InfoSecTube
1.71K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
🔐⚡️ Hybrid Encryption: Best of Both Crypto Worlds
Why choose between speed and security when you can have both?
That’s the power of Hybrid Encryption — the backbone of modern secure communication. 🧠🔑

🧠 What Is Hybrid Encryption?
Hybrid encryption combines:

Asymmetric encryption (🔐 public/private keys)

Symmetric encryption (⚡️ fast, shared secret key)

You use the asymmetric system to securely exchange a symmetric key, then use that symmetric key to encrypt the actual data.

📘 "Hybrid encryption leverages the strengths of both symmetric and asymmetric algorithms: speed and secure key exchange."

🎯 Why Use It?
Asymmetric encryption (like RSA or ECC) is secure for key exchange, but slow for large data
Symmetric encryption (like AES or ChaCha20) is fast, but requires secure key sharing

Hybrid encryption = secure key exchange + fast data encryption 💡

🧪 How It Works (Simplified):

🔑 Generate a random symmetric key (e.g., AES key)

📨 Encrypt the AES key with the recipient’s public key (RSA)

📦 Encrypt the message with AES

🚀 Send both: the encrypted key + the encrypted message

Only the recipient with the private key can decrypt the AES key, then use it to decrypt the message 🔓

🌍 Where It’s Used:


TLS/HTTPS (your browser does this every time you open a secure site!)

Secure email (e.g., PGP/GPG)

Encrypted messaging apps (e.g., Signal, WhatsApp)

Secure file storage systems


🧩 TL;DR
Hybrid encryption gives you the speed of symmetric encryption and the security of asymmetric encryption — it’s like mailing a locked box with the key encrypted just for the receiver.

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯 What is Clickjacking—and why is it so sneaky?

🕵️‍♂️ Clickjacking tricks you into clicking something you didn’t mean to—like a hidden button under a legit one (often via transparent iframes).

💡 The trick? It’s not a technical bug—it’s a UI deception.
You think you're clicking “Play,” but you're actually liking a page, submitting a form, or changing settings.

😱 It’s nearly invisible to users—that’s what makes it dangerous.

🛡 How to defend:

X-Frame-Options: DENY

Content-Security-Policy: frame-ancestors 'none'


These prevent your site from being embedded in sneaky iframes.

#CyberSecurity #Clickjacking #WebSecurity #InfoSec #UIHacking #XFrameOptions #CSP #SecureDev #BrowserSecurity

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🛡 HIDS vs NIDS — Why use both?

🔍 HIDS (Host-based IDS):
Watches inside the system — logs, file changes, system calls.
Great for spotting:
🐛 Malware persistence
🔐 Privilege escalation
🤫 Insider threats

🌐 NIDS (Network-based IDS):
Monitors network traffic — packets, patterns, anomalies.
Great for spotting:
🌊 DDoS attacks
🛰 Port scanning
🌐 Suspicious traffic

🧩 Why both?
They cover each other's blind spots — HIDS sees local stuff NIDS can’t, and vice versa.

Together = Layered defense
A key part of the Defense in Depth strategy.

#CyberSecurity #HIDS #NIDS #IDS #DefenseInDepth #InfoSec #NetworkSecurity #HostSecurity #IntrusionDetection #BlueTeam

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
👍1
InfoSecTube pinned «🚨 هک بانک سپه توسط گنجشک درنده؟! | پشت‌پرده حمله سایبری مرموز و اختلال سراسری در خدمات بانکی 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us»
🔐 What is Kerckhoffs’ Principle—and why does it matter?

🧠 Kerckhoffs’ Principle:
A secure system should stay secure even if everything except the key is public.

💡 It means:
– Don’t rely on secrecy of code
– Rely on strong, well-reviewed cryptography
– Embrace transparency

📂 Open-source security tools (like OpenSSL) follow this rule:
✔️ Code is public
✔️ Security comes from robust design + secret keys
✔️ Enables community trust and peer review

🛑 Security through obscurity? That’s a NO 🚫

#CyberSecurity #KerckhoffsPrinciple #OpenSource #Crypto #InfoSec #OpenSSL #SecurityDesign #TrustButVerify #Encryption

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
⚖️ MAC Truncation: Speed vs Security?

🔐 MAC (Message Authentication Code) ensures data integrity & authenticity.
But what if we truncate it—use only 64 bits of a 128-bit MAC?

💡 Why truncate?
Saves bandwidth
Reduces storage
Useful in constrained systems (like IoT)

😬 The trade-off?
Shorter MAC = 🎯 Higher chance of forgery
Attackers can guess valid tags more easily.

🔒 Always match truncation length to your threat model—don’t sacrifice security for speed blindly!

