A KDF or Key Derivation Function is a cryptographic algorithm used to derive one or more secret keys from another secret value, such as:
A password
A shared secret
A master key
🔑 Why Use a KDF?
Raw keys like passwords or pre-shared secrets are usually:
Too short
Not random enough
Not the right length for encryption algorithms
A KDF transforms them into secure, fixed-length, high-entropy keys suitable for cryptographic use (like AES, HMAC, etc.).
🧠 How It Works (Simplified):
input: the base secret (e.g., password)
salt: random value to prevent rainbow table attacks
iterations: number of hash rounds (to slow down brute force)
output_length: desired key length in bytes
🛡 Why KDFs Are Critical
Prevent weak passwords from being easily guessed
Prevent precomputed attacks (e.g., rainbow tables)
Generate consistent, secure keys for encryption/decryption
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
A password
A shared secret
A master key
🔑 Why Use a KDF?
Raw keys like passwords or pre-shared secrets are usually:
Too short
Not random enough
Not the right length for encryption algorithms
A KDF transforms them into secure, fixed-length, high-entropy keys suitable for cryptographic use (like AES, HMAC, etc.).
🧠 How It Works (Simplified):
key = KDF(input, salt, iterations, output_length)
input: the base secret (e.g., password)
salt: random value to prevent rainbow table attacks
iterations: number of hash rounds (to slow down brute force)
output_length: desired key length in bytes
🛡 Why KDFs Are Critical
Prevent weak passwords from being easily guessed
Prevent precomputed attacks (e.g., rainbow tables)
Generate consistent, secure keys for encryption/decryption
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
⛱Backpropagation Through Time (BPTT) is a technique used to train Recurrent Neural Networks (RNNs) by extending the standard backpropagation algorithm to handle sequential data. It essentially "unrolls" the RNN over time and calculates the gradients of the loss function with respect to the network's weights across multiple time steps. This allows the network to learn from errors over a sequence of inputs and outputs.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
۱. هوش مصنوعی (Artificial Intelligence - AI) چیه؟!
هوش مصنوعی به طور کلی به سیستمهایی گفته میشه که میتونن کارهایی انجام بدن که معمولاً نیاز به فکر کردن، یاد گرفتن یا تصمیمگیری توسط انسان دارن. این کارها میتونه شامل چیزهایی مثل بازی کردن، رانندگی، تشخیص چهره، ترجمه زبان، نوشتن متن یا حتی تولید تصویر باشه. AI تلاش میکنه رفتارهای انسانی مثل فهم زبان، استدلال، حل مسئله یا یادگیری از تجربه رو شبیهسازی کنه. برای مثال، وقتی از دستیار صوتی گوشیت میخوای یه پیام بفرسته یا هوا رو چک کنه، اون داره از یه نوع AI استفاده میکنه تا حرفت رو بفهمه و جواب مناسب بده.
۲. یادگیری ماشین (Machine Learning - ML) چیه؟
یادگیری ماشین یه زیرمجموعه مهم از هوش مصنوعیه که تمرکزش روی یادگیری خودکار از دادههاست. به جای اینکه برای هر کاری دقیقاً کد بنویسیم، به مدل یه سری داده میدیم و اون خودش قوانین یا الگوهای موجود در اون دادهها رو کشف میکنه. فرض کن میخوای مدلی داشته باشی که ایمیلهای اسپم رو شناسایی کنه. بهش هزاران ایمیل نشون میدی و میگی کدومها اسپم بودن. مدل کمکم یاد میگیره چه ویژگیهایی توی متن نشوندهندهی اسپم بودنه. بعد از آموزش، دیگه میتونه خودش ایمیلهای جدید رو تحلیل کنه و بگه اسپم هستن یا نه.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
هوش مصنوعی به طور کلی به سیستمهایی گفته میشه که میتونن کارهایی انجام بدن که معمولاً نیاز به فکر کردن، یاد گرفتن یا تصمیمگیری توسط انسان دارن. این کارها میتونه شامل چیزهایی مثل بازی کردن، رانندگی، تشخیص چهره، ترجمه زبان، نوشتن متن یا حتی تولید تصویر باشه. AI تلاش میکنه رفتارهای انسانی مثل فهم زبان، استدلال، حل مسئله یا یادگیری از تجربه رو شبیهسازی کنه. برای مثال، وقتی از دستیار صوتی گوشیت میخوای یه پیام بفرسته یا هوا رو چک کنه، اون داره از یه نوع AI استفاده میکنه تا حرفت رو بفهمه و جواب مناسب بده.
۲. یادگیری ماشین (Machine Learning - ML) چیه؟
یادگیری ماشین یه زیرمجموعه مهم از هوش مصنوعیه که تمرکزش روی یادگیری خودکار از دادههاست. به جای اینکه برای هر کاری دقیقاً کد بنویسیم، به مدل یه سری داده میدیم و اون خودش قوانین یا الگوهای موجود در اون دادهها رو کشف میکنه. فرض کن میخوای مدلی داشته باشی که ایمیلهای اسپم رو شناسایی کنه. بهش هزاران ایمیل نشون میدی و میگی کدومها اسپم بودن. مدل کمکم یاد میگیره چه ویژگیهایی توی متن نشوندهندهی اسپم بودنه. بعد از آموزش، دیگه میتونه خودش ایمیلهای جدید رو تحلیل کنه و بگه اسپم هستن یا نه.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
❤1
پشتپرده هک نوبیتکس | حمله سایبری گنجشک درنده چگونه اجرا شد؟ 🔥#نوبیتکس
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
YouTube
پشتپرده هک نوبیتکس | حمله سایبری گنجشک درنده چگونه اجرا شد؟ 🔥#نوبیتکس
در این ویدیو از InfoSecTube، به بررسی کامل و تحلیلی یکی از بزرگترین حملات سایبری تاریخ ایران میپردازیم:
🎯 حمله پیچیده گروه هکری «گنجشک درنده» به صرافی نوبیتکس در ۲۸ خرداد ۱۴۰۴
🔍 آنچه خواهید دید:
روایت لحظهبهلحظه حمله به نوبیتکس
تحلیل فنی نحوه نفوذ…
🎯 حمله پیچیده گروه هکری «گنجشک درنده» به صرافی نوبیتکس در ۲۸ خرداد ۱۴۰۴
🔍 آنچه خواهید دید:
روایت لحظهبهلحظه حمله به نوبیتکس
تحلیل فنی نحوه نفوذ…
❤1
🔍 Thread Memory Layout
In single-threaded processes:
One stack per process
In multi-threaded processes:
One stack per thread
Shared heap and global variables
📌 Stack = thread-local
📌 Heap = shared
In single-threaded processes:
One stack per process
In multi-threaded processes:
One stack per thread
Shared heap and global variables
📌 Stack = thread-local
📌 Heap = shared
InfoSecTube pinned «پشتپرده هک نوبیتکس | حمله سایبری گنجشک درنده چگونه اجرا شد؟ 🔥#نوبیتکس 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us»
🛡 How does IPsec secure your network traffic?
🔐 IPsec provides confidentiality & integrity at the network layer using:
ESP (Encapsulating Security Payload): 🔒 Encryption + Integrity
AH (Authentication Header): ✅ Integrity only
Works in Transport mode (host-to-host) or Tunnel mode (gateway-to-gateway)
⚠️ But it’s not all smooth sailing…
🚧 Real-world challenges:
🔧 Complex configuration
🔥 Incompatibility with NAT
🧩 Limited app support
❌ Troubleshooting is hard (encrypted headers!)
💡 While IPsec is transparent to apps, it’s less flexible than TLS for application-level needs.
#CyberSecurity #IPsec #NetworkSecurity #Encryption #TLS #ESP #AH #InfoSec #TechExplained #Confidentiality #Integrity
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🔐 IPsec provides confidentiality & integrity at the network layer using:
ESP (Encapsulating Security Payload): 🔒 Encryption + Integrity
AH (Authentication Header): ✅ Integrity only
Works in Transport mode (host-to-host) or Tunnel mode (gateway-to-gateway)
⚠️ But it’s not all smooth sailing…
🚧 Real-world challenges:
🔧 Complex configuration
🔥 Incompatibility with NAT
🧩 Limited app support
❌ Troubleshooting is hard (encrypted headers!)
💡 While IPsec is transparent to apps, it’s less flexible than TLS for application-level needs.
#CyberSecurity #IPsec #NetworkSecurity #Encryption #TLS #ESP #AH #InfoSec #TechExplained #Confidentiality #Integrity
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🔐⚡️ Hybrid Encryption: Best of Both Crypto Worlds
Why choose between speed and security when you can have both?
That’s the power of Hybrid Encryption — the backbone of modern secure communication. 🧠🔑
🧠 What Is Hybrid Encryption?
Hybrid encryption combines:
Asymmetric encryption (🔐 public/private keys)
Symmetric encryption (⚡️ fast, shared secret key)
You use the asymmetric system to securely exchange a symmetric key, then use that symmetric key to encrypt the actual data.
📘 "Hybrid encryption leverages the strengths of both symmetric and asymmetric algorithms: speed and secure key exchange."
🎯 Why Use It?
✅ Asymmetric encryption (like RSA or ECC) is secure for key exchange, but slow for large data
✅ Symmetric encryption (like AES or ChaCha20) is fast, but requires secure key sharing
Hybrid encryption = secure key exchange + fast data encryption 💡
🧪 How It Works (Simplified):
🔑 Generate a random symmetric key (e.g., AES key)
📨 Encrypt the AES key with the recipient’s public key (RSA)
📦 Encrypt the message with AES
🚀 Send both: the encrypted key + the encrypted message
Only the recipient with the private key can decrypt the AES key, then use it to decrypt the message 🔓
🌍 Where It’s Used:
TLS/HTTPS (your browser does this every time you open a secure site!)
Secure email (e.g., PGP/GPG)
Encrypted messaging apps (e.g., Signal, WhatsApp)
Secure file storage systems
🧩 TL;DR
Hybrid encryption gives you the speed of symmetric encryption and the security of asymmetric encryption — it’s like mailing a locked box with the key encrypted just for the receiver.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Why choose between speed and security when you can have both?
That’s the power of Hybrid Encryption — the backbone of modern secure communication. 🧠🔑
🧠 What Is Hybrid Encryption?
Hybrid encryption combines:
Asymmetric encryption (🔐 public/private keys)
Symmetric encryption (⚡️ fast, shared secret key)
You use the asymmetric system to securely exchange a symmetric key, then use that symmetric key to encrypt the actual data.
📘 "Hybrid encryption leverages the strengths of both symmetric and asymmetric algorithms: speed and secure key exchange."
🎯 Why Use It?
✅ Asymmetric encryption (like RSA or ECC) is secure for key exchange, but slow for large data
✅ Symmetric encryption (like AES or ChaCha20) is fast, but requires secure key sharing
Hybrid encryption = secure key exchange + fast data encryption 💡
🧪 How It Works (Simplified):
🔑 Generate a random symmetric key (e.g., AES key)
📨 Encrypt the AES key with the recipient’s public key (RSA)
📦 Encrypt the message with AES
🚀 Send both: the encrypted key + the encrypted message
Only the recipient with the private key can decrypt the AES key, then use it to decrypt the message 🔓
🌍 Where It’s Used:
TLS/HTTPS (your browser does this every time you open a secure site!)
