificate for your site and that they're not connecting to your site directly. (A more complicated approach would be to intercept the SSL traffic and present a self-signed or otherwise invalid certificate for your site, but this will normally result in browser warnings.)
      In this scenario, redirecting non-SSL users to SSL or setting the secure flag on cookies doesn't actually help you very much. The man-in-the-middle attacker will be connecting to your SSL site (and proxying the user's actions to it), and will just remove the secure flag from your cookies when passing them along to the user.
      The attacker can, of course, also remove the HSTS header. The point of the HSTS protocol, however, is that if the user had ever successfully gone directly to your site in the past, their browser will remember that your site sent HSTS. If they then later connect to your site and find that it's not using SSL or that the browser can't verify the certificate, the browser will throw an error and refuse to continue. This will prevent the attacker from downgrading your site to non-SSL if the browser supports HSTS and has your site recorded as requiring SSL.

  • @angeloanan
    @angeloanan Před 2 lety +1

    Subtitle broke at 8:08 :

  • @KuopassaTv
    @KuopassaTv Před 2 lety

    Also such headers can be per page, not site-wide 😉

  • @AmgadEmad
    @AmgadEmad Před 2 lety

    All this information is mistaken and not technical gaps and for this reason, this is not considered within the bug buny HANTING system, which is presented by Google

  • @eschoepis
    @eschoepis Před 2 lety

    1-2 year im, I am already hearing google's product mgmt opinion in the intro

  • @NorbertdeRooy
    @NorbertdeRooy Před 2 lety

    I really dislike the HSTS header, I mean why is it a header and not a DNS record, it would be so much simpler and we could disable http all together if it was simply a DNS record.

  • @Amd107
    @Amd107 Před 7 měsíci

    Nice

  • @Valery0p5
    @Valery0p5 Před 2 lety

    The thumbnail xD

  • @myzel394
    @myzel394 Před 2 lety

    13:53 yeah then when should you use HttpOnly? You basically said that the flag is completely useless.

  • @TheWoosh
    @TheWoosh Před 2 lety +2

    The whole video is an advertisement?

    • @LiveOverflow
      @LiveOverflow  Před 2 lety +13

      I explained it in the beginning what the deal with this video is. Also german regulations requires to properly label it in the video as well.

    • @yy6u
      @yy6u Před 2 lety

      yes and no, see his reply, i suggest seeing tom scott video about exactly this kind of disclaimer, its explained there

  • @AtomicBl453
    @AtomicBl453 Před 2 lety

    They don't pay for intentional dev flaws

  • @Thiago1337
    @Thiago1337 Před 2 lety

    I like your shirt, where did you buy it?

  • @fnzip
    @fnzip Před 2 lety

    where's the penguin?

  • @el7440
    @el7440 Před 2 lety

    its all about the context baybee

  • @dummyevil7638
    @dummyevil7638 Před 2 lety

    You have changed.

  • @ocean3323
    @ocean3323 Před 2 lety

    F for old MDN theme

  • @TheKinGG0ld
    @TheKinGG0ld Před 2 lety

    Yay!

  • @oedebiri
    @oedebiri Před 2 lety +1

    enough people do this that google paid to commission a video discouraging them

  • @the_hanged_clown
    @the_hanged_clown Před 2 lety

    2:36 wait....youtube isn't google's website?

  • @x3ICEx
    @x3ICEx Před 2 lety +1

    8:08 [todo checj recording]

  • @GoBzi
    @GoBzi Před 2 lety

    Cookie missing secure flag, server has only 443 open

  • @georgehammond867
    @georgehammond867 Před 2 lety

    somebody is uploading buggy ubuntu 20.04 on my pc al the time, this comes from Ubuntu HQ.
    kernel version 5.13.0-35-generic. very bad indeed.

  • @tommasobarbolani2147
    @tommasobarbolani2147 Před 6 měsíci

    but of * cors *

  • @ELYESSS
    @ELYESSS Před 2 lety

    Should've also changed shirt

  • @duckqlz777
    @duckqlz777 Před 2 lety

    Hey, it seems you are struggling with new content. Please reconsider the direction you are taking your channel. There are a plethora of "hacking" tutorials and ctf videos online and while that may have been your niche it is not what has kept me ingesting your content. When you delve into the esoteric and complex side of programming you not only teach the exploit you are showing but teach new ways to think about memory structures and computing in general. This is especially true of your more explorative videos. As a security researcher there are so many paths we go down that can never be fully followed and within this search may be the best content you could produce. As an example, imagine you wake up thinking "I wonder if there are any bugs in the JPEG standard" (ok this is a silly example but stay with me) so you pull the RFC do a code walk through and test some theories. Now the video and search would likely (hopefully) be fruitless however you would now have a video tutorial that goes in depth with the JPEG standard helping programmers and future researchers that may have a similar idea and now no longer need to waste their time. As programming becomes more obfuscated and systems become larger there will always be more content so it truly saddens me to see someone as talented as yourself make multiple videos saying you are "out of ideas" or "have made all of the videos [you] wanted to make".

  • @ninostephen
    @ninostephen Před 2 lety

    I'm going to post this in our Vulnerability Management Team group. I hate it when they make us report petty header issues without checking the context. I might get kicked for it. But fuck it. - _ -

  • @RaduStancaOnline
    @RaduStancaOnline Před 2 lety +4

    How can we get you to iron your shirts?

    • @x7themm
      @x7themm Před 2 lety +1

      Hack him

    • @1e1001
      @1e1001 Před 2 lety

      @@x7themm hack his iron

  • @mikeyz8775
    @mikeyz8775 Před 2 lety

    The line is discussing n theory is a crime

  • @Ormaaj
    @Ormaaj Před 2 lety +1

    Google has skilled hackers? This is a genuine surprise.

  • @tentaklaus9382
    @tentaklaus9382 Před 2 lety

    You know what's a lot harder to do - build a tool which helps everyone and also avoids to be dangerous when used maliciously.

  • @bellabear653
    @bellabear653 Před 2 lety

    If websites score an F in security headers you cant say this is a good thing. Maybe yeah they can't get an A+ but still.