Cracking Websites with Cross Site Scripting - Computerphile

Поделиться
HTML-код
  • Опубликовано: 25 янв 2025

Комментарии • 908

  • @SpencerGreenDotNet
    @SpencerGreenDotNet 8 лет назад +3400

    "That's JavaScript code! I'm gonna run that!"
    Gotta love the childlike enthusiasm of this personification of web browsers.

  • @Tokkemon
    @Tokkemon 9 лет назад +4445

    That's Javascript! I'm gonna run that!!! -Quote of the year.

  • @Computerphile
    @Computerphile  11 лет назад +737

    now, should we keep that end graphic? :)

  • @PrivatePaul
    @PrivatePaul 10 лет назад +2525

    why in the world are you doing this in a hotel lobby?

  • @Wrswest
    @Wrswest 9 лет назад +1167

    There's a comment in a Javascript project I worked on that says:
    [bunch of checks for user input]
    //You know, if the users could just be more considerate
    //I wouldn't have to do any of this.

  • @zwz.zdenek
    @zwz.zdenek 11 лет назад +841

    The guy who found the Facebook vulnerability was actually rudely rejected by Facebook and got his well deserved money as donations!

  • @DavidChipman
    @DavidChipman 9 лет назад +848

    I love Tom Scott's enthusiasm for this stuff!

  • @idamontede
    @idamontede 9 лет назад +1487

    *-html styling does not work in youtube comments. believe me-*

  • @capnapalm
    @capnapalm 11 лет назад +48

    I love these videos because they explain how people have broken into webpages to re-write them, steal info, etc. You always hear how vulnerable stuff can be but never the specifics about how people get in.
    Great videos as usual, Brady!

  • @カラスKarasu
    @カラスKarasu 9 лет назад +307

    "Which is not entiiiirely legal under the computer misuse act, but no one pressed charges"
    I didn't know he was such a rebel XD

  • @ComputersAreRealCool
    @ComputersAreRealCool 9 лет назад +576

    *Apparently HTML Works in RUclips Comments, judging by the large amount of bold comments*
    Can I put bootstrap into my comments to make them look pretty?

  • @joeytje50
    @joeytje50 11 лет назад +80

    Another cool thing for input dropdowns, is changing the value of one of the s in the , and then submitting. Especially if the output does something with the value of the dropdown, for example with an age input where the output has control over the date format, it completely screws up. Example:
    I change my birthday to "Cake Pie 1000BC". That will, on a lot of sites with profiles that use this dropdown system for birthdays, completely break the thing when it's trying to convert the month number for example to the month name, since there is no "Pie"th month in the year. It's quite harmless, unless the site actually displays the thing you entered in the input directly on the page, in which case you might indeed be able to insert a script tag.
    PS: I've managed to cause my profile to completely break by doing this on a site once, after which it just gave me back an error 500. Great fun. I decided to change it back afterwards though. (keep in mind that if your birthday is loaded onto your settings page too, you might also get an error on the settings page, and you won't be able to change it back)

  • @Computerphile
    @Computerphile  11 лет назад +45

    In a very dark place that wouldn't let us use a light! - its the Renaissance Hotel at St Pancras, London >Sean

  • @hakeemgreen8788
    @hakeemgreen8788 10 лет назад +115

    I love this guys enthusiasm when explaining. Makes it more interesting.

  • @_Super_Hans_
    @_Super_Hans_ 11 лет назад +9

    I didn't understand a single word of what that guy just said but he's super engaging and the 8 minutes flew by.

  • @hoon4tw
    @hoon4tw 11 лет назад +4

    Tom Scott is definitely my new favorite, especially considering all of Brady's other channels have slowed down. Tom is making a very good showing. Keep it up.

  • @kimbosprite
    @kimbosprite 9 лет назад +42

    This man has a lot of energy and enthusiasm for this topic.

  • @illustriouschin
    @illustriouschin 11 лет назад +4

    I would just like to thank who ever's idea it was to do the Audible promotion because audio books are expensive and getting a free one was a really nice gesture.

  • @aspermwhalespontaneouslyca8938
    @aspermwhalespontaneouslyca8938 Год назад +12

    The ending doesn't have a dash because you are supposed to binge the next 20 computerphile videos after it...

  • @EliPerelman
    @EliPerelman 11 лет назад +9

    XSS is even more dangerous when coupled with Cross-site Request Forgery (CSRF). A video on CSRF would probably be a nice follow-up to this.

  • @tajultonim
    @tajultonim Год назад +5

    "Cross site scripting is the number one vulnerability on the web today"
    me watching in 2023: hmmmm, sounds legit...

  • @vuralmecbur9958
    @vuralmecbur9958 10 лет назад +392

    2:35 I've never seen a JavaScript code that looks like "i+i=2", it looks more like an equation :D

  • @Hiimstring3
    @Hiimstring3 11 лет назад +4

    Defiantly the most ecstatic video you've done, really entertaining, whilst also quite educational.

  • @juan193
    @juan193 8 лет назад +101

    So Wikipedia describes him as a comedian to which I agree, but... Does he have a Masters in computer science or a title alike? He's got an amazing skill to explain complex stuff!

  • @DivinityStripes
    @DivinityStripes 11 лет назад +31

    Tom Scott is really good at explaining things and I LOVE the concepts he explains.
    More from Mr. Scott? :3

  • @henhouse
    @henhouse 9 лет назад +186

    This video just helped me notice an XSS vulnerability on one of my sites. Thank you. :|

  • @ShellmanDeluxe
    @ShellmanDeluxe 11 лет назад +7

    I like the dark lighting. Makes it feel more laid back and down to earth :D

  • @imagedezach
    @imagedezach 6 лет назад +11

    Tom explains this in 8 mins better than my Network security professor in an entire lecture

  • @nandoflorestan
    @nandoflorestan 8 лет назад +398

    The content of this video is true, however, none of it is about cross-site scripting.

  • @malinovy_pirojok
    @malinovy_pirojok 3 месяца назад

    12 years later, I find this video, Tom Scott thanks for the information and your enthusiasm)

  • @el__monke
    @el__monke 9 лет назад +228

    *bold*
    _slant_
    -strike-
    *_-Magic-_*

  • @RichardMurrie
    @RichardMurrie 11 лет назад +79

    Great video. I wish I had been taught at school by someone speaking passionately about their subjects like he does!

  • @TehGordonFreeman
    @TehGordonFreeman 11 лет назад +4

    I like the darkness, it adds to the atmosphere, and (at least I can) still see everything just fine...

  • @maurerpe
    @maurerpe 11 лет назад +17

    Client side filtering is a good idea because it can make it easier on the legitimate user. E.g. tell them the phone number is invalid before they hit submit, saving them time.
    But client side prefiltering does not add any additional security. All inputs must be fully validated at the server. There is no guarantee that an attacker will be using a polite client that follows your prefiltering rules. An attacker can download the page and remove the rules.

  • @won1853
    @won1853 11 лет назад +45

    He's so funny yet so informative. More of this guy!

  • @tinkerttoy
    @tinkerttoy 11 лет назад +1

    Absolutely! I adore how he speaks so strongly about these things, his rhetorical skills are very well-developed and he's a joy to listen to.

  • @idevilousbho5491
    @idevilousbho5491 5 лет назад +3

    I'm a BS Physics student(first year) I really want to learn more about Cyber Security, I want to shift but I would waste my scholarship so yeah I'm watching your videos...Thank you!

  • @BrendtWaters
    @BrendtWaters 11 лет назад

    Between the SQL holes video and this one, I sure am glad that Tom Scott is on our side.

  • @UberJamesMan
    @UberJamesMan 9 лет назад +415

    wut wut

  • @werdnativ
    @werdnativ 11 лет назад

    You're right that it's not on the server, but you can certainly use this technique to change things there: If I can have the site display my script within your browser session, I can take over your account. That means, deleting your inbox, transferring your money, etc. It all happens through the "front door" as far as the server knows, but it's being done through a hijacked session.

  • @alpenwasser6869
    @alpenwasser6869 11 лет назад +6

    Ah yes, Bobby Tables. Definitely one of the more amusing tech jokes I've come across, still gets a good chuckle from me every time I read it. :)

  • @DarkYuan
    @DarkYuan 11 лет назад

    Its worth mentioning (and possibly a future video topic) that even if your website's forms are supposedly "secure" anybody can make a form on their own site that submits to yours. No matter what make sure ALL input processed by your website is properly escaped.