Secure email (e.g., PGP/GPG)
Encrypted messaging apps (e.g., Signal, WhatsApp)
Secure file storage systems
🧩 TL;DR
Hybrid encryption gives you the speed of symmetric encryption and the security of asymmetric encryption — it’s like mailing a locked box with the key encrypted just for the receiver.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯 What is Clickjacking—and why is it so sneaky?
🕵️♂️ Clickjacking tricks you into clicking something you didn’t mean to—like a hidden button under a legit one (often via transparent iframes).
💡 The trick? It’s not a technical bug—it’s a UI deception.
You think you're clicking “Play,” but you're actually liking a page, submitting a form, or changing settings.
😱 It’s nearly invisible to users—that’s what makes it dangerous.
🛡 How to defend:
These prevent your site from being embedded in sneaky iframes.
#CyberSecurity #Clickjacking #WebSecurity #InfoSec #UIHacking #XFrameOptions #CSP #SecureDev #BrowserSecurity
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🕵️♂️ Clickjacking tricks you into clicking something you didn’t mean to—like a hidden button under a legit one (often via transparent iframes).
💡 The trick? It’s not a technical bug—it’s a UI deception.
You think you're clicking “Play,” but you're actually liking a page, submitting a form, or changing settings.
😱 It’s nearly invisible to users—that’s what makes it dangerous.
🛡 How to defend:
X-Frame-Options: DENY
Content-Security-Policy: frame-ancestors 'none'
These prevent your site from being embedded in sneaky iframes.
#CyberSecurity #Clickjacking #WebSecurity #InfoSec #UIHacking #XFrameOptions #CSP #SecureDev #BrowserSecurity
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🛡 HIDS vs NIDS — Why use both?
🔍 HIDS (Host-based IDS):
Watches inside the system — logs, file changes, system calls.
Great for spotting:
• 🐛 Malware persistence
• 🔐 Privilege escalation
• 🤫 Insider threats
🌐 NIDS (Network-based IDS):
Monitors network traffic — packets, patterns, anomalies.
Great for spotting:
• 🌊 DDoS attacks
• 🛰 Port scanning
• 🌐 Suspicious traffic
🧩 Why both?
They cover each other's blind spots — HIDS sees local stuff NIDS can’t, and vice versa.
✅ Together = Layered defense
A key part of the Defense in Depth strategy.
#CyberSecurity #HIDS #NIDS #IDS #DefenseInDepth #InfoSec #NetworkSecurity #HostSecurity #IntrusionDetection #BlueTeam
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🔍 HIDS (Host-based IDS):
Watches inside the system — logs, file changes, system calls.
Great for spotting:
• 🐛 Malware persistence
• 🔐 Privilege escalation
• 🤫 Insider threats
🌐 NIDS (Network-based IDS):
Monitors network traffic — packets, patterns, anomalies.
Great for spotting:
• 🌊 DDoS attacks
• 🛰 Port scanning
• 🌐 Suspicious traffic
🧩 Why both?
They cover each other's blind spots — HIDS sees local stuff NIDS can’t, and vice versa.
✅ Together = Layered defense
A key part of the Defense in Depth strategy.
#CyberSecurity #HIDS #NIDS #IDS #DefenseInDepth #InfoSec #NetworkSecurity #HostSecurity #IntrusionDetection #BlueTeam
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
👍1
🚨 هک بانک سپه توسط گنجشک درنده؟! | پشتپرده حمله سایبری مرموز و اختلال سراسری در خدمات بانکی
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
YouTube
🚨 هک بانک سپه توسط گنجشک درنده؟! | پشتپرده حمله سایبری مرموز و اختلال سراسری در خدمات بانکی
در این ویدیو به بررسی دقیق و موشکافانه حمله سایبری گسترده به بانک سپه میپردازیم؛ حملهای که باعث اختلال در خدمات غیرحضوری و احتمالا جایگاههای سوخت شده است.
گروه هکری «گنجشک درنده» مسئولیت این حمله را برعهده گرفته، اما آیا واقعاً این حمله یک خرابکاری معمولی…
گروه هکری «گنجشک درنده» مسئولیت این حمله را برعهده گرفته، اما آیا واقعاً این حمله یک خرابکاری معمولی…
❤2👎2
InfoSecTube pinned «🚨 هک بانک سپه توسط گنجشک درنده؟! | پشتپرده حمله سایبری مرموز و اختلال سراسری در خدمات بانکی 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us»
🔐 What is Kerckhoffs’ Principle—and why does it matter?
🧠 Kerckhoffs’ Principle:
A secure system should stay secure even if everything except the key is public.
💡 It means:
– Don’t rely on secrecy of code
– Rely on strong, well-reviewed cryptography
– Embrace transparency
📂 Open-source security tools (like OpenSSL) follow this rule:
✔️ Code is public
✔️ Security comes from robust design + secret keys
✔️ Enables community trust and peer review
🛑 Security through obscurity? That’s a NO 🚫
#CyberSecurity #KerckhoffsPrinciple #OpenSource #Crypto #InfoSec #OpenSSL #SecurityDesign #TrustButVerify #Encryption
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🧠 Kerckhoffs’ Principle:
A secure system should stay secure even if everything except the key is public.
💡 It means:
– Don’t rely on secrecy of code
– Rely on strong, well-reviewed cryptography
– Embrace transparency
📂 Open-source security tools (like OpenSSL) follow this rule:
✔️ Code is public
✔️ Security comes from robust design + secret keys
✔️ Enables community trust and peer review
🛑 Security through obscurity? That’s a NO 🚫
#CyberSecurity #KerckhoffsPrinciple #OpenSource #Crypto #InfoSec #OpenSSL #SecurityDesign #TrustButVerify #Encryption
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
❤1
⚖️ MAC Truncation: Speed vs Security?
🔐 MAC (Message Authentication Code) ensures data integrity & authenticity.
But what if we truncate it—use only 64 bits of a 128-bit MAC?
💡 Why truncate?
✅ Saves bandwidth
✅ Reduces storage
✅ Useful in constrained systems (like IoT)
😬 The trade-off?
Shorter MAC = 🎯 Higher chance of forgery
Attackers can guess valid tags more easily.
🔒 Always match truncation length to your threat model—don’t sacrifice security for speed blindly!
#CyberSecurity #MAC #Integrity #IoTSecurity #MessageAuthentication #InfoSec #SecureDesign #CryptoTips
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🔐 MAC (Message Authentication Code) ensures data integrity & authenticity.
But what if we truncate it—use only 64 bits of a 128-bit MAC?
💡 Why truncate?
✅ Saves bandwidth
✅ Reduces storage
✅ Useful in constrained systems (like IoT)
😬 The trade-off?
Shorter MAC = 🎯 Higher chance of forgery
Attackers can guess valid tags more easily.
🔒 Always match truncation length to your threat model—don’t sacrifice security for speed blindly!
#CyberSecurity #MAC #Integrity #IoTSecurity #MessageAuthentication #InfoSec #SecureDesign #CryptoTips
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎓 Get Perplexity Pro FREE with Your Academic Email!
If you’re a student, researcher, or educator, you can now get Perplexity Pro — one of the best AI research assistants — absolutely FREE!
All you need to do is sign up using your academic email address.
🔗 Claim it here: https://plex.it/referrals/W8ZIEBLC
✨ Features of Perplexity Pro:
Unlimited Copilot (ask follow-up questions easily)
Faster, deeper answers
Priority access to new tools
Perfect for writing papers, doing research, or exploring any topic intelligently!
🧠 Don’t miss out — upgrade your academic life for $0!
#AI #Perplexity #Students #AcademicTools #FreeResources #ResearchAssistant #Productivity
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
If you’re a student, researcher, or educator, you can now get Perplexity Pro — one of the best AI research assistants — absolutely FREE!
All you need to do is sign up using your academic email address.
🔗 Claim it here: https://plex.it/referrals/W8ZIEBLC
✨ Features of Perplexity Pro:
Unlimited Copilot (ask follow-up questions easily)
Faster, deeper answers
Priority access to new tools
Perfect for writing papers, doing research, or exploring any topic intelligently!
🧠 Don’t miss out — upgrade your academic life for $0!
#AI #Perplexity #Students #AcademicTools #FreeResources #ResearchAssistant #Productivity
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
👨💻 آموزش کامل کنترل سیستم با Chrome Remote Desktop | ابزار مخفی ردتیم!
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
YouTube
👨💻 آموزش کامل کنترل سیستم با Chrome Remote Desktop | ابزار مخفی ردتیم!
در این ویدیو به یکی از کاربردیترین ابزارهای گوگل برای دسترسی ریموت یعنی Chrome Remote Desktop میپردازیم. این ابزار که در ظاهر برای پشتیبانی از راه دور طراحی شده، در عمل میتواند در سناریوهای Red Team بهعنوان راه نفوذ یا حفظ دسترسی استفاده شود!
✅ آموزش…
✅ آموزش…
🔥1
🧩 Tunneling Tricks: SSH over Port 443?!
🚫 Traditional firewalls? Just block by IP & port — easy to bypass by tunneling disallowed protocols over allowed ports (like SSH over 443).
🧠 Modern firewalls fight back with:
🔍 Deep Packet Inspection (DPI)
🔐 Application-Layer Gateways (ALGs)
They look inside traffic to catch protocol mismatches (e.g., SSH handshake on HTTPS port).
⚠️ But… encrypted tunnels (like TLS) can hide payloads.
✅ That’s why we need endpoint monitoring & anomaly detection too.
#CyberSecurity #Firewall #DPI #SSH #TLS #ProtocolTunneling #NetworkSecurity #InfoSec #ZeroTrust
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🚫 Traditional firewalls? Just block by IP & port — easy to bypass by tunneling disallowed protocols over allowed ports (like SSH over 443).
🧠 Modern firewalls fight back with:
🔍 Deep Packet Inspection (DPI)
🔐 Application-Layer Gateways (ALGs)
They look inside traffic to catch protocol mismatches (e.g., SSH handshake on HTTPS port).
⚠️ But… encrypted tunnels (like TLS) can hide payloads.
✅ That’s why we need endpoint monitoring & anomaly detection too.
#CyberSecurity #Firewall #DPI #SSH #TLS #ProtocolTunneling #NetworkSecurity #InfoSec #ZeroTrust
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🐚 Shell Behavior
How does a UNIX shell run your command?
fork() — create child
In child: modify environment (e.g. redirection), then exec()
In parent: wait() for child to finish
🔄 Enables features like:
I/O redirection: >
Pipes: |
Background jobs: &
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
How does a UNIX shell run your command?
fork() — create child
In child: modify environment (e.g. redirection), then exec()
In parent: wait() for child to finish
🔄 Enables features like:
I/O redirection: >
Pipes: |
Background jobs: &
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🧵 Do Threads Share Everything? Not Quite.
When working with threads, it's easy to assume they share everything — but that's not entirely true.
One important thing threads do not share:
🗂 The Stack
🧠 Each thread has its own stack — a private space used for function calls and local variables.
That means:
✔️ Local variables inside functions are thread-private
❌ Other threads can’t access them directly
📍 This avoids accidental overwrites or race conditions with stack variables
🧪 Example:
Even if you launch 5 threads running this function, each one gets its own copy of counter on its own stack.
📤 Want to Share Data?
You'll need to use:
📦 The heap (via malloc, new, etc.)
📍 Or other globally accessible memory, like static/global vars or shared buffers
🔗 Don’t forget to protect it with mutexes or semaphores if it’s being written by multiple threads! 🛡
🧩 TL;DR
Each thread = its own stack 📚
Local variables = thread-local
Shared data? Use heap/global memory + proper synchronization.
#Threading #OSInternals #Concurrency #HeapVsStack #InfoSecTube
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
When working with threads, it's easy to assume they share everything — but that's not entirely true.
One important thing threads do not share:
🗂 The Stack
🧠 Each thread has its own stack — a private space used for function calls and local variables.
That means:
✔️ Local variables inside functions are thread-private
❌ Other threads can’t access them directly
📍 This avoids accidental overwrites or race conditions with stack variables
🧪 Example:
void *thread_func(void *arg) {
int counter = 0; // Private to each thread
...
}
Even if you launch 5 threads running this function, each one gets its own copy of counter on its own stack.
📤 Want to Share Data?
You'll need to use:
📦 The heap (via malloc, new, etc.)
📍 Or other globally accessible memory, like static/global vars or shared buffers
🔗 Don’t forget to protect it with mutexes or semaphores if it’s being written by multiple threads! 🛡
🧩 TL;DR
Each thread = its own stack 📚
Local variables = thread-local
Shared data? Use heap/global memory + proper synchronization.
#Threading #OSInternals #Concurrency #HeapVsStack #InfoSecTube
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🔥 چت جی پی تی پلاس شده 2 دلار بعضی جاها 1 دلار!! !
بچه ها OpenAI اومده یه آفر فوق العاده محدود گذاشته که خیلی راحت میتونید اشتراک پلاس رو فقط با 2 دلار اکانت شخصی خودتون فعالسازی کنید!
این فرصت خوب واقعا کوتاهه و هنوز بعد چند روز معلوم نیست قراره تا کی بمونه
☠️حتما یادتون باشه قبل از بیل بعدیتون غیرفعالش کنید:)
https://chatgpt.com/?promo_campaign=team1dollar#team-pricing
https://chatgpt.com/?numSeats=5&selectedPlan=month&promo_campaign=team1dollar#team-pricing-seat-selection-direct
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
بچه ها OpenAI اومده یه آفر فوق العاده محدود گذاشته که خیلی راحت میتونید اشتراک پلاس رو فقط با 2 دلار اکانت شخصی خودتون فعالسازی کنید!
این فرصت خوب واقعا کوتاهه و هنوز بعد چند روز معلوم نیست قراره تا کی بمونه
☠️حتما یادتون باشه قبل از بیل بعدیتون غیرفعالش کنید:)
https://chatgpt.com/?promo_campaign=team1dollar#team-pricing
https://chatgpt.com/?numSeats=5&selectedPlan=month&promo_campaign=team1dollar#team-pricing-seat-selection-direct
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
👎3👍1
🌐 What are SYN Cookies—and what do they teach us about secure design?
🛡 SYN Cookies defend against SYN flood attacks (DoS).
Instead of storing info for every half-open TCP handshake, the server:
🔢 Encodes state into the TCP sequence number
🧠 Allocates memory only after receiving the final ACK
📌 This follows Principle P20: Reluctant Allocation
👉 Don’t commit resources until necessary
👉 Helps prevent resource exhaustion attacks
💡 Smart, efficient, secure.
#CyberSecurity #SYNcookies #TCP #DDoS #ReluctantAllocation #SecurityPrinciples #DoSProtection #InfoSec #NetworkSecurity
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🛡 SYN Cookies defend against SYN flood attacks (DoS).
Instead of storing info for every half-open TCP handshake, the server:
🔢 Encodes state into the TCP sequence number
🧠 Allocates memory only after receiving the final ACK
📌 This follows Principle P20: Reluctant Allocation
👉 Don’t commit resources until necessary
👉 Helps prevent resource exhaustion attacks
💡 Smart, efficient, secure.
#CyberSecurity #SYNcookies #TCP #DDoS #ReluctantAllocation #SecurityPrinciples #DoSProtection #InfoSec #NetworkSecurity
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us