logo

Master in Hacking with XSS Cross Site Scripting

Learn the most common flaws in web applications

  • No Rating
  • (0 Reviews)
  • 0 User Enrolled
  • 9.99
  • 200
  • Course Includes
  • English
  • 2:09:00 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
  • 30-Day Money-Back Guarantee


What you will learn

  • what is XSS?
  • Real world examples
  • Different types of XSS
  • Creating XSS payloads
  • Why it is dangerous
  • primary and advanced XSS defense techniques.
  • how server and client interact with each other and how to intercept conversation of Client and Server.
  • How you can run script, in client browser?
  • will also learn about the alternative methods, if both JavaScript and HTML payloads are not working.
  • Protecting against these attacks

Requirements

  • Understanding basic computer and Internet browsing knowledge One should have a laptop powered with MAC or Linux OS or Windows OS

Description

XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable. Here we are going to see about most important XSS Cheatsheet.

What is XSS(Cross Site Scripting)? An attacker can inject untrusted snippets of JavaScript into your application without validation. This JavaScript is then executed by the victim who is visiting the target site. XSS classified into three types and these XSS Cheat Sheet will help to find the XSS vulnerabilities for Pentesters.

Reflected XSS

In Reflected XSS, an attacker sends the victim a link to the target application through email, social media, etc. This link has a script embedded within it which executes when visiting the target site.

Stored XSS

In Stored XSS, the attacker is able to plant a persistent script in the target website which will execute when anyone visits it.

DOM-Based XSS

With DOM Based XSS, no HTTP request is required, the script is injected as a result of modifying the DOM of the target site in the client side code in the victim’s browser and is then executed.

 

Course Content

Introduction
preview 1:28min
Make Kali Linux Bootable
preview 3:51min
Set up Kali Linux in Vmware
preview 2:25min
Kali Linux Latest Version
preview 3:42min
BWAPP Installation
preview 4:22min
DVWA Installation in Windows
preview 2:05min
XSS Introduction
preview 3:17min
XSS Basics Demonstration
preview 1:40min
Finding XSS Websites
preview 1:43min
Manual building xss vector 1
preview 2:33min
Manual building xss vector 2
preview 2:35min
Manual building xss vector 3
preview 3:01min
The Genesis of an XSS Worm
preview 3:05min
Grease Monkey
3:40min
Trmper Data
2:31min
Burp Suite
3:39min
Dom Inspector
4:47min
No Script Suite Lite
2:06min
Finding reflected XSS Vulnerabilities
1:52min
XSS Reflected Ajax, Json and XML
2:28min
Json XSS
2:37min
XSS - Refected (JSON)
4:01min
Reflected XSS in error pages Report
1:53min
XSS Eval Reflected
2:06min
XSS - Reflected (HREF)
1:35min
XSS Post Method
1:27min
XSS using Burp Suite for Post Request
1:52min