Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cross Site Scripting (XSS) Attacks for Pentesters
Introduction
Introduction to Cross Site Scripting (XSS) Attacks for Pentesters (2:30)
What, Why and Types of XSS (2:12)
Types of XSS
Reflected XSS or Non-Persistent XSS (3:11)
Stored XSS or Persistent XSS (2:49)
DOM XSS (4:16)
mXSS or Mutation XSS (5:25)
RPO or Relative Path Overwrite XSS (5:04)
Source of XSS
What are the different Sources of XSS? (3:15)
Different Contexts in XSS
HTML Context (1:42)
Attribute Context (5:26)
URL Context (3:31)
Style Context (3:30)
Script Context (3:13)
XSS Attacks in Realworld
Exploiting XSS with OWASP Xenotix XSS Exploit Framework (8:32)
XSS Protection
XSS Protection (4:35)
XSS Protection Cheatsheet
Introduction to Cross Site Scripting (XSS) Attacks for Pentesters
Download
2015-01-11_13-45-43__Cross_Site_Scripting_XSS_Attacks_for_Pentesters.pdf
Download
2015-01-11_13-45-43__Cross_Site_Scripting_XSS_Attacks_for_Pentesters.pdf
Complete and Continue