Cross-site Scripting - SY0-601 CompTIA Security+ : 1.3

Sdílet
Vložit
  • čas přidán 27. 12. 2020
  • Security+ Training Course Index: professormesser.link/sy0601
    Professor Messer’s Course Notes: professormesser.link/601cn
    Professor Messer's Practice Exams: professormesser.link/601ytpe
    Discount Exam Vouchers: professormesser.com/vouchers/
    Professor Messer Recommended Study Materials: professormesser.link/601rs
    - - - - -
    Cross-site scripting takes advantaged of a trusted browser to attack other systems. In this video, you’ll learn about reflected and stored XSS attacks and I’ll demonstrate a cross-site scripting attack on a vulnerable system.
    - - - - -
    Subscribe to get the latest videos: professormesser.link/yt
    Calendar of live events: professormesser.com/calendar/
    Frequently Asked Questions: professormesser.link/faq
    FOLLOW PROFESSOR MESSER:
    Professor Messer website: professormesser.com/
    Discord chat: professormesser.com/discord
    Twitter: professormesser.com/twitter
    Facebook: professormesser.com/facebook
    Instagram: professormesser.com/instagram
    LinkedIn: professormesser.com/linkedin
  • Věda a technologie

Komentáře • 24

  • @jaredpatterson1701
    @jaredpatterson1701 Před rokem +25

    Good lord, the ways people come up with how to do evil to one another 🙄😑

  • @jacksippel9512
    @jacksippel9512 Před rokem +22

    Very clear description of both types of XSS. I appreciated the demonstration in WebGoat, and the real world example with Subaru.

  • @deeptisharma9889
    @deeptisharma9889 Před 3 lety +42

    All your videos are so informational.. thank you !

  • @howardharris4718
    @howardharris4718 Před 3 lety +22

    Excellent quality lecture very clear and easy to understand. Thanks you professor messer you have taught me a lot.

  • @Frawks
    @Frawks Před 9 měsíci +2

    This is amazing ! I am so happy I got into bug bounties as a hobby because all that stuff I learned through that has been in this course!! 🎉🎉🎉 Let's goooooo

  • @hananonihongo
    @hananonihongo Před 2 lety +3

    Thank you for the courses, Professor Messer - you're the best!

  • @jennakfae
    @jennakfae Před měsícem

    great video. simple explanations thank you

  • @Rubelefsky
    @Rubelefsky Před 10 měsíci

    Amazing information, thank you.

  • @BigPorta
    @BigPorta Před rokem +5

    Give me 6 months going straight for Sec+

    • @felicianomanguele6428
      @felicianomanguele6428 Před 7 měsíci +1

      1 month left

    • @justinburnett2173
      @justinburnett2173 Před 2 měsíci

      Well did you do it?

    • @BigPorta
      @BigPorta Před 2 měsíci

      @@justinburnett2173 Thanks for holding me accountable! I actually didn’t I went back to school and was finishing my associates. When we had a major loss in my family. But out of respect for the lost loved one I will finish and comeback to this thread with updates.

  • @chinedungene9392
    @chinedungene9392 Před rokem

    THANK YOU PROF❤

  • @saidulafsarkhondoker
    @saidulafsarkhondoker Před 3 lety +7

    Thank you!

  • @tgrav3
    @tgrav3 Před rokem

    These videos are so helpful! Thanks to Professor Messer I already passed CompTIA Network+ n10-008

  • @clintmillent
    @clintmillent Před rokem

    So would it be best to know how to use java, and any programs we are protecting?

  • @stikx-manswoodcraft1840
    @stikx-manswoodcraft1840 Před 2 lety +2

    Thanks bro for your vids!

  • @Redrumm
    @Redrumm Před 2 lety +1

    finally I understand this, thank you 😊

  • @coreyswantner8629
    @coreyswantner8629 Před 3 lety +3

    I would think that persistent XSS would be the most popular due its inherent ability to gain a breadth of data off of a high volume of users. Though would it require more risk of being caught?

    • @cgme9535
      @cgme9535 Před rokem

      I think your thinking is correct.
      If it stays there then it could certainly infect more users, but with modern knowledge of this attack, it possibly wouldn't get as many bites due to it being discovered. A reflected attack, while short-lived, might get more people in the long run.

    • @iSgapetti
      @iSgapetti Před 9 měsíci +2

      It is a well-documented vulnerability, but not "popular" in the sense that there are not a lot of persistent XSS vulnerabilities out there. Web developers generally know how damaging this vulnerability is, so they lock that shit down.

  • @MichaelFlenderson
    @MichaelFlenderson Před 5 měsíci

    🦥

  • @Adrastus_
    @Adrastus_ Před 10 měsíci

    THANK YOU PROF❤