2017 OWASP Top 10: Cross-Site Scripting (XSS)

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 ก.พ. 2018
  • New 2021 OWASP Lightboard Series:
    • 2021 OWASP Top Ten
    Video 7/10 on the 2017 OWASP Top Ten Security Risks.
    John Wagnon discusses the details of the #7 vulnerability listed in this year's OWASP Top 10 Security Risks: Cross-Site Scripting. Learn about this security risk and how to keep your Web Applications safe!
    community.f5.com/articles/lig...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 116

  • @hayleyha9433
    @hayleyha9433 4 ปีที่แล้ว +22

    Thank you so much, this is the most insightful introduction of XSS I have found on TH-cam.

    • @devcentral
      @devcentral  4 ปีที่แล้ว +1

      glad you enjoyed it!

  • @eyalpery8470
    @eyalpery8470 4 ปีที่แล้ว +4

    This video is amazing! I understood so much about XSS, Thank you!

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

  • @Dasman_adventures
    @Dasman_adventures 6 ปีที่แล้ว +3

    Really like this example and the breakdown! Thanks for making the OWASP Top 10 a bit more available! :)

    • @devcentral
      @devcentral  6 ปีที่แล้ว

      Thanks! Glad you are enjoying the videos...

  • @finally_code
    @finally_code 4 ปีที่แล้ว +3

    You guys are great. I can always be sure to see a quality video when clicking on F5 stuff.

  • @sudhanshupal4427
    @sudhanshupal4427 4 ปีที่แล้ว +1

    Thanks a lot you cleared my concept of cross site scripting !!!

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

  • @vinaydrdo
    @vinaydrdo 5 ปีที่แล้ว +1

    Good video full of clarity on the topic

    • @devcentral
      @devcentral  5 ปีที่แล้ว

      glad you enjoyed it!

  • @mfstuff8252
    @mfstuff8252 4 ปีที่แล้ว +1

    Very good and simply explained!

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

  • @rayyu9684
    @rayyu9684 2 ปีที่แล้ว +1

    Thank you! This is the best explanation I have ever seen!!!!!

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      appreciate the comment!

  • @amarchhabra2175
    @amarchhabra2175 2 ปีที่แล้ว +1

    What a terrific video - very clear and concise - yet comprehensive and easy to understand!

  • @shimmeringreflection
    @shimmeringreflection 4 ปีที่แล้ว +1

    Excellent video and exactly the right length. A topic like this needs a lengthy explanation to get one's head around it. Too many other vids try to sum it up in a few minutes only to leave the learner not really understanding what XSS is at the end of it.

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

  • @BobCat981
    @BobCat981 4 ปีที่แล้ว +5

    Though I found your presentation really neat and useful, I find it even 'neater' that you had logo on your shirt sewn backwards, to appear as it should once you mirror your video(s).
    Kudos to you, good sir. I cant think of any other way you made this, unless you're actually writing mirrored which i highly doubt......

  • @HD_Heresy
    @HD_Heresy 2 ปีที่แล้ว +1

    REALLY awesome video, thanks so much!

    • @devcentral
      @devcentral  2 ปีที่แล้ว +1

      Glad you enjoyed it!

  • @jamesslaterly8670
    @jamesslaterly8670 3 ปีที่แล้ว +1

    now i understand XSS thank you!

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      You're welcome...glad you enjoyed the video!

  • @shubhampaul8394
    @shubhampaul8394 3 ปีที่แล้ว +1

    Amazingg..your way of explaining things❤ loved it..nice video..

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      Glad you enjoyed it!

  • @duonganphong7643
    @duonganphong7643 3 ปีที่แล้ว

    Amazing, thanks!

  • @Cognitoman
    @Cognitoman 6 ปีที่แล้ว +1

    great job!

    • @devcentral
      @devcentral  6 ปีที่แล้ว

      thanks...glad you enjoyed it!

  • @bigmarkua
    @bigmarkua 4 ปีที่แล้ว +1

    Thanks!

