Cross-Site Scripting (XSS) Explained in 7 minutes

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 พ.ย. 2020
  • What is Cross-Site Scripting (XSS)? How does it work? Where can you find vulnerabilities? How do you fix those vulnerabilities?
    In this lesson from our new Cross-Site Scripting (XSS): The 2021 Guide course (cybr.com/products/cross-site-..., we start to answer these questions by explaining the concepts of XSS and how it works. We also talk about the potential impacts that successful XSS exploitation can have, examples of what payloads look like, and more!
    If you enjoy this video, check out our course here: cybr.com/products/cross-site-...

ความคิดเห็น • 33

  • @Cybrcom
    @Cybrcom  10 หลายเดือนก่อน +1

    Please, consider clicking Subscribe if you haven't already :)! Thank you!

  • @PloddingDream-px3fz
    @PloddingDream-px3fz หลายเดือนก่อน +1

    You were able to explain this topic as if someone has never scene it, yet leaving them with a solid understanding of a high-level view.

    • @Cybrcom
      @Cybrcom  หลายเดือนก่อน

      I’m glad the video helped!!

  • @crookedcrowe9215
    @crookedcrowe9215 11 หลายเดือนก่อน +11

    Very useful. I had a horrible explanation on XSS and left me confused. This really clarifies it better. Thank you.

    • @Cybrcom
      @Cybrcom  11 หลายเดือนก่อน

      I know the feeling! Glad this helped

  • @raygomez3935
    @raygomez3935 หลายเดือนก่อน +1

    This is awesome content! Studying for PenTest+ to get an idea if i want to pursue pentesting. Your channel is an excellent resource.

  • @somedude4652
    @somedude4652 5 หลายเดือนก่อน +2

    very informative!

  • @belindazhang426
    @belindazhang426 5 หลายเดือนก่อน +2

    great explanaiton!!!

  • @mohsenbaarzegar
    @mohsenbaarzegar 3 หลายเดือนก่อน +1

    Very useful

  • @mahesh6307
    @mahesh6307 4 หลายเดือนก่อน

    Yeah, I have found my new mentor after a long searching, sql concepts are just waaaaaaahhhhh

  • @cecamix4711
    @cecamix4711 10 หลายเดือนก่อน +1

    Woow...sky is open 😂😂😂...I mean for myself...finally understand.
    Thank you 💞
    My brain appreciate😊

  • @eggminolia
    @eggminolia ปีที่แล้ว +3

    Thanks for this amazing explanation! 🎉Merry Christmas 2022

    • @Cybrcom
      @Cybrcom  ปีที่แล้ว

      Thank you!! You too!

  • @AWaterKnight
    @AWaterKnight 3 หลายเดือนก่อน +1

    Nice explanation with the illustrations. It also beautifully showed the differences between the different types. Still wondering some things:
    It is called cross-site scripting. I always wondered what's exactly cross-site about it, i.e., what is denoted as the different sites where the code is to cross in between. From your explanation, it sounds like two different frontend pages, i.e., you see some HTML page, click a link or submit a form and thus the browser requests another HTML page, which will execute the code you brought over. But in modern day we may also have a single page application, so we don't get a completely new HTML page from the backend, only some data and the frontend can re-form using the logic it already has. You could of course still inject some script there depending on the logic in the frontend, though it's a bit of a question when a site is crossed there.
    Another idea is that you could call different machines or processes sites, i.e., the frontend being a site and the backend server being a site, but DOM-based XSS would not fit in this frame.
    When you submit a form normally, you get another HTML page. Of course, it would not make sense as an attack to inject something in the javascript of that new HTML page while targeting yourself. You can control your own browser and issue own javascript. So I wonder how reflected XSS targets the browser of another user. The thing that comes to mind is when the backend has a reactive pattern and sends data to other users with for example websockets but then they would usually not get whole new HTML pages from that. Another idea would be to send the target users the URL with the malicious payload.The HTTP GET method uses query parameters. For POST method, the payload would need to be in a header or entity, which would be more difficult to trick other users into to issue, since this isn't entailed in a URL.
    Similarly with DOM-based XSS, to target another user, you would need to send them a URL with the malicious payload via different means, tricking them to open it.
    And I guess there could be mixed forms of XSS, where a stored XSS places some links with malicious URLs on the HTML page of victim users and clicking them can trigger additional stuff as any type of XSS.

    • @Cybrcom
      @Cybrcom  3 หลายเดือนก่อน +1

      I'm glad you enjoyed it! Thanks for the kind comments. In terms of exactly how/why it became named cross-site scripting, honestly I don't know the history and I wasn't there when they came up with the name ;) but I always assumed it was because injected scripts can transfer data or carry out actions from one site/app to another regardless of where/how the XSS is carried out.

  • @IntricateMoon
    @IntricateMoon 4 หลายเดือนก่อน +2

    Why is this channel so underrated and low subscriber count? This is well written and the explanation and illustrations are toptier -_-
    Thank you for this Christophe! (Hope that is your name)
    😄

    • @Cybrcom
      @Cybrcom  4 หลายเดือนก่อน

      ❤️ thanks for the kind words 🥲 please help spread the word so my content can reach more people!!

    • @IntricateMoon
      @IntricateMoon 4 หลายเดือนก่อน

      @@Cybrcom will absolutely do that. Thank you again! Hopefully more content in the future 🙌🙏

  • @user-kn8nt5zm5n
    @user-kn8nt5zm5n 9 หลายเดือนก่อน +1

    I use webhook to steal session cookies of my own website. However the session part is empty. Why may be the reason, does anyone have the same issue?

  • @someone123325
    @someone123325 ปีที่แล้ว +1

    Done

  • @i_am_dumb1070
    @i_am_dumb1070 ปีที่แล้ว

    Please upload a full xss course

    • @Cybrcom
      @Cybrcom  ปีที่แล้ว

      We've got a full XSS course on our site

  • @user-kn8nt5zm5n
    @user-kn8nt5zm5n 9 หลายเดือนก่อน

    I added javascript text to my own website. However, IT does not give any alert. My web app treat it like a plain text instead of JavaScript. What should i do to make my code vulnerable to XSS? cause i need to perform XSS for my cybersecurity class

    • @Cybrcom
      @Cybrcom  9 หลายเดือนก่อน

      A good way to figure this out is to take a look at the source code of apps like the DVWA and Juice Shop and see how they created vulnerabilities. If you just need a quick and simple example, though, I would use .innerHTML like this:
      element.innerHTML = userProdividedData;
      innerHTML is a very dangerous place to put in untrusted user inputs :)

    • @user-kn8nt5zm5n
      @user-kn8nt5zm5n 9 หลายเดือนก่อน

      @@Cybrcom solvedthankuu

  • @s1ubbe
    @s1ubbe 11 หลายเดือนก่อน

    Needs better explanation. Didnt get how this could affect anyone but the attacker. How does the server store the script?

    • @Cybrcom
      @Cybrcom  11 หลายเดือนก่อน +1

      These resources might help make more sense of it:
      - Article version of the video: cybr.com/beginner-archives/what-is-cross-site-scripting-xss/
      - Case study of a stored XSS vuln: cybr.com/ethical-hacking-archives/stored-xss-vulnerability-in-image-alt-attribute-to-steal-cookies-bug-bounty/
      - Case study of a blind XSS vulnerability: th-cam.com/video/7DkjM00fJ6U/w-d-xo.html
      But to answer your question about how the server stores the script -- just like how it stores anything else, like your youtube comment. You could have injected an XSS payload in your YT comment, and if YT were vulnerable, I would be affected by it simply by viewing your comment.

  • @prashantkumarrai3872
    @prashantkumarrai3872 5 หลายเดือนก่อน

    Hacked

    • @Cybrcom
      @Cybrcom  4 หลายเดือนก่อน

      😆

  • @anonim091
    @anonim091 3 วันที่ผ่านมา

    too much info, not understandable, not direct

    • @Cybrcom
      @Cybrcom  2 วันที่ผ่านมา

      👍

  • @user-lz8zr4xx3u
    @user-lz8zr4xx3u 3 หลายเดือนก่อน

    alert("hachnjimkd");