Cross-site Scripting - SY0-601 CompTIA Security+ : 1.3

Поделиться
HTML-код
  • Опубликовано: 27 дек 2020
  • Security+ Training Course Index: professormesser.link/sy0601
    Professor Messer’s Course Notes: professormesser.link/601cn
    Professor Messer's Practice Exams: professormesser.link/601ytpe
    Discount Exam Vouchers: professormesser.com/vouchers/
    Professor Messer Recommended Study Materials: professormesser.link/601rs
    - - - - -
    Cross-site scripting takes advantaged of a trusted browser to attack other systems. In this video, you’ll learn about reflected and stored XSS attacks and I’ll demonstrate a cross-site scripting attack on a vulnerable system.
    - - - - -
    Subscribe to get the latest videos: professormesser.link/yt
    Calendar of live events: professormesser.com/calendar/
    Frequently Asked Questions: professormesser.link/faq
    FOLLOW PROFESSOR MESSER:
    Professor Messer website: professormesser.com/
    Discord chat: professormesser.com/discord
    Twitter: professormesser.com/twitter
    Facebook: professormesser.com/facebook
    Instagram: professormesser.com/instagram
    LinkedIn: professormesser.com/linkedin
  • НаукаНаука

Комментарии • 24

  • @jacksippel9512
    @jacksippel9512 Год назад +22

    Very clear description of both types of XSS. I appreciated the demonstration in WebGoat, and the real world example with Subaru.

  • @jaredpatterson1701
    @jaredpatterson1701 Год назад +25

    Good lord, the ways people come up with how to do evil to one another 🙄😑

  • @deeptisharma9889
    @deeptisharma9889 3 года назад +42

    All your videos are so informational.. thank you !

  • @howardharris4718
    @howardharris4718 3 года назад +22

    Excellent quality lecture very clear and easy to understand. Thanks you professor messer you have taught me a lot.

  • @Frawks
    @Frawks 9 месяцев назад +2

    This is amazing ! I am so happy I got into bug bounties as a hobby because all that stuff I learned through that has been in this course!! 🎉🎉🎉 Let's goooooo

  • @hananonihongo
    @hananonihongo 2 года назад +3

    Thank you for the courses, Professor Messer - you're the best!

  • @jennakfae
    @jennakfae Месяц назад

    great video. simple explanations thank you

  • @BigPorta
    @BigPorta Год назад +5

    Give me 6 months going straight for Sec+

    • @felicianomanguele6428
      @felicianomanguele6428 7 месяцев назад +1

      1 month left

    • @justinburnett2173
      @justinburnett2173 2 месяца назад

      Well did you do it?

    • @BigPorta
      @BigPorta 2 месяца назад

      @@justinburnett2173 Thanks for holding me accountable! I actually didn’t I went back to school and was finishing my associates. When we had a major loss in my family. But out of respect for the lost loved one I will finish and comeback to this thread with updates.

  • @Rubelefsky
    @Rubelefsky 10 месяцев назад

    Amazing information, thank you.

  • @clintmillent
    @clintmillent Год назад

    So would it be best to know how to use java, and any programs we are protecting?

  • @saidulafsarkhondoker
    @saidulafsarkhondoker 3 года назад +7

    Thank you!

  • @chinedungene9392
    @chinedungene9392 Год назад

    THANK YOU PROF❤

  • @tgrav3
    @tgrav3 Год назад

    These videos are so helpful! Thanks to Professor Messer I already passed CompTIA Network+ n10-008

  • @stikx-manswoodcraft1840
    @stikx-manswoodcraft1840 2 года назад +2

    Thanks bro for your vids!

  • @Redrumm
    @Redrumm 2 года назад +1

    finally I understand this, thank you 😊

  • @coreyswantner8629
    @coreyswantner8629 3 года назад +3

    I would think that persistent XSS would be the most popular due its inherent ability to gain a breadth of data off of a high volume of users. Though would it require more risk of being caught?

    • @cgme9535
      @cgme9535 Год назад

      I think your thinking is correct.
      If it stays there then it could certainly infect more users, but with modern knowledge of this attack, it possibly wouldn't get as many bites due to it being discovered. A reflected attack, while short-lived, might get more people in the long run.

    • @iSgapetti
      @iSgapetti 9 месяцев назад +2

      It is a well-documented vulnerability, but not "popular" in the sense that there are not a lot of persistent XSS vulnerabilities out there. Web developers generally know how damaging this vulnerability is, so they lock that shit down.

  • @MichaelFlenderson
    @MichaelFlenderson 5 месяцев назад

    🦥

  • @Adrastus_
    @Adrastus_ 10 месяцев назад

    THANK YOU PROF❤