  • @h.rehaief3567
    @h.rehaief3567 5 ปีที่แล้ว +1

    great job

    • @devcentral
      @devcentral  5 ปีที่แล้ว

      glad you enjoyed it!

  • @25kirtan
    @25kirtan 3 ปีที่แล้ว +1

    Thanks man!

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      glad you enjoyed it!

  • @deeraj3069
    @deeraj3069 4 ปีที่แล้ว +1

    Thank you sir...

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

  • @HH-qe3sr
    @HH-qe3sr 2 ปีที่แล้ว

    thank you very useful and clear but still didn't hear you talking about input validation in the video witch is one of method of mitigation

  • @venkateshbogadhi4652
    @venkateshbogadhi4652 4 ปีที่แล้ว +1

    Its a very nice video, Thanks.
    Whatever the example you mentioned in the video is related to a type of XSS i.e, Stored/Persistent XSS.
    Similarly can you explain about other types of XSS like Reflected, Blind and DOM Based XSS attacks?

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      great question! the example I gave in the video is a stored/persistent XSS example. here's a great article that outlines all the different types and gives some good examples as well: portswigger.net/web-security/cross-site-scripting

  • @artmasterpl
    @artmasterpl 6 ปีที่แล้ว +9

    its now 7 because they change marking criteria for OWASP top 10 its now calculated by risk not for a number of attacks. XSS is still most popular attack but its not that dangerous like others ;)

    • @devcentral
      @devcentral  6 ปีที่แล้ว +2

      great info...thanks for the clarification!

    • @ramsthoughts
      @ramsthoughts 5 ปีที่แล้ว

      That's great info, even I too had impression that rating based on popular not by risk...but YES that's sound sense too.

    • @joshwaphilip9840
      @joshwaphilip9840 5 ปีที่แล้ว +1

      you can't say it's not dangerous. because attacker steal cookie with help of XSS. and phishing also very dangerous. attacker use help of phishing email sending xss alert script and shows pop message. that way steal victim confidential data. why don't think that's not dangerous

    • @artmasterpl
      @artmasterpl 4 ปีที่แล้ว +1

      @@joshwaphilip9840 yes u are right, sorry for my English back then ;p

  • @houssamboudahra7803
    @houssamboudahra7803 3 ปีที่แล้ว +1

    Thank you

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      glad you enjoyed it!

  • @frankthabo
    @frankthabo 2 ปีที่แล้ว +1

    Salute !!!

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      Glad you enjoyed it!

  • @suan_tech2019
    @suan_tech2019 2 ปีที่แล้ว +1

    thanks

  • @illt3ck
    @illt3ck 4 ปีที่แล้ว +3

    Really enjoyed this series so thanks for producing it. In this example, wouldn't the victim's system execute the attackers code and do a POST (including the session cookie) to the attackers server and not a GET?

    • @devcentral
      @devcentral  4 ปีที่แล้ว +2

      Great question, Mark! In this case, the attacker would have set up his "evil.com" site to accept the GET request sent by the victim and would be looking for the parameter value in that GET request. Based on the way the attacker set up the malicious post on the vulnerable web application (the one that the victim visits), the GET request would include a parameter that has the victim's cookie value. The attacker could then take the site cookie and start down the path of more nefarious actions. For more on GET requests that include parameters, here's a good thread to look at: stackoverflow.com/questions/514892/how-to-make-an-http-get-request-with-parameters
      I hope this helps...thanks!

    • @RajivKumar-ee7xv
      @RajivKumar-ee7xv 2 ปีที่แล้ว +1

      @@devcentral I was also thinking same. Thanks for clarifying.

  • @nguyenhuyhoang555
    @nguyenhuyhoang555 5 ปีที่แล้ว

    What is different between Redirected XSS and CSRF?

  • @rpithawala
    @rpithawala 6 ปีที่แล้ว +3

    thanks.. creative --- on glass board. ;)

    • @devcentral
      @devcentral  6 ปีที่แล้ว

      glad you enjoyed it!

  • @RajeshSriMuthu
    @RajeshSriMuthu 4 ปีที่แล้ว +1

    subscribed liked and shared.......

