Channel Avatar

Chris Dale @UC-C8XBu7dkHVYTrhs7O95dw@youtube.com

2.6K subscribers - no pronouns :c

This is Chris Dale's YouTube video. This is where I create v


06:01
Cloud Under Siege: How Hackers Exploit Developers, Data Scientists, and Weak Security Practices
06:00
Credential Stuffing: Hacking Without Being a Hacker
02:51
Overlooked Feature to Test on WordPress - Source of MANY Bug Bounties
01:02
Web Application Pentesting is Boring?
02:27
Uncover Hidden Vulnerabilities Business Process Testing Strategies
03:19
The First Step: Understanding the Help of CLI
01:16:34
Web Application Penetration Testing - A Practical Methodology
20:09
Favorite Cyber Security Tools - Chris Dale's Top 4
11:56
Bastard scammer doing his best to dox me - Crypto investment scam gone wrong
11:30
Infosec Mentoring & Learning from ATT&CK Framework
00:40
"Do you know any other words than `No`?" - No... Annoying scammers trying to scam #shorts
21:23
Practice and prepare for Incident Response - 35+ scenarios included
12:22
Start Learning PowerShell - Essential Commands - Demos included
22:19
How to document Penetration Testing Findings
06:53
New Burp Suite Wordlists + Update Channels
17:05
Fuzzing and discovering vulnerabilities - Natas 29 Walkthrough - Overthewire.org
35:38
Breaking ECB Crypto (No programming) - Natas 28 Walkthrough - Overthewire.org
07:02
You actually can name a file CON in Windows (With bonus trick hiding data in plain sight)
04:23
Book shelf review - Books which I currently read - Infosec, IT and other books
02:47
Book shelf review - Shelf #4 - Infosec, IT and other books
03:53
Book shelf review - Shelf #5 - Infosec, IT and other books
08:36
Book shelf review - Shelf #3 - Infosec, IT and other books
07:30
Book shelf review - Shelf #2 - Infosec, IT and other books
08:44
Book shelf review - Shelf #1 - Infosec, IT and other books
26:51
Attack methodology & fuzzing - Finding weird vulnerabilities - Natas27 Walkthrough - Overthewire.org
28:52
Learning object serialization vulnerabilities - Natas 26 Walkthrough - Overthewire.org
01:52
Longest urban zip line. Dubai JBR, let's go!
19:22
Exploiting Local File Inclusion and defeating filters - Natas 25 - Overthewire.org - Walkthrough
06:12
Funky PHP Type Juggling - Natas 24 - Overthewire.org - Walkthrough
18:32
Fuzzing, trying to find anomalies and discrepancies - Natas 23 - Overthewire.org - Walkthrough
10:46
Content discovery; finding hidden information - Natas 22 - Overthewire.org - Walkthrough
07:52
Insecure configuration with shared hosting - Natas 21 - Overthewire.org - Walkthrough
17:23
Exploiting a custom session handler - Natas 20 - Overthewire.org - Walkthrough
05:57
More insecure session identifiers - Natas 19 - Overthewire.org - Walkthrough
14:10
Understanding a fully blind SQL Injection - Natas 17 - Overthewire.org - Walkthrough
05:03
Insecure session identifiers - Natas 18 - Overthewire.org - Walkthrough
22:39
Understanding Filtered Command Injection with Sub Shells - Natas16 - Overthewire.org - Walkthrough
40:14
Understanding Blind SQL Injection - Natas15 - Overthewire.org - Walkthrough
07:38
Understanding SQL Injection and Login Bypass - Natas14 - Overthewire.org - Walkthrough
05:59
Understanding File Upload vulnerabilities with MIME checking - Overthewire.org - Natas 13
04:54
Understanding File Upload vulnerabilities - Natas12 - Overthewire.org - Walkthrough
10:37
XDR / Traps malware protection bypass
06:25
Finding weakness through source code review - Natas06 - Overthewire.org - Walkthrough
04:34
Learn practical web security - Introduction & Walkthrough - Natas00 - Overthewire.org
02:45
Client security controls - Natas01 - Overthewire.org - Walkthrough
06:04
Understanding command injection with filter bypass - Natas10 - Overthewire.org - Walkthrough
04:51
Understanding Local File Inclusions - Natas07 - Overthewire.org - Walkthrough
06:27
Learn website security, finding hidden data - Natas02 - Overthewire.org - Walkthrough
06:11
Source code review and reversing an encoding algorithm - Natas08 - Overthewire.org - Walkthrough
16:21
Understanding XOR, encodings' and reversing an algorithm - Natas11 - Overthewire.org - Walkthrough
03:32
Understanding referrals and HTTP headers - Natas04 - Overthewire.org - Walkthrough
04:26
Understanding cookies and tampering of requests - Natas05 - Overthewire.org - Walkthrough
06:40
Understanding command injection - Natas09 - Overthewire.org - Walkthrough
02:55
Finding hidden data and understanding & limiting search engine crawling - Natas03 - Overthewire.org
00:44
LinkedIn Employee screen scraping with userscript
01:40
125 WPM over at 10fastfingers
05:35
Motorbike Off-Road Hyperlapse 8x std
00:22
Pretty cool toy
00:39
Remotely locking someone out of their terminal using PSExec
00:18
OPSec fail - Police officer types inn phone pin-code while on camera