ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

238 results

Chrome for Developers
HTTP Headers - The State of the Web

Rick speaks with Andrew Betts about HTTP headers. Andrew is a Technical Product Manager and Developer Advocate at Fastly ...

25:21
HTTP Headers - The State of the Web

35,356 views

7 years ago

Ebrahem
27- HTTP Methods, Request and Response Headers

Web application Penetration Testing course instructed by Ebrahim Hegazy from www.security4arabs.com team. ملفات الشرح ...

26:48
27- HTTP Methods, Request and Response Headers

48,765 views

8 years ago

DEFCONConference
albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference

HTTP requests are traditionally viewed as isolated, standalone entities. In this session, I'll introduce techniques for remote, ...

41:32
albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference

65,166 views

6 years ago

FANATICUS
How to make secure headers for web servers and application servers.

How to make response header secure. Adding valid headers options to enforce the web browser to work securely. Adding Secure ...

22:50
How to make secure headers for web servers and application servers.

91 views

4 years ago

JSConf
Wei Lu: HTTP Headers - The Simplest Security - JSConf.Asia 2014

Not sure what Content-Security-Policy and Strict-Transport-Security are about? Your web apps are at risk! Security is crucial but ...

25:52
Wei Lu: HTTP Headers - The Simplest Security - JSConf.Asia 2014

6,827 views

11 years ago

DEFCONConference
DEF CON 33 - HTTP 1 1 Must Die! The Desync Endgame  - James 'albinowax' Kettle

Some people think the days of critical HTTP request smuggling attacks on hardened targets have passed. Unfortunately, this is an ...

36:32
DEF CON 33 - HTTP 1 1 Must Die! The Desync Endgame - James 'albinowax' Kettle

4,360 views

3 months ago

BSidesDFW
HTTP and De-Sync Attacks

From the history of the protocol to pipelining and HTTP Request Smuggling, we'll see how HTTP works and how it can be broken.

49:29
HTTP and De-Sync Attacks

175 views

4 years ago

Code with Nakov | SoftUni Global
What You Need to Know About HTTP Protocol [Dev Concepts #39]

... 01:32 HTTP Protocol Basics 07:04 HTTP Developer Tools 11:11 HTTP Request Methods 16:35 GET Request - Example 21:48 ...

45:50
What You Need to Know About HTTP Protocol [Dev Concepts #39]

1,421 views

3 years ago

DEFCONConference
DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

The recent rise of HTTP Request Smuggling has seen a flood of critical findings enabling near-complete compromise of numerous ...

42:14
DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

19,007 views

3 years ago

Aalto Scientific Computing
How web servers work

How does a web server work? How does your web browser connect to and get data from some code running on server?

59:03
How web servers work

109 views

4 years ago

Per Thorsheim
02 Scott Helme - HPKP, HSTS & CSP for securing your password

Abstract: A discussion of HTTP Public Key Pinning, HTTP Strict Transport Security and Content Security Policy. These HTTP ...

23:55
02 Scott Helme - HPKP, HSTS & CSP for securing your password

2,016 views

10 years ago

BSides SATX
t105 1500 Intro to HTTP and De Sync Attacks

Last, we will discuss HTTP Request Smuggling and De-synchronization attack techniques popularized by James Kettle ...

49:50
t105 1500 Intro to HTTP and De Sync Attacks

117 views

4 years ago

Brad Fitzpatrick
HTTP/2 and http2 in Go 1.6

GoSF #golang meetup talk about HTTP/2 and http2 support in Go 1.6. Slides at: ...

26:27
HTTP/2 and http2 in Go 1.6

17,322 views

9 years ago

EuroPython Conference
Designing an HTTP client — Tom Christie

EuroPython 2023 — North Hall on 2023-07-21] https://ep2023.europython.eu/session/designing-an-http-client HTTPX is a fully ...

27:46
Designing an HTTP client — Tom Christie

754 views

2 years ago

DEFCONConference
DEF CON 32 - Decoding Galah, an LLM Powered Web Honeypot - Adel Karimi

Honeypots are invaluable tools for monitoring internet-wide scans and understanding attackers' techniques. Traditional ...

24:57
DEF CON 32 - Decoding Galah, an LLM Powered Web Honeypot - Adel Karimi

886 views

1 year ago

DEFCONConference
DEF CON 29 - Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 Connections

Over the past few years, we have seen some novel presentations re-introducing the concept of HTTP request smuggling, ...

45:34
DEF CON 29 - Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 Connections

5,395 views

4 years ago

OWASP Foundation
No Better ROI: HTTP Headers for Security - Caleb Queern - OWASP AppSec California 2015

AppSec California 2015 - Day 1, Track 3, Slot 2 Title No Better ROI: HTTP Headers for Security Abstract Eli Goldratt asks us to ...

26:16
No Better ROI: HTTP Headers for Security - Caleb Queern - OWASP AppSec California 2015

438 views

10 years ago

WebCamp Zagreb
Zdeslav Vojković - HTTP/2 - what does it bring and does it matter?

HTTP 1.1 was standardized 16 years ago. Let's see what next big revision brings and was it worth the wait. HTTP 1.1 is one of the ...

26:28
Zdeslav Vojković - HTTP/2 - what does it bring and does it matter?

66 views

10 years ago

gibnichols
Ohio Linux 2015 Anatomy of a HTTP request 1of2
23:17
Ohio Linux 2015 Anatomy of a HTTP request 1of2

19 views

10 years ago

OWASP London
OWASP Talk on Security Headers "CSP STS PKP ETC OMG WTF BBQ"  - by  Scott Helme

OWASP London Chapter Meeting 28th July 2016 There are a huge number of technologies available to help us better secure our ...

51:32
OWASP Talk on Security Headers "CSP STS PKP ETC OMG WTF BBQ" - by Scott Helme

1,061 views

9 years ago