1 hour 37 minutes
Welcome back to the Reddick's introduction course.
In our last lesson, we went over the different parameters or regular expression to such a word digits, wild cards, ranges or within the other brackets, right and the length of the quarries. Regardless of being 10 characters from 1 to 10 characters, we also went over parameters such ***
seer or 11 or more,
Now, for our next model will actually start building regular expressions.
Now let's say you want to block a malicious word that's been constantly triggering right. This could be content that is illegal. Liska be content that it's a code word for, Let's say, at acquisition that your company is doing right in this case. I use my name for an example. If you
pretty close attention,
you can see that you have both upper caps and lower cops. Kay, you have different variations of the letter e. You have a letter three Number three.
We have ah little symbol of on top of the E, which were like a till day
and ah, for TV. We have also be right, and for I, we have a one on for the end. We also have a chilled and which is the Indian Spanish right reason. Different symbols, different type of letters and different upper case and lower case in order to cover all these aspects. So
who Bean building at Rodricks? Based on these parameters? Correct. And the best way to do it is again even the cheat cheat me showing above. So in this case will be using the any off portions so us again. We can click on here and you can see it can add it. Now it will add exactly what's in here on the left side. So in this case,
it's detecting either a, B or C, which you can see. It's a defecting it down here.
So we have to modify this and we will be doing is adding all variants up the letter K in this case. And as you can see, I can do either K upper caps or lower cabs.
Now we'll repeat the same concept for all letters of the word will be detecting right and the reason we're doing it like this, it's we want to capture
any variant form of the letter, right? So, again, capital
In this case, I believe it's
Yep, 1 30 All right.
And then we close it
and then you can see temperatures move.
And we forgot number three in this case
in Italy, for example, at a Capitol Ian here, which I don't have an extent example,
you can see it's still detected.
Same thing for the next letter,
the next letter
and the next letter.
And this one is out. 164 And I have a Harley fat finger that yes, I did
Now you're saying Oh, wired. He wants not firing. It's easy because
I forgot to add Be here right on the bottom One
has a special eye,
which is 1 61 There we go.
Now let's say somebody uses l. So this type K three the
l and then the special teal day and right,
you can still sort determined. That's Kevin, right? So in this case for that to be detected, you also have to add L in here. And this is more like a game off creativity, right?
And you have to think how the other person or how the militias actor or how the perfect is trying to stake out confidential from Rachel might think, And this is how you will be building this Radic, sis.
Now let's go over the anchors this start slash end of string.
I have been having a lot of difficulties actually putting this into play in an information the Curia tools.
Let me show you why. If I, for example, type ABC, you can see it's highlighted, which means detected. But immediately, if I have something else,
it just stops working all right, and it's because it's a string. In this case, it's the holding. So this is very, very
precise on what you have to write and the kind of of the scenarios we could be typing this. It's when you exactly know what its return and you receive only one value, like, say, an email, for example. Right, And you want to make sure it's not, Let's say Kevin at
dot com dot you, right.
And this will be the scenario where if you, for example, time to ***. Same thing
You see, Now it's detected,
And if I do the same thing
There you go.
See, It works. So
what happens is if you, for example, get the Valley cold user, and that's the on leave Al you receiving thing. Yes, you can use this and obviously, let's say it's not Kevin. It's
we have, let's say around
current minute being minimum. Then you can see Kevin at this email address will work.
And then let's say if it's
at that address will also work, and that will be doubled the scenarios where you'll be using this again when it's inside. The only thing you received
so you know your survival. You know what it is you really wanna comfort is badly out of the different violence you receive. The only problem is most of the time you receive logs and you will have a lot of valleys. Which will you be using to capture we going over our next lesson?
The OWASP Online test is a premium Cybrary assessment test created by iMocha. It is ...
Assess your Regex skills with Cydefe's capture-the-flag (CTF) style skill assessment.