filmov
tv
How Hackers Use Stored Cross Site Scripting (XSS) to Steal Session Cookies (and how to mitigate it)
Показать описание
This video demonstration utilizes the Portswigger Web Academy (a free online training platform) to demonstrate how Cross Site Scripting can be used to steal session cookies from users who browse the vulnerable website. Watch until the end to learn how to protect yourself online from this attack, and what web developers should be doing to keep their site secured.
Disclaimer: This content is intended to be consumed by cyber security professionals, ethical hackers, and penetration testers. Any attacks performed in this video should only be performed in environments that you control or have explicit permission to perform them on.
00:00 - Intro
00:15 - Identifying the Vulnerability
03:20 - Proof of Concept Payload
04:40 - Stealing Cookies
08:50 - Mitigation
👇 SUBSCRIBE TO INFINITELOGINS YOUTUBE CHANNEL NOW 👇
Blog post mentioned in video:
Mitigation Resources:
___________________________________________
Social Media:
___________________________________________
Donations and Support:
Like my content? Please consider supporting me on Patreon:
Purchase a VPN Using my Affiliate Link
___________________________________________
Tags: #EthicalHacking #ComputerSecurity #XSS
Disclaimer: This content is intended to be consumed by cyber security professionals, ethical hackers, and penetration testers. Any attacks performed in this video should only be performed in environments that you control or have explicit permission to perform them on.
00:00 - Intro
00:15 - Identifying the Vulnerability
03:20 - Proof of Concept Payload
04:40 - Stealing Cookies
08:50 - Mitigation
👇 SUBSCRIBE TO INFINITELOGINS YOUTUBE CHANNEL NOW 👇
Blog post mentioned in video:
Mitigation Resources:
___________________________________________
Social Media:
___________________________________________
Donations and Support:
Like my content? Please consider supporting me on Patreon:
Purchase a VPN Using my Affiliate Link
___________________________________________
Tags: #EthicalHacking #ComputerSecurity #XSS
Комментарии