#CyberSecurity #MAC #Integrity #IoTSecurity #MessageAuthentication #InfoSec #SecureDesign #CryptoTips

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎓 Get Perplexity Pro FREE with Your Academic Email!

If you’re a student, researcher, or educator, you can now get Perplexity Pro — one of the best AI research assistants — absolutely FREE!
All you need to do is sign up using your academic email address.

🔗 Claim it here: https://plex.it/referrals/W8ZIEBLC

Features of Perplexity Pro:

Unlimited Copilot (ask follow-up questions easily)

Faster, deeper answers

Priority access to new tools

Perfect for writing papers, doing research, or exploring any topic intelligently!

🧠 Don’t miss out — upgrade your academic life for $0!

#AI #Perplexity #Students #AcademicTools #FreeResources #ResearchAssistant #Productivity

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🧩 Tunneling Tricks: SSH over Port 443?!

🚫 Traditional firewalls? Just block by IP & port — easy to bypass by tunneling disallowed protocols over allowed ports (like SSH over 443).

🧠 Modern firewalls fight back with:

🔍 Deep Packet Inspection (DPI)
🔐 Application-Layer Gateways (ALGs)

They look inside traffic to catch protocol mismatches (e.g., SSH handshake on HTTPS port).

⚠️ But… encrypted tunnels (like TLS) can hide payloads.
That’s why we need endpoint monitoring & anomaly detection too.

#CyberSecurity #Firewall #DPI #SSH #TLS #ProtocolTunneling #NetworkSecurity #InfoSec #ZeroTrust

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🐚 Shell Behavior
How does a UNIX shell run your command?

fork() — create child

In child: modify environment (e.g. redirection), then exec()

In parent: wait() for child to finish

🔄 Enables features like:

I/O redirection: >

Pipes: |

Background jobs: &

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🧵 Do Threads Share Everything? Not Quite.

When working with threads, it's easy to assume they share everything — but that's not entirely true.

One important thing threads do not share:
🗂 The Stack

🧠 Each thread has its own stack — a private space used for function calls and local variables.

That means:

✔️ Local variables inside functions are thread-private
Other threads can’t access them directly
📍 This avoids accidental overwrites or race conditions with stack variables

🧪 Example:

void *thread_func(void *arg) {
int counter = 0; // Private to each thread
...
}

Even if you launch 5 threads running this function, each one gets its own copy of counter on its own stack.

📤 Want to Share Data?
You'll need to use:
📦 The heap (via malloc, new, etc.)
📍 Or other globally accessible memory, like static/global vars or shared buffers
🔗 Don’t forget to protect it with mutexes or semaphores if it’s being written by multiple threads! 🛡

🧩 TL;DR
Each thread = its own stack 📚
Local variables = thread-local
Shared data? Use heap/global memory + proper synchronization.




#Threading #OSInternals #Concurrency #HeapVsStack #InfoSecTube

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🔥 چت جی پی تی پلاس شده 2 دلار بعضی جاها 1 دلار!! !

بچه ها OpenAI اومده یه آفر فوق العاده محدود گذاشته که خیلی راحت میتونید اشتراک پلاس رو فقط با 2 دلار اکانت شخصی خودتون فعالسازی کنید!

این فرصت خوب واقعا کوتاهه و هنوز بعد چند روز معلوم نیست قراره تا کی بمونه

☠️حتما یادتون باشه قبل از بیل بعدیتون غیرفعالش کنید:)


https://chatgpt.com/?promo_campaign=team1dollar#team-pricing

https://chatgpt.com/?numSeats=5&selectedPlan=month&promo_campaign=team1dollar#team-pricing-seat-selection-direct

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
👎3👍1
🌐 What are SYN Cookies—and what do they teach us about secure design?

🛡 SYN Cookies defend against SYN flood attacks (DoS).
Instead of storing info for every half-open TCP handshake, the server:

🔢 Encodes state into the TCP sequence number
🧠 Allocates memory only after receiving the final ACK

📌 This follows Principle P20: Reluctant Allocation
👉 Don’t commit resources until necessary
👉 Helps prevent resource exhaustion attacks

💡 Smart, efficient, secure.

#CyberSecurity #SYNcookies #TCP #DDoS #ReluctantAllocation #SecurityPrinciples #DoSProtection #InfoSec #NetworkSecurity
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🧠 “Wait... That’s Not Normal.”
Your system's acting like Sherlock Holmes — quietly watching everything until something weird happens. That’s Anomaly-Based Detection in action. 🔍🕵️

🎯 How It Works:
Imagine your computer has a memory of what “normal” looks like:
💡 CPU at 15%
💡 Daily logins from Canada
💡 200MB/day in outbound traffic

Then one day...
⚠️ CPU spikes to 95%
⚠️ A login from Russia at 3AM
⚠️ 5GB of data leaves your server in an hour

Your system raises the alarm — because something's off.
No signature needed. Just deviation from normal 📉📈

🧪 Real-World Example:

👤 Employee logs in at 2AM from a location they’ve never used

🌊 Sudden flood of ICMP packets (ping storm) from an internal device

💬 A server process that never accessed the internet suddenly starts sending large payloads

All of these could mean:
👉 Zero-day malware
👉 Insider threat
👉 Compromised account

Why It’s Powerful:

Catches new, unknown attacks (zero-days)

Can spot insider threats or misbehaving users

Doesn’t rely on a predefined blacklist

But It’s Tricky:


High false positives
— unusual ≠ malicious

Needs time
to learn normal behavior

Constantly needs tuning to stay accurate

🧩 TL;DR
Anomaly-based systems don’t look for known threats — they look for weirdness.
When something breaks the pattern, they speak up.

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
InfoSecTube pinned «☠️Blockchain Layers : L0, L1, L2, L3 — The Secret to Speed, Security & Scalability! 🔒 | InfoSecTube 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us»
🧠 3. Backpointer-Based Consistency (BBC)
🔍 What is it?
A technique where every object has a pointer back to its parent or reference holder.

🧩 Used in distributed and object-based file systems (like Ceph)

Key Idea:
You can verify consistency by following backpointers

Helps detect orphaned blocks, inconsistent metadata, or leaks

📌 Example:
If a file block has a pointer back to the inode, you can validate its ownership easily.

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
اگر کاربر #تلگرام Premium هستید، و محتویات و پست‌های کانال مورد توجهت قراره گرفته با Boost کردن کانال ما، در فعال کردن قابلیت انتشار استوری به ما کمک کنید تا بتوانیم محتواهای جذاب را در استوری تلگرام با شما به اشتراک بگذاریم 🚶‍♂️🚶‍♂️❤️🌻
👇👇
https://t.iss.one/boost/InfoSecTube
🎯 Reconnaissance: Know Thy Target

Before any hacker launches an attack, they don’t go in blind.
They study you. They learn your network’s habits, weaknesses, and hidden doors.
That’s the recon phase — the cyber version of casing a bank. 🕶📷

📘 “The attacker’s goal in the reconnaissance phase is to learn as much as possible about the target, including network topology, services, and users.”

🔍 How Recon Works:
Reconnaissance can be:
🟢 Passive (no contact with the target)
🔴 Active (direct probing of the target)

Either way, the attacker is building a blueprint of your digital footprint.

🧪 Examples:

🔎 whois to see domain ownership

🧠 nslookup to grab DNS records

🕵️‍♂️ Google dorking to dig up exposed PDFs, login portals, cameras

🌐 Attempting DNS zone transfers (if misconfigured 😬)

📂 Scraping metadata from public files (author names, file paths, usernames)

Even your job post saying “experience with Cisco routers” can be recon gold 💰

🛡 Why It Matters:
If an attacker knows your services, subdomains, employees, and tech stack — they already have the upper hand before sending a single exploit.

🧩 TL;DR
Recon is the hacker’s homework phase.
The more they know about you, the better they plan the next move.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🚨 Drive-By Download Attack Chain – How You Get Hacked Without Clicking 🎯🖱

Drive-by downloads are stealthy cyberattacks where just visiting a website can infect your system — no clicks required. Often delivered through compromised ad networks, these attacks can hit even legitimate websites.
💥 Realistic Attack Sequence:
1️⃣ Legit Site, Malicious Ad
A trusted website loads ads from a third-party network. One of these ads contains hidden malicious JavaScript.

2️⃣ Redirection Game
The script redirects the user’s browser to an attacker-controlled site — silently, in the background.

3️⃣ Exploit Trigger
The malicious site checks your system for vulnerabilities (e.g., outdated browser, Flash, Java, PDF reader).
It then launches an exploit — like a heap spray or zero-day PDF bug.

4️⃣ Silent Infection
If the exploit works, the attacker downloads and runs malware on your device — spyware, ransomware, or even remote access tools — without your consent or any visible download.

⚠️ Why It’s Dangerous:
No user interaction needed

Targets even high-traffic, reputable sites

Often part of malvertising campaigns

Used in nation-state espionage and mass malware distribution

🛡 Protection Tips:
🔒 Keep browsers and plugins fully updated
🛑 Use ad blockers and script blockers
🌐 Use secure browsers with sandboxing
🔍 Enable click-to-play for Flash and Java
🧼 Regularly scan for malware with reputable tools

📌 One bad ad is all it takes. Stay paranoid, stay patched.

#DriveByDownload #Malvertising #WebSecurity #CyberAttack #ExploitChain #InfoSec #BrowserSecurity #AdNetworkHacks #MalwareDistribution #StaySafeOnline

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us