Channels lising page

All videos archived of Daniel Boctor
Who was REALLY behind the Largest Computer Worm

L1LZpWqbJG8 | 29 Jun 2024

Who was REALLY behind the Largest Computer Worm

Head to https://brilliant.org/DanielBoctor/ to start your free 30-day trial, and get 20% off an annual premium subscription. PART ONE ๐Ÿ‘‰ https://youtu.be/9KfY1hlibZ0 In this video, we take a deep dive into EternalBlue, the infamous exploit behind many of the most impactful cyber-attacks, such as WannaCry, NotPetya, TrickBot, and more. This is the most sophisticated exploit I have covered on this channel, due to the sheer rigor and length of the exploit chain. I wanted to build up to a comprehensive understanding of the exploit, starting with the buffer overflow / out-of-bounds write, as well as the arbitrary memory allocation, before outlining how the attack is executed. Whether you're a pen tester, security researcher, or cyber security expert, I hope you'll find this attack as fascinating as I did. JOIN THE DISCORD! ๐Ÿ‘‰ https://discord.gg/WYqqp7DXbm EternalBlue technical sources: https://research.checkpoint.com/2017/eternalblue-everything-know/ https://www.youtube.com/watch?v=HsievGJQG0w https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-zerosum0x0-Eternal-Exploits.pdf https://www.youtube.com/watch?v=vdYHXJd7Jdo http://www.cs.toronto.edu/~arnold/427/18s/427_18S/indepth/EternalBlue/EternalBlue_report.pdf https://www.virusbulletin.com/uploads/pdf/magazine/2018/201806-EternalBlue.pdf EternalBlue non-technical sources: https://www.foi.se/rest-api/report/FOI%20Memo%207434 https://web.archive.org/web/20190220082742/https://blogs.akamai.com/sitr/2017/05/wannacry-views-from-the-dns-frontline.html https://www.kaspersky.com/about/press-releases/2015_equation-group-the-crown-creator-of-cyber-espionage https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation https://web.archive.org/web/20170516021245/https://intel.malwaretech.com/botnet/wcrypt/?t=24h&bid=all https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and https://www.fbi.gov/wanted/cyber/gru-hackers-destructive-malware-and-international-cyber-attacks https://www.youtube.com/watch?v=BJzOiai8Dv4 SMB documentation: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-cifs/4d330f4c-151c-4d79-b207-40bd4f754da9 MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #hacked #CPU #eternalblue #wannacry #notpetya #ransomware #worms #computerworm #NSA #leak #bufferoverflow #memory #exploitchain #zeroclick #microsoftexploit #windowsexploit #cyberattack

When your State Secrets Accidentally Break the Internet

9KfY1hlibZ0 | 21 Jun 2024

When your State Secrets Accidentally Break the Internet

Head to https://brilliant.org/DanielBoctor/ to start your free 30-day trial, and get 20% off an annual premium subscription. In this video, we take a deep dive into EternalBlue, the infamous exploit behind many of the most impactful cyber-attacks, such as WannaCry, NotPetya, TrickBot, and more. This is the most sophisticated exploit I have covered on this channel, due to the sheer rigor and length of the exploit chain. I wanted to build up to a comprehensive understanding of the exploit, starting with the buffer overflow / out-of-bounds write, as well as the arbitrary memory allocation, before outlining how the attack is executed. Whether you're a pen tester, security researcher, or cyber security expert, I hope you'll find this attack as fascinating as I did. JOIN THE DISCORD! ๐Ÿ‘‰ https://discord.gg/WYqqp7DXbm EternalBlue technical sources: https://research.checkpoint.com/2017/eternalblue-everything-know/ https://www.youtube.com/watch?v=HsievGJQG0w https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-zerosum0x0-Eternal-Exploits.pdf https://www.youtube.com/watch?v=vdYHXJd7Jdo http://www.cs.toronto.edu/~arnold/427/18s/427_18S/indepth/EternalBlue/EternalBlue_report.pdf https://www.virusbulletin.com/uploads/pdf/magazine/2018/201806-EternalBlue.pdf EternalBlue non-technical sources: https://www.foi.se/rest-api/report/FOI%20Memo%207434 https://web.archive.org/web/20190220082742/https://blogs.akamai.com/sitr/2017/05/wannacry-views-from-the-dns-frontline.html https://www.kaspersky.com/about/press-releases/2015_equation-group-the-crown-creator-of-cyber-espionage https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation https://web.archive.org/web/20170516021245/https://intel.malwaretech.com/botnet/wcrypt/?t=24h&bid=all https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and https://www.fbi.gov/wanted/cyber/gru-hackers-destructive-malware-and-international-cyber-attacks https://www.youtube.com/watch?v=BJzOiai8Dv4 SMB documentation: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-cifs/4d330f4c-151c-4d79-b207-40bd4f754da9 MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #hacked #CPU #eternalblue #wannacry #notpetya #ransomware #worms #computerworm #NSA #leak #bufferoverflow #memory #exploitchain #zeroclick #microsoftexploit #windowsexploit #cyberattack

When you Accidentally Compromise every CPU on Earth

YRohz9VO1YY | 23 Mar 2024

When you Accidentally Compromise every CPU on Earth

Try CodeCrafters today with 40% off! ๐Ÿ‘‰ https://app.codecrafters.io/join?via=daniel-boctor In this video, we take a deep dive into Spectre and Meltdown, two of the most dangerous and widespread transient execution CPU vulnerabilities, discovered by researchers at Google Project Zero. These vulnerabilities allow a rogue process to read from unauthorized memory on nearly every device in the world. What makes these bugs particularly dangerous is that they don't behave like any software bug we've seen before, as they don't rely on exploiting any fundamental weakness or flaws in any code. These vulnerabilities are baked into the very essence of modern CPU technology, attacking underlying CPU micro-architectures. JOIN THE DISCORD! ๐Ÿ‘‰ https://discord.gg/WYqqp7DXbm 0:00 โ€“ Pizza Index 1:15 - Side Channels 2:05 โ€“ Spectre Overview 7:04 โ€“ Speculative Execution 10:50 - Exploit Official Source: https://meltdownattack.com/ Official CERT report: https://web.archive.org/web/20180104032628/http://www.kb.cert.org/vuls/id/584653 Pizza meter: https://en.wikipedia.org/wiki/The_Pizza_Meter Google Project Zero blog post: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html A few additional videos that helped me: https://www.youtube.com/watch?v=mgAN4w7LH2o (special thanks to Ymir Vigfusson's awesome video! This video was an inspiration to me, and one of the best spectre explanations on YouTube) https://www.youtube.com/watch?v=I5mRwzVvFGE https://www.youtube.com/watch?v=Njgoed0lv0A https://www.youtube.com/watch?v=ekBV2AdUc5g https://www.youtube.com/watch?v=IPhvL3A-e6E MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #ethicalhacking #encoding #lowlevelsecurity #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #javascript #hacked #spectre #CPU #intel #AMD #meltdown #assembly #ARM #semiconductor #computerengineering#cybersecurity programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #ethicalhacking #encoding #lowlevelsecurity #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #javascript #hacked #spectre #CPU #intel #AMD #meltdown #assembly #ARM #semiconductor #computerengineering

How Microsoft Accidentally Backdoored 270 MILLION Users

K5WOkLaGS-E | 17 Feb 2024

How Microsoft Accidentally Backdoored 270 MILLION Users

Try SquareX for free today! ๐Ÿ‘‰ https://sqrx.io/dbv2_yt In this video, we take a deep dive into the Microsoft Teams RCE (remote code execution) exploit chain, discovered by bug hunter Masato Kinugawa. This exploit chain consists of cross-site scripting (XSS), prototype pollution, and a sandbox escape within the desktop application framework Electron. Whether you're a pen tester, security researcher, or cyber security expert, having a solid foundation in web and desktop technologies, as well as JavaScript, prototypes, and APIs are crucial. JOIN THE DISCORD! ๐Ÿ‘‰ https://discord.gg/WYqqp7DXbm 0:00 - Overview 0:46 - Electron 2:30 - Entry Point + Chain Architecture 3:25 - Cross-site Scripting (XSS) 6:53 - Prototype Pollution 11:10 - Sandbox Escape 13:26 - SquareX Masato Kinugawa's report: https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own AngularJS RegEx: https://github.com/angular/angular.js/blob/47bf11ee94664367a26ed8c91b9b586d3dd420f5/src/ng/compile.js#L1384 SquareX socials: Twitter: https://twitter.com/getsquarex LinkedIn: https://www.linkedin.com/company/getsquarex/ Instagram: https://www.instagram.com/getsquarex/ Facebook: https://www.facebook.com/getsquarex Blog: https://labs.sqrx.com/ MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #encoding #lowlevelsecurity #zeroday #zero-day #bugbounty #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #javascript #XSS #crosssitescripting #web #webdev #electron #HTML #hacked #BeFearlessOnline #SquareX #Befearless&SecureOnline #Cybersecurity #Privacy #Security #Cybersec

MAJOR EXPLOIT: GitLab was Hacked with an IMAGE??

PZ-H099IaWo | 19 Jan 2024

MAJOR EXPLOIT: GitLab was Hacked with an IMAGE??

Try SquareX for free today! ๐Ÿ‘‰ https://sqrx.io/db_yt In this video, we take a deep dive into the GitLab / ExifTool metadata parsing vulnerability, which enables attackers to gain access to GitLab servers via an RCE (remote code execution). Whether you're a pen tester, security researcher, or cyber security expert, having a solid foundation in escape sequences, code evaluation, and character parsing is critical. JOIN THE DISCORD! ๐Ÿ‘‰ https://discord.gg/WYqqp7DXbm 0:00 - Overview 0:26- Metadata 1:59 - DjVu 2:34 - C Escape Sequences 4:18 - Structure 11:14 - Exploit 13:45 - SquareX Hackerone report https://hackerone.com/reports/1154542 William Bowlingโ€™s report https://devcraft.io/2021/05/04/exiftool-arbitrary-code-execution-cve-2021-22204.html Vulnerable code https://github.com/exiftool/exiftool/blob/11.70/lib/Image/ExifTool/DjVu.pm Patch https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031 SquareX socials: Twitter: https://twitter.com/getsquarex LinkedIn: https://www.linkedin.com/company/getsquarex/ Instagram: https://www.instagram.com/getsquarex/ Facebook: https://www.facebook.com/getsquarex Blog: https://labs.sqrx.com/ MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #JPEG #encoding #lowlevelsecurity #zeroday #zero-day #cybersecurityexplained #bugbounty #memorymanagement #gitlab #security #cybersecurity #github #git #versioncontrol #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #BeFearlessOnline #SquareX #Befearless&SecureOnline #Cybersecurity #Privacy #Security #Cybersec

Dev Loses $440 Million in 28 minutes, Chaos Ensues

263CooDJZCY | 08 Dec 2023

Dev Loses $440 Million in 28 minutes, Chaos Ensues

In this video, we take a deep dive into the disaster that occurred at Knight Capital Group, an American global financial services firm engaging in market making, electronic execution, and institutional sales and trading, on August 1st 2012. Weather you're a pen tester, security researcher, software engineer, or cyber security expert, having a solid foundation of test automation, DevOps, and automated deployment practices are critical. 0:00 - Prologue 1:06 - Overview 2:42 - Dark Pools 4:28 - RLP 5:14 - SEC Approval 5:43 - SMARS WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Doug Seven's report: https://dougseven.com/2014/04/17/knightmare-a-devops-cautionary-tale/ SEC filing: https://www.sec.gov/files/litigation/admin/2013/34-70694.pdf Henrico Dolfing's report: https://www.henricodolfing.com/2019/06/project-failure-case-study-knight-capital.html MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Firecracker https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 LEMMiNO - Siberian https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #lowlevelsecurity #zeroday #zeroday #cybersecurityexplained #bugbounty #injection #breach #Zoom #knightcapital #marketmaking #devops #deployment #databreach #testautomation #QA #disasterrecovery

The Hacker who could turn on ANYONE'S Zoom Camera [Zero-Day]

mj-FObYH7fQ | 24 Nov 2023

The Hacker who could turn on ANYONE'S Zoom Camera [Zero-Day]

In this video, we take a deep dive into a high severity Zoom SQL injection vulnerability, which allowed attackers to enable a victims webcam and microphone without their permission. This vulnerability was exploited by taking advantage of dependencies between back-end systems and the SQLite database engine. Weather you're a pen tester, security researcher, or cyber security expert, having a solid foundation in character encoding schemes, especially when it comes to SQL, is critical. 0:00 - Overview 1:06- Reverse Engineering 4:40- SQLite 5:32 - Attack Vector 8:27 - Encoding (ASCII, Unicode, UTF-8) 11:45 - Exploit WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Original report by Keegan Ryan https://medium.com/@keegan.ryan/patched-zoom-exploit-altering-camera-settings-via-remote-sql-injection-4fdf3de8a0d MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Firecracker https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 LEMMiNO - Siberian https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #lowlevelsecurity #zeroday #zeroday #cybersecurityexplained #bugbounty #SQL #injection #SQLinjection #unicode #ASCII #UTF8 #encoding #breach #SQLbreach #SQLite #databaseinjection #Zoom #Linux #localSQL

MAJOR EXPLOIT: This GIF can Backdoor ANY Android Phone [Zero-Day]

4SN1YckY-BA | 10 Nov 2023

MAJOR EXPLOIT: This GIF can Backdoor ANY Android Phone [Zero-Day]

In this video, we take a deep dive into the inner mechanics of a double free vulnerability within Android OS, allowing attackers to gain complete access to any Android mobile phone with an RCE (remote code execution). This vulnerability was exploited by creating a custom GIF file and sending it to a user in WhatsApp. Weather you're a pen tester, security researcher, or cyber security expert, having a solid foundation in low level languages, especially C, is critical. 0:00 - Overview 0:35 - GIFs 1:02- GIFs within Android 2:10- Memory / Pointers 3:35 - Double Free 6:02 - WhatsApp Payload 8:24 - RCE WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Original report by security researcher Awakened https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ Double free within android-gif-drawable https://github.com/koral--/android-gif-drawable/pull/673 MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #mobile #android #doublefree #malloc #realloc #GIF #mobilesecurity #lowlevelsecurity #zeroday #zero-day #cybersecurityexplained #bugbounty #compiler #memorymanagement #kernel #operatingsystems #OS

The Hacker who Breached Google with a SINGLE Line of Code

TvOvOOZJlcw | 20 Oct 2023

The Hacker who Breached Google with a SINGLE Line of Code

In this video, we take a deep dive into the inner mechanics of Cross Site Request Forgery (CSRF), CSRF Tokens, and how Surgey Bobrov was able to bypass them with a joint Google Analytics & Django web framework exploit / vulnerability. CSRF is the lesser known of the big three web attacks, consisting of SQL injection, and cross site scripting (XSS). 0:00 - Overview 0:48 - Cookies 3:17- Cross Site Request Forgery (CSRF) 4:29- CSRF Tokens 6:42- Exploit / Vulnerability WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Django patch - https://www.djangoproject.com/weblog/2016/sep/26/security-releases/ Original report - https://hackerone.com/reports/26647 Surgey Bobrov - https://hackerone.com/bobrov?type=user Double Submit Cookie - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#double-submit-cookie MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 #Python #Coding #Programming #Software #SoftwareEngineering #ComputerScience #Code #ProgrammingLanguage #SoftwareDevelopment #Development #Developers #Hacking #Hack #CyberSecurity #Exploit #Tracking #Web #WebDev #SoftwareEngineer #Django #WebFramework #Vulnerability #PenTesting #Privacy #Spyware #Malware #CSRF #CrossSiteRequestForgery #SQLInjection #CrossSiteScripting #XSS #WebVulnerabilities #Cyber #CyberAttack #BugBounties #GoogleExploit #GoogleAnalytics #EthicalHacking

Your Python Code Is UNSAFE (seriously) - GILโ€™s Hidden Secret

9AC2heqy_eE | 13 Oct 2023

Your Python Code Is UNSAFE (seriously) - GILโ€™s Hidden Secret

In this video, we take a deep dive into the inner mechanics of Python's Global Interpreter Lock (GIL), which is a must for all threading and multiprocessing devs, and expose a subtle nonce / hidden vulnerability, which could potentially make your code unsafe. Join us as we explore the impact of GIL on threading and multiprocessing, and discover how it affects the performance and scalability of your Python programs. By the end of this video, you'll gain valuable insights and learn proper threading practices that can help you avoid potential pitfalls. 0:00 - Overview 1:15 - Python threading example 3:50 - Threading 5:46 - GIL (Global Interpreter Lock) 6:24 - CPU bound vs IO bound 7:40 - Purpose of GIL 8:21 - Multiprocessing 9:25 - GILs downfall Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/tree/main/GIL WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0

HUGE Game Changer for Python - Faster than C?? (seriously)

1VAuOvtfhAM | 06 Oct 2023

HUGE Game Changer for Python - Faster than C?? (seriously)

In this video, we explore a HUGE gamechanger for Python speed and optimization - Just In Time compilation (JIT) with Numba. WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Numba/numba.ipynb 0:00 - Intro 0:52 - Compilation vs interpretation 2:05 - Numba (JIT) 2:36 - Decarators 3:58 - NumPy

coding in C until I commit an atrocity

ysDJMF4ToWI | 29 Sep 2023

coding in C until I commit an atrocity

In this video I try my very best to complete my C programming homework without committing several catastrophes, however this C code may be haunted. WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/PSETS/PSET1.c 0:00 - God tier coding 0:45 - Haunted code

THESE Are the Tracking Pixels You Need to Worry About

zsoCSFaTo0o | 22 Sep 2023

THESE Are the Tracking Pixels You Need to Worry About

In this video, I showcase a revolutionary feat of engineering: the first untraceable tracking pixel. With some understand of HTTP, software engineering, and computer networking, we can apply the mechanics of traditional tracking pixels to legitimate email resources, to become fully undetectable to those who ghost us. Whether you're a beginner or a seasoned programmer, you can harness this ability yourself, as well as bettering your digital hygiene, online privacy, and resistance to hackers, spyware, and other trackers. WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm #python #coding #programming #software #softwareengineering #computerscience #softwaredevelopment #email #hacking #cybersecurity #exploit #trackingpixel #tracking #web #fullstack #softwareengineer #django #webframework #informationtechnology #computernetworking #OSI #networkengineering #vulnerability #IP #TCP #pentesting #privacy #spyware #malware

The BEST Data Structure Youโ€™ve Never Heard of | Python Deques

25B66fOb0GA | 15 Sep 2023

The BEST Data Structure Youโ€™ve Never Heard of | Python Deques

In this video, we delve into the Python Deque, a versatile data structure that combines the features of both stacks, queues, and lists. Learn how to efficiently manipulate and access elements using deque operations. This tutorial is perfect for beginners and experienced programmers, as we explore its implementation, advantages, and practical use cases. Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Deques/deques.ipynb 0:00 - Introduction 0:16 - Deques 0:41 - Appending to the right 1:10 - Popping from the right 1:39 - Appending to the left 2:18 - Popping from the left 2:44 - Insertion / deletion into middle 3:29 - Outro

THIS Is Why List Comprehensions Are Faster Than Loops?? [Python Disassembly]

zlmzrD8zq0o | 31 Aug 2023

THIS Is Why List Comprehensions Are Faster Than Loops?? [Python Disassembly]

In this video, we settle the long-standing debate among Python programmers: list comprehensions vs for loops. Discover why Python list and dictionary comprehensions are faster than regular for loops, and how they can improve your code efficiency. Whether you're a beginner or an experienced Python programmer, this video will help you become an all around stronger and more knowledgeable programmer. Ready to level up your Python skills? Subscribe now to stay tuned for more insightful software content. Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Comprehensions/comprehensions.ipynb 0:00 - Introduction 0:18 - Performance Improvement 0:57 - Call Stack 1:44 - Bytecodes 2:40 - Map 3:35 - Outro

Quant Finance with Python and Pandas | 50 Concepts you NEED to Know in 9 Minutes | [Getting Started]

b9RgHa1CnH4 | 17 Aug 2023

Quant Finance with Python and Pandas | 50 Concepts you NEED to Know in 9 Minutes | [Getting Started]

The first video in a Python, NumPy, Pandas, and Matplotlib based based computational / quant finance series, spanning from stochastic modelling and portfolio insurance, to asset pricing , factor regressions, data visualization, and everything in-between. Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Finance101/finance.ipynb 0:00 - Intro 0:17 - Data Source 1:00 - Information Preparation 2:09 - Returns 4:18 - DataFrame 5:03 - Measures of Risk 5:18 - Annualization 6:31 - Raw Sharpe Ratio 6:52 - Wealth Index 7:37 - Drawdowns 8:45 - Outro

[Silicon Valley] Day in the Life of a Cyber Security Intern @ Cisco Meraki

-WanByjXSXU | 04 Aug 2023

[Silicon Valley] Day in the Life of a Cyber Security Intern @ Cisco Meraki

A Day in the Life of a Software Engineer Intern @ Cisco Meraki in San Francisco - working on Cyber Security Systems Integration Testing within the MX QA team Still learning how to edit :p 0:00 Intro 0:12 Wake up 0:24 Commute to the office 0:35 Arrive at the office 1:00 Breakfast 1:29 Juice & Bagel 1:43 Morning grind 2:13 Lunch 3:06 Games room 3:37 Afternoon grind 4:03 Maximo 4:16 Snacks 4:30 Intern events 4:37 Gym 4:59 Office parties 5:16 Evenings 6:11 Commute home 6:43 Nights 7:00 Maximo's greatest weakness

You're NOT Managing Your Memory Properly | Python Generators (Yield)

qz4JZ7OfPNU | 21 Jul 2023

You're NOT Managing Your Memory Properly | Python Generators (Yield)

How using Python generators (aka the yield statement) can be advantageous to program design and memory efficiency and management. Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Generators/generators.ipynb 0:00 - Introduction 0:25 - Lists 2:51 - Generators 5:47 - Rolling Returns 8:00 - Outro

THIS Is More Important Than Time Complexity??

tDrwHeBwWGE | 08 Jul 2023

THIS Is More Important Than Time Complexity??

How execution speed and computer architecture are just as important as time complexity. Featuring NumPy, Pandas, SIMD, vectors, registers, and more! Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Vectorization/vectors.ipynb 0:00 - Introduction 0:30 - Performance Improvement 4:10 - Design Advantage 5:54 - SIMD (Single Instruction, Multiple Data) 7:42 - Outro

[No Dependencies] Namecheap - How to Setup a FREE DDNS Script (self contained)

9Wd2a_69QIw | 24 Jun 2023

[No Dependencies] Namecheap - How to Setup a FREE DDNS Script (self contained)

Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Namecheap%20DDNS%20Script/DDNS.sh API spec - https://www.namecheap.com/support/knowledgebase/article.aspx/29/11/how-to-dynamically-update-the-hosts-ip-with-an-http-request/ 0:00 - Intro 0:40 - API Setup 2:12 - DDNS Script 16:41 - Demo & Validation 18:42 - Automation 20:13 - Complete

How to Drop Trailing 0s for Front-end Display in Django Modelform DecimalFields (Dollar Display)

qENPLhAB8-I | 18 Jun 2023

How to Drop Trailing 0s for Front-end Display in Django Modelform DecimalFields (Dollar Display)

Source Code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/DollarDisplayWidget/widgets.py 0:00 - Intro 0:53 - Background 2:25 - Setup 6:20 - Widget 17:45 - Complete