Description: Having watched the brilliant part two posted by Midox, I'm going to be really rude and post the link for the next instalment - hopefully this won't cause any offence. If it does, I apologise sincerely.
Tags: xss , owasp , web , application , security ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Very nicely done series. Thanks for posting this. It should help a lot of people as the explanations and graphics make understanding the subject a lot easier. I wish all videos were as well done as this.
I can't take the credit for this - I've just posted a link. It's brilliant stuff and I've spent the last couple of days playing around with xss and getting to grips with it.
I was *really* concerned to find that saving a javascript files with a .jpg extension and doing this:
<script src="evil.jpg"></script>
Actually let the javascript run in vulnerable applications! Unreal.