My thoughts on the ALPACA Attack (Detailed analysis)
The ALPACA attack stands for application layer protocol confusion attack and discovered by a group of German computer scientists. Let us spend some time analyzing how this attack really works and how dangerous this is.
Resources
https://alpaca-attack.com/ALPACA.pdf
https://var.thejh.net/http_ftp_cross_protocol_mitm_attacks.pdf
https://github.com/RUB-NDS/alpaca-code
https://github.com/RUB-NDS/alpaca-code/blob/master/testlab/servers/files/nginx-attacker/html/upload/ftps.html
https://twitter.com/lambdafu/status/1404567396443164683
Support my work on PayPal
https://bit.ly/33ENps4
Become a Member on YouTube
https://www.youtube.com/channel/UC_ML5xP23TOWKUcc-oAE_Eg/join
🧑🏫 Courses I Teach
https://husseinnasser.com/courses
🏭 Backend Engineering Videos in Order
https://backend.husseinnasser.com
💾 Database Engineering Videos
https://www.youtube.com/playlist?list=PLQnljOFTspQXjD0HOzN7P2tgzu7scWpl2
🎙️Listen to the Backend Engineering Podcast
https://husseinnasser.com/podcast
Gears and tools used on the Channel (affiliates)
🖼️ Slides and Thumbnail Design
Canva
https://partner.canva.com/c/2766475/647168/10068
🎙️ Mic Gear
Shure SM7B Cardioid Dynamic Microphone
https://amzn.to/3o1NiBi
Cloudlifter
https://amzn.to/2RAeyLo
XLR cables
https://amzn.to/3tvMJRu
Focusrite Audio Interface
https://amzn.to/3f2vjGY
📷 Camera Gear
Canon M50 Mark II
https://amzn.to/3o2ed0c
Micro HDMI to HDMI
https://amzn.to/3uwCxK3
Video capture card
https://amzn.to/3f34pyD
AC Wall for constant power
https://amzn.to/3eueoxP
Stay Awesome,
Hussein
Видео My thoughts on the ALPACA Attack (Detailed analysis) канала Hussein Nasser
Resources
https://alpaca-attack.com/ALPACA.pdf
https://var.thejh.net/http_ftp_cross_protocol_mitm_attacks.pdf
https://github.com/RUB-NDS/alpaca-code
https://github.com/RUB-NDS/alpaca-code/blob/master/testlab/servers/files/nginx-attacker/html/upload/ftps.html
https://twitter.com/lambdafu/status/1404567396443164683
Support my work on PayPal
https://bit.ly/33ENps4
Become a Member on YouTube
https://www.youtube.com/channel/UC_ML5xP23TOWKUcc-oAE_Eg/join
🧑🏫 Courses I Teach
https://husseinnasser.com/courses
🏭 Backend Engineering Videos in Order
https://backend.husseinnasser.com
💾 Database Engineering Videos
https://www.youtube.com/playlist?list=PLQnljOFTspQXjD0HOzN7P2tgzu7scWpl2
🎙️Listen to the Backend Engineering Podcast
https://husseinnasser.com/podcast
Gears and tools used on the Channel (affiliates)
🖼️ Slides and Thumbnail Design
Canva
https://partner.canva.com/c/2766475/647168/10068
🎙️ Mic Gear
Shure SM7B Cardioid Dynamic Microphone
https://amzn.to/3o1NiBi
Cloudlifter
https://amzn.to/2RAeyLo
XLR cables
https://amzn.to/3tvMJRu
Focusrite Audio Interface
https://amzn.to/3f2vjGY
📷 Camera Gear
Canon M50 Mark II
https://amzn.to/3o2ed0c
Micro HDMI to HDMI
https://amzn.to/3uwCxK3
Video capture card
https://amzn.to/3f34pyD
AC Wall for constant power
https://amzn.to/3eueoxP
Stay Awesome,
Hussein
Видео My thoughts on the ALPACA Attack (Detailed analysis) канала Hussein Nasser
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
TLS 1.2 vs TLS 1.3 #shortsHow the Best Hackers Learn Their CraftMy thoughts on the CAP theoremDatabase Indexing Explained (with PostgreSQL)What happens when type google.com into your browser address box and hit enter? (Detailed Analysis)Why the Internet went dark for two hours - Let's discuss the Akamai outageHow to learn any language in six months | Chris Lonsdale | TEDxLingnanUniversityI ask this question to every Backend Engineer I interviewHigh severity flaw can crash your WebServer when using OpenSSL - Let us discussFacebook Awarded him $30,000 for Finding a Critical Instagram BugThe ALPACA Attack explained #shortsWhat It's Like To Have A Pet AlpacaColumn vs Row Oriented Databases ExplainedNorth Korean Hackers Hide Malicious Code within BMP image, Goes Undetected by AntiVirus softwarePublish-Subscribe Pattern vs Message Queues vs Request Response (Detailed Discussions with Examples)SSH wormable, written in Bash, updates itself and hard to detect. The DarkRadiation ☢️ Ransomwareiptables Demystified - Port Redirection and Forwarding HTTP Traffic to another machine (part 1)How HTTP Tunneling works, The CONNECT method, Pros & Cons and moreLong Polling and how it differs from Push, Poll and SSE - The Backend Engineering Showwhen alpacas attack