filmov
tv
Cross-Site Scripting Explained with Examples and How to Prevent XSS with Content Security Policy
![preview_player](https://i.ytimg.com/vi/pD6C1-zSxIM/maxresdefault.jpg)
Показать описание
In this video, I discuss XSS Cross-Site scripting attacks and how to prevent them.
0:00 Intro
2:40 XSS Stored Attacks
The injected script is stored permanently on the target servers. The victim then retrieves this malicious script from the server when the browser sends a request for data.
4:50 Reflected XSS Attacks
When a user is tricked into clicking a malicious link, submitting a specially crafted form, or browsing to a malicious site, the injected code travels to the vulnerable website. The Web server reflects the injected script back to the user's browser, such as in an error message, search result, or any other response that includes data sent to the server as part of the request. The browser executes the code because it assumes the response is from a "trusted" server which the user has already interacted with.
8:00 Source Code Explained
9:50 Prevent XSS Attacks with CSP
16:00 Prevent all scripts with CSP
Source Code
🏭 Backend Engineering Videos
💾 Database Engineering Videos
🛰 Network Engineering Videos
🏰 Load Balancing and Proxies Videos
🐘 Postgres Videos
🚢Docker
🧮 Programming Pattern Videos
🛡 Web Security Videos
🦠 HTTP Videos
🐍 Python Videos
🔆 Javascript Videos
Become a Member
Support me on PayPal
Become a Patreon
Stay Awesome,
Hussein
0:00 Intro
2:40 XSS Stored Attacks
The injected script is stored permanently on the target servers. The victim then retrieves this malicious script from the server when the browser sends a request for data.
4:50 Reflected XSS Attacks
When a user is tricked into clicking a malicious link, submitting a specially crafted form, or browsing to a malicious site, the injected code travels to the vulnerable website. The Web server reflects the injected script back to the user's browser, such as in an error message, search result, or any other response that includes data sent to the server as part of the request. The browser executes the code because it assumes the response is from a "trusted" server which the user has already interacted with.
8:00 Source Code Explained
9:50 Prevent XSS Attacks with CSP
16:00 Prevent all scripts with CSP
Source Code
🏭 Backend Engineering Videos
💾 Database Engineering Videos
🛰 Network Engineering Videos
🏰 Load Balancing and Proxies Videos
🐘 Postgres Videos
🚢Docker
🧮 Programming Pattern Videos
🛡 Web Security Videos
🦠 HTTP Videos
🐍 Python Videos
🔆 Javascript Videos
Become a Member
Support me on PayPal
Become a Patreon
Stay Awesome,
Hussein
Комментарии