#xss #cross_site_scripting #xss_attacks #xss_protection
Understanding Cross-Site Scripting is important for web developers, aspiring security engineers, and Internet users in general. XSS is one of the most common threats on the web. Cross-site Scripting allows attackers to penetrate vulnerable systems and perform malicious actions, such as stealing data, hijacking sessions, etc.
In this video, I explain Cross-Site Scripting by starting with a general explanation of injection attacks. You’ll understand what are they and how they are possible. You'll also learn what an XSS attack is and how it is performed. Types of XSS attacks and ways to protect against them are addressed as well.
-------- Video Outline --------
00:00 Vulnerable Systems and Security Threats
00:38 Example of XSS attack - Stored XSS
02:25 Injection Attacks
02:41 Injection Attacks - SQL Injection
03:20 Client-Side Injection Attacks - Cross-Site Scripting
04:40 How XSS attacks work
05:31 Types of XSS attacks & Protection measures
05:53 Stored XSS Attacks
07:40 Reflected XSS Attacks
08:50 DOM-based XSS Attacks
09:23 Mutation-Based Attacks
Resources to know more:
https://portswigger.net/web-security/...
https://owasp.org/www-community/attac...
https://developer.mozilla.org/en-US/d...
Check out more of The TechCave Videos:
• What is CORS? | Cross-Origin Resource... - CORS | Cross-Origin Resource Sharing
• The Http and the Web | Http Explained... - HTTP and The Web
• APIs | REST | REST APIs Demystified - REST APIs
• What is DevOps | Understanding DevOps... - DevOps
• Web Services - Demystified! - Web Services
• Software Architecture | Architectural... - Software Architecture
Artwork and Illustration: Flaticon.com
Stay Tuned!
Watch video What is XSS? | Understanding Cross-Site Scripting | XSS Explained online without registration, duration hours minute second in high quality. This video was added by user The TechCave 03 June 2021, don't forget to share it with your friends and acquaintances, it has been viewed on our site 12,86 once and liked it 30 people.