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

  • @sirdondaniel
    @sirdondaniel 3 ปีที่แล้ว +1

    Why don't you split the Webapp in two: server and froendend (client)?

  • @sunilchaudhari5730
    @sunilchaudhari5730 3 ปีที่แล้ว +1

    It seems Web Application Firewall is solution to most of the OWASP 10 problems.

  • @LetsBeHuman
    @LetsBeHuman 5 ปีที่แล้ว +3

    @10:52 - How can a firewall around Web app can prevent XSS, as the script is posted in an input field, right?
    So, How can a firewall check what an attacker is entering into the fields like username, password , etc.??

    • @devcentral
      @devcentral  5 ปีที่แล้ว +8

      Thanks for the great questions! When you put a Web Application Firewall (WAF) in front of your web application, then all requests to the web application have to pass through the WAF before they get to the application itself. The WAF will learn all about your web application and know what parameters are used, what fields are used, what URLs are used, what file types are allowed/disallowed, etc. So, when a user sends a XSS attack to an input field of the web application, the WAF will know that the request is destined for the input field on the web app, and it will check the request against a variety of signatures, etc to determine if that particular request is malicious or not. If the WAF determines that the request is malicious (i.e. it detects stuff like xyz123) then it will block the request. Hope this helps!

    • @LetsBeHuman
      @LetsBeHuman 5 ปีที่แล้ว +2

      @@devcentral thank you very much

  • @Rookey_Traveller
    @Rookey_Traveller 4 ปีที่แล้ว +1

    Please explain types is xss attacks.

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      Thanks for the comment! The example I gave in the video is a stored/persistent XSS example. here's a great article that outlines all the different types and gives some good examples as well: portswigger.net/web-security/cross-site-scripting

  • @tanercoder1915
    @tanercoder1915 4 ปีที่แล้ว +1

    This sure sounded like CSRF vulnerability. Remote XSS == CSRF ?

  • @LetsBeHuman
    @LetsBeHuman 5 ปีที่แล้ว +1

    What tool you use to make these kind of videos?
    You seem to write in your right hand, but...
    Please answer.

    • @SpeedlPN
      @SpeedlPN 5 ปีที่แล้ว

      They have a pane of glass between him and the camera, he writes naturally but the video is flipped vertically.

  • @tarunvishwakarma2562
    @tarunvishwakarma2562 6 ปีที่แล้ว +1

    Hi, thank you for making Owasp video but there is not all the owasp top ten video only I found 5 to 6 Please make it all...

    • @devcentral
      @devcentral  6 ปีที่แล้ว

      Hi tarun. Thanks for the comment. I am in the process of making all 10 videos, but I've only finalized 7 of them so far. Be sure to stay tuned to our channel as the remaining 3 will be published here as well.

    • @tarunvishwakarma2562
      @tarunvishwakarma2562 6 ปีที่แล้ว

      okay & thanks, guys..........

    • @devcentral
      @devcentral  6 ปีที่แล้ว

      FYI...we created a playlist on our channel that has the OWASP Top Ten videos. We haven't finished all the videos yet (March, 2018), but once they are all finished, the playlist will have them all. th-cam.com/video/rWHvp7rUka8/w-d-xo.html

  • @sariksiddiqui6059
    @sariksiddiqui6059 4 ปีที่แล้ว

    if the words he's writing are not laterally inverted,means he is right-handed?

  • @gck330
    @gck330 5 ปีที่แล้ว

    my question is what browser will sent the cookies of example.com to another site, evil.com ? is this posible ?

    • @mlrhazi
      @mlrhazi 5 ปีที่แล้ว

      the bad runs in the context of example.com page. browser will give it all the cookies of that domain, right? It will then send them to evil.com. The script will send the cookies names and values... not the browser.

  • @Watcher3121
    @Watcher3121 5 ปีที่แล้ว +1

    is he writing reverse on glass?

  • @rudyc79
    @rudyc79 2 ปีที่แล้ว +1

    Is injection still number 1?

    • @psilvas
      @psilvas 2 ปีที่แล้ว

      Yes it is: owasp.org/www-project-top-ten/

  • @deeptipathak7739
    @deeptipathak7739 5 ปีที่แล้ว

    What is post script

    • @devcentral
      @devcentral  5 ปีที่แล้ว

      Hi Deepti...just wanted to get some clarification on what you are asking. What exactly are you referring to when you say "post script"? There's a post script in reference to printing, but I'm not sure if that's what you are talking about here. We are glad to help clarify, but need some more context around what you are referring to. Thanks!

  • @letsTalkBoutIt14
    @letsTalkBoutIt14 2 ปีที่แล้ว

    Mobile browser the function character is %

  • @Xpressd
    @Xpressd 4 ปีที่แล้ว

    are you writing backwards or flipping the screen 😕

    • @psilvas
      @psilvas 4 ปีที่แล้ว

      check out this video to show you how we do it: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

  • @h.rehaief3567
    @h.rehaief3567 5 ปีที่แล้ว +1

    more videos pls

    • @devcentral
      @devcentral  5 ปีที่แล้ว

      glad you enjoy these videos!

  • @pineappleapplepens
    @pineappleapplepens 4 ปีที่แล้ว

    is instructor Wagnon writing backwards?

    • @DjSeymur
      @DjSeymur 4 ปีที่แล้ว

      No, the video is horizontally flipped. And if you ask about the logo on the shirt, I assume it is specially printed in mirrored form for this kind of video

  • @surens7850
    @surens7850 5 ปีที่แล้ว

    what is nutshell

    • @devcentral
      @devcentral  5 ปีที่แล้ว +1

      Hi Suren. The phrase "in a nutshell" means to sum it up, or to say it concisely or briefly. I hope this helps...thanks!

    • @manilakid3
      @manilakid3 4 ปีที่แล้ว

      The shell that holds a nut. Nutshell.

  • @letsTalkBoutIt14
    @letsTalkBoutIt14 2 ปีที่แล้ว

    Non script terminal back doors is the latest
    Ex:

  • @passord1d493
    @passord1d493 4 ปีที่แล้ว +2

    destroyWebsite();

    • @devcentral
      @devcentral  4 ปีที่แล้ว +1

      lol...looks like the TH-cam comments section has included secure coding practices!

  • @benjamingoldman6983
    @benjamingoldman6983 3 ปีที่แล้ว

    alert(1)

  • @debjitpaul8580
    @debjitpaul8580 5 ปีที่แล้ว +5

    Wait wait is he writing it in reverse?? 🤥 Someone please tell me there's some trick to it.

    • @picklecrash
      @picklecrash 5 ปีที่แล้ว +2

      no, he flips the video after recording it

    • @petervtzand
      @petervtzand 4 ปีที่แล้ว +1

      @@picklecrash So what about the logo on his shirt?

    • @picklecrash
      @picklecrash 4 ปีที่แล้ว

      @@petervtzand sewn in reverse

    • @ilypineapple6461
      @ilypineapple6461 4 ปีที่แล้ว

      Joshua Clougherty then wouldn’t one be backwards and the other not? Lmfao

    • @shimmeringreflection
      @shimmeringreflection 4 ปีที่แล้ว

      @@petervtzand hehe. I thought the commenter was right when he said he flips the video after recording it but then you pointed out the logo on his shirt. Very astute!

  • @dudebroepicgamer4847
    @dudebroepicgamer4847 5 ปีที่แล้ว +2

    alert("hacked!");

    • @devcentral
      @devcentral  5 ปีที่แล้ว +2

      Looks like the TH-cam comment feature has been designed properly to handle this attack! :)

    • @RajeshSriMuthu
      @RajeshSriMuthu 4 ปีที่แล้ว

      i appreciate your try

  • @angeloreyes707
    @angeloreyes707 2 ปีที่แล้ว +1

    Are you drawing all of that backwards??? Lol

    • @psilvas
      @psilvas 2 ปีที่แล้ว

      this is how we do these: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

  • @Child0ne
    @Child0ne 2 ปีที่แล้ว

    Why do we need a victim