Cross-Site Scripting: A 25-Year Threat That Is Still Going Strong

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 พ.ย. 2024

ความคิดเห็น • 40

  • @rida_brahim
    @rida_brahim 17 วันที่ผ่านมา +7

    this is something someone new to programming would fall for, i can see also self taught developers in their early days falling for this. as someone who learned programming this year i see myself doing some mistakes when i want to build something fast, which is the case for any freelancer who wants to deliver the project and doesn't have much experience. thanks for the video.

    • @jeffcrume
      @jeffcrume 16 วันที่ผ่านมา +2

      It’s requires extra effort to guard against this and usually we just want to focus on getting the functions to work so the problem persists even among veteran programmers

    • @rida_brahim
      @rida_brahim 15 วันที่ผ่านมา

      @jeffcrume indeed, thank you!

  • @kalideb-y3y
    @kalideb-y3y 9 วันที่ผ่านมา +1

    I love how he just used "validate" instead of "sanitize" which is not overwhelming to hear 🥰

  • @J_G_Network
    @J_G_Network 22 วันที่ผ่านมา +4

    Thank you for sharing, I am studying this material in my ethical hacking class, and your explanation clarified some things for me about XSS. It makes more sense. I would like to work for IBM sometime.

  • @CrypticNord
    @CrypticNord 4 วันที่ผ่านมา +1

    You are awesome sir.

    • @jeffcrume
      @jeffcrume 3 วันที่ผ่านมา

      You are very kind!

  • @cybi8056
    @cybi8056 22 วันที่ผ่านมา +5

    Thank you for adding English subtitles to make it easier for the AI to translate into Korean.

    • @jeffcrume
      @jeffