Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cross Site Scripting (XSS) Attacks for Pentesters
Introduction
Introduction to Cross Site Scripting (XSS) Attacks for Pentesters (2:30)
What, Why and Types of XSS (2:12)
Types of XSS
Reflected XSS or Non-Persistent XSS (3:11)
Stored XSS or Persistent XSS (2:49)
DOM XSS (4:16)
mXSS or Mutation XSS (5:25)
RPO or Relative Path Overwrite XSS (5:04)
Source of XSS
What are the different Sources of XSS? (3:15)
Different Contexts in XSS
HTML Context (1:42)
Attribute Context (5:26)
URL Context (3:31)
Style Context (3:30)
Script Context (3:13)
XSS Attacks in Realworld
Exploiting XSS with OWASP Xenotix XSS Exploit Framework (8:32)
XSS Protection
XSS Protection (4:35)
XSS Protection Cheatsheet
Exploiting XSS with OWASP Xenotix XSS Exploit Framework
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock