Cross-Site Scripting Explained with Examples and How to Prevent XSS with Content Security Policy

Cross-Site Scripting Explained with Examples and How to Prevent XSS with Content Security Policy

Hussein Nasser

4 года назад

56,884 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

K m
K m - 18.09.2023 04:58

What websites let you just store things on them like that?

Ответить
inderkant khandelwaal
inderkant khandelwaal - 07.06.2023 10:57

Great Explanation

Ответить
ganesh k
ganesh k - 15.02.2023 16:00

Hello Hussein after going through video , I realised that it was you . I have watched most of your content on the design

Ответить
semir berisha
semir berisha - 08.01.2023 16:47

So you mean that if we do use CSP XSS can't be injected, right ?

Ответить
Tech
Tech - 01.12.2022 10:27

Mahn! Incredibly fun to watch! Love your content bro

Ответить
Vishal K Sahoo
Vishal K Sahoo - 27.08.2022 15:37

Anybody know how to check if a given website has xss header enabled using pyhton.

Ответить
AssFaceNFT
AssFaceNFT - 08.07.2022 18:02

Very helpful ser!! 🙏🌹❤

Ответить
Genius skills
Genius skills - 23.05.2022 22:27

stupid tutorial and English

Ответить
sharad shinde
sharad shinde - 19.05.2022 10:43

How to implement in struts

Ответить
chill escape
chill escape - 03.05.2022 17:35

Thank you for saying SHE and including us ✨ 🙌🏽 ✨ women hack & code too (:

Ответить
GOD_OF DESTRUCTION
GOD_OF DESTRUCTION - 07.02.2022 22:46

Does xss protection header prevents DOM xss

Ответить
Hardik Mistry
Hardik Mistry - 29.01.2022 21:15

the edvotise was so greate "click here to Boost your CPU"🤣🤣🤣

Ответить
Veronika
Veronika - 13.01.2022 01:14

this is so easily digestable! thank you

Ответить
Daniel Rocha
Daniel Rocha - 06.01.2022 19:00

thanks for the nice explaining it was very enjoyable.

Ответить
Azamat Abdullaev
Azamat Abdullaev - 30.12.2021 23:00

awesome

Ответить
SupSellout
SupSellout - 18.12.2021 20:50

great

Ответить
Cyber Secure
Cyber Secure - 27.11.2021 05:42

We appreciate your efforts

Ответить
Tarun Charan
Tarun Charan - 26.11.2021 13:24

<script> alert("Mad")</script>

Ответить
Sigma MOON
Sigma MOON - 26.11.2021 05:28

Awesome Demo thank's

Ответить
Shariful Islam Mubin
Shariful Islam Mubin - 02.11.2021 17:51

ও মামা।
Amazing explanation!

Ответить
Immanuel
Immanuel - 18.10.2021 17:34

It's very informative!

Ответить
Lena
Lena - 18.09.2021 15:42

Great explanation, thanks!

Ответить
Virendra Bhati
Virendra Bhati - 05.07.2021 07:42

Wow!!
Very informative. I lean new things again in less time.... It will help me a lot to prevent outside to come in to my server scripts.

Ответить
Subhajit Shome
Subhajit Shome - 06.06.2021 22:11

Thank you Naseer ! This is very helpful

Ответить
Zay Lo
Zay Lo - 24.05.2021 13:00

if it is a dynamic website, is it okay to put the main homepage link in?

Ответить
mysticaltech
mysticaltech - 02.05.2021 08:58

Awesome made it all clearer 🙏

Ответить
Stacy Obiero
Stacy Obiero - 15.04.2021 14:01

XSS babes!

Ответить
My Java
My Java - 20.03.2021 14:23

hi hussein

I need you help/info related to one issue
We have in java code like below
String hname = request.getRemoteName(); // this line is showing issue in Fortify scan
can you help me how to validate the hname?

I used with ESAPI input validator but it could not remediate it. Please help

Ответить
Dennis Ivy
Dennis Ivy - 18.03.2021 18:26

Great video Hussein!

Ответить
Kambala Vijay
Kambala Vijay - 05.03.2021 07:30

<script>alert(test attack);</script>

Ответить
hunter one
hunter one - 23.01.2021 16:52

joss

Ответить
Amar Balu
Amar Balu - 13.01.2021 18:38

Hi Hussain.Your content is awesome. Csp attributes get fails even though it has been configured correct url.can u help me out?

Ответить
nada khaled
nada khaled - 23.12.2020 22:35

شكرا جدا عالشرح الواضح

Ответить
Mayur Patil
Mayur Patil - 09.11.2020 19:15

Such powerful stuff...

Ответить
Nisha Jakhar
Nisha Jakhar - 02.11.2020 10:20

Oooooo Mama......... :D Your Accent/tone/speech/words/humor is just perfect. Thank you that i found you.

Ответить
anusha hd
anusha hd - 30.09.2020 06:19

It was helpful, thank you

Ответить
Harsh Patel
Harsh Patel - 06.08.2020 22:59

This is $$ Gold $$. Thank you so much. You earned a subscriber!

Ответить
Umesh B
Umesh B - 31.07.2020 21:59

Thank you for a beautiful explanation sir. Actually interested in learning js btw found u on Udemy.

Ответить
netman87
netman87 - 16.07.2020 20:15

This + html ping to post form :)

Ответить
Carl Hage
Carl Hage - 15.07.2020 20:08

Of course you could have mentioned the real problem and solution in the js code, distinguishing text from HTML encoded text. (Easier with typescript 😜) But good demo of the csp header.

Ответить
Usama Tahseen Ul Haque
Usama Tahseen Ul Haque - 14.07.2020 22:40

You are the best explainer

Ответить
Natesh Bhat
Natesh Bhat - 13.07.2020 08:00

Can u make a vid on modsecurity with Nginx

Ответить