Channel Avatar

Z. Cliffe Schreuders @UCAYF5jJkUBcmn1cor50yDOg@youtube.com

3.5K subscribers - no pronouns :c

Mostly videos about computer security: including lectures I


02:53
Cross-site Request Forgery (CSRF) Attack Demo
04:00
Cross-site Request Forgery (CSRF) Examples
16:03
Cross-site Request Forgery (CSRF) Prevention and Defence
03:51
Ambient Authority
04:11
The Confused Deputy Problem
12:51
Cross-site Request Forgery (CSRF)
13:51
Injection Attacks: Prevention
14:51
Injection Attacks: SQL Injection (SQLi)
07:39
Injection Attacks: OS Command Injection
06:50
Injection Attacks
06:39
Cross-Site Scripting (XSS): Demo
06:09
Cross-Site Scripting (XSS): Part 2 Prevention
15:57
Cross-Site Scripting (XSS): Part 1 Types of XSS
08:22
Cookies, Sessions, and Security Part 3: Defences
13:18
Cookies, Sessions, and Security Part 2: Sessions and Attacks on Session Management
09:59
Cookies, Sessions, and Security Part 1: Cookies
42:20
Introduction to Web Security
18:06
Open source development and security practices
30:24
Secure Development Lifecycles
21:31
Secure Design Principles
25:40
Threat modeling using STRIDE and Attack Trees
12:26
STRIDE Threat Modeling using Microsoft Threat Modeling Tool
21:33
Rule-based Sandboxing and Mandatory Access Controls
18:40
Writing Exploits (Buffer Overflows Part 2)
22:34
Overflows and Stack Smashing Buffer Overflows
12:31
Memory Management Vulnerabilities
31:37
Sandboxing and Virtualisation
19:23
Fuzzing Part 2
13:04
Fuzzing Part 1
17:53
Studying Cyber Security at Leeds Beckett University: including a look at Hacktivity and Hackerbot
08:53
Linux Extended ACLs
12:49
ACLs and Capabilities
11:31
Race Conditions and Time of Check to Time of Use TOCTTOU Vulnerabilities
16:11
Structured Output Generation Vulnerabilities
11:08
Special File Permissions SetUID
14:18
Access Control Models
33:48
Unix File Permissions
15:50
Access Controls: Concepts
08:18
Active Directory
04:51
Kerberos overview
13:59
Lightweight Directory Access Protocol (LDAP)
09:13
Network-based Authentication (SSO, AD, LDAP, Kerberos)
08:08
Authentication Tokens and One-Time Passwords
11:39
Biometrics
20:34
Authentication
17:34
User accounts and Linux
07:27
Password cracking with Johnny
08:10
Passwords Part 2 Attacks and Countermeasures
21:23
Log Management
20:12
Dead System Analysis
03:38
Packers and UPX Short Demo
08:25
DLL injection for Linux: LD_PRELOAD Demo
26:31
Malware Behaviour
11:09
Investigating a running process
24:08
Live System Analysis: Tools Demo
38:20
Live System Analysis: Concepts
21:39
Regexp (unstructured demo)
23:41
Snort IDS
08:42
IDS accuracy
28:46
IDS IPS