  • @Alex2Buzz
    @Alex2Buzz 9 лет назад +8

    "Someone *at Netscape* comes along and invents JavaScript!"

  • @codebeatr
    @codebeatr 11 лет назад +2

    Please, talk this guy into having his own channel, or make more videos with him, he is awesome!

  • @vacklinge
    @vacklinge 11 лет назад +4

    I love this guy. He really seems to love what he's doing.

  • @EddyProca
    @EddyProca 11 лет назад

    They are two different tags. b is for text that is supposed to be bold, but not for styling reasons. strong is for text that is supposed to be styled in a way that makes it more prominent than the rest of the text.

  • @prestonferry
    @prestonferry 5 лет назад +7

    Tom “You should know this” Scott

  • @Azure1992
    @Azure1992 11 лет назад

    I liked the little touch of you guys putting the / in the closing tag at the end of the show.

  • @AugustEllison1
    @AugustEllison1 11 лет назад +7

    The passion and enthousiasm is great ! More please :)

  • @NetgearProductions
    @NetgearProductions 10 лет назад +7

    So how on earth could you use javascript to make a webpage send users info to your pc if it only affects you?

  • @runescaper1333
    @runescaper1333 10 лет назад +82

    So if I typed *and closed it with* , youtube will make it bold?

  • @imjinc2k
    @imjinc2k 11 лет назад

    Short answer is complexity. In some cases there are automatic filters, but it isn't always clear to each system which input is trusted and which isn't. MySQL, for example, doesn't know whether it's talking to an administrator sending handwritten commands, or the web app itself. Parts of your 'site' may include 3rd-party JavaScript pulled from advertisers, or analytics, or a database. There might be a WYSIWYG editor on your site that allows users to mark up their comments with HTML, etc...

  • @voxlvalyx
    @voxlvalyx 9 лет назад +60

    The white balancing in this video confuses me.

  • @faizanshariff7246
    @faizanshariff7246 2 года назад

    Watching this in 2022 and this still feels so relevant.

  • @danielsimmons3956
    @danielsimmons3956 8 лет назад +9

    Where did you even get dot matrix printer paper?

  • @bzkoss236
    @bzkoss236 11 лет назад

    Actually, Brady doesn't need to end the computerphile logo with >/computerfile> because there are some html elements that do not use closing tags, like the meta, link, and input tags.

  • @IceMetalPunk
    @IceMetalPunk 11 лет назад +5

    Omegle had that same problem for a bit when they introduced Spy Mode. They weren't sanitizing their question inputs, so for a while I would go around sticking JS in there that froze the computers of whoever got stuck with my question XD They fixed it in a few days, though.

  • @Butt4cak3
    @Butt4cak3 11 лет назад

    That's probably more because it's more user-friendly. You can't control what the user sends to the server by using specific controls. As a visitor, you can actually change a page's appearance. For example, in Google Chrome, right click the RUclips search bar, go to element inspection, right click the highlighted line in the bottom section and add an attribute type="number". It will change into a number input. You can do something like this to a dropdown and make it a text input instead.

  • @mayur1234560
    @mayur1234560 11 лет назад +3

    This is amazing! That guy should have more videos!

  • @RyanHansen_101
    @RyanHansen_101 11 лет назад +2

    4:03 "Because myspace hadn't quite filtered javascript properly". Brilliant!

  • @MrHyde-fu5sr
    @MrHyde-fu5sr 9 лет назад +3

    don't understand how this could be dangerous.For example anyone can click inspect element and type some text into their web browser and change a COPY of the page they're looking at no one else will ever use that copy you have changed.In this same manner, how would me writing a script inside of my copy of a webpage effect someone else's copy?

    • @lolbajset
      @lolbajset 9 лет назад +4

      +Curran Hyde If i understood the video correctly it is when someone else visits your webpage that the script gets executed. If I make a website and add a script in the middle of its html, it will run when you or anyone else loads the page, thus enabling attacks. Again, that's at least how I understood it, could be wrong

    • @MrAntiKnowledge
      @MrAntiKnowledge 9 лет назад +20

      +Curran Hyde It only becomes a problem for sites which allow users to post something which gets displayed to other users. Like this comment here (only that youtube is smart enought to filter out code). If you don't have a filter active that say... replaces "" with "

      Следующие
      Автовоспроизведение