I am Dr, Pap, a security researcher, engineer, and hacker. I hope to help as many people understand as many cybersecurity concepts as possible. Enjoy the content!
An actor wants to access a site that is blocked or censored by a ISP (Internet Service Provider). To do this, they add an allowed domain in the SNI (Server Name Indication) extension field of the TLS (Transport Layer Security) header (which remains unencrypted). Then the actor adds their desired blocked domain in the HTTPS HOST Header field (which is encrypted).
What type of attack is the actor attempting to perform here?
New videos are in the works as we speak. Lookout for a quick update video today, and let me know what things you guys want me to cover in the future (comment below).
I appreciate you guys - I've seen some great comments on my recent video: compliments, suggestions, recommendations, corrections, etc.
Thanks to all of you, I've been able to improve even more. I've taken so many notes from the feedback that you guys have given. Future videos will be absolute BANGERS, I'm calling it now 🔥.
I'm in the middle of moving, but when I'm done, I have a lot of things cooking 😉; part 2s + new vids (i read those comments and requests. Dont worry, i got yall 😆).
Oh, and I'm going to be incorporating a lot of the things that I've learned from yall, to improve the quality of my videos, as soon as this move is completed!
ethicalPap_
An actor wants to access a site that is blocked or censored by a ISP (Internet Service Provider). To do this, they add an allowed domain in the SNI (Server Name Indication) extension field of the TLS (Transport Layer Security) header (which remains unencrypted). Then the actor adds their desired blocked domain in the HTTPS HOST Header field (which is encrypted).
What type of attack is the actor attempting to perform here?
10 months ago | [YT] | 16
View 0 replies
ethicalPap_
Fam, if you're reviewing JavaScript code and notice this snippet:
const userInput = JSON.parse(request.body);
Object.assign({}, userInput);
What type of vulnerability would most likely exists, based on this code?
PS: I'll be making a video on this in the future.
10 months ago | [YT] | 12
View 1 reply
ethicalPap_
ethicalFAM, I am back!
New videos are in the works as we speak. Lookout for a quick update video today, and let me know what things you guys want me to cover in the future (comment below).
When you win, I win, and we all win!
Love you guys
11 months ago | [YT] | 9
View 2 replies
ethicalPap_
Wow, 2k subs! Much love from my twin and I 🫶
I appreciate you guys - I've seen some great comments on my recent video: compliments, suggestions, recommendations, corrections, etc.
Thanks to all of you, I've been able to improve even more. I've taken so many notes from the feedback that you guys have given. Future videos will be absolute BANGERS, I'm calling it now 🔥.
I'm in the middle of moving, but when I'm done, I have a lot of things cooking 😉; part 2s + new vids (i read those comments and requests. Dont worry, i got yall 😆).
Oh, and I'm going to be incorporating a lot of the things that I've learned from yall, to improve the quality of my videos, as soon as this move is completed!
Ps. New video dropping tomorrow 👀...
1 year ago | [YT] | 95
View 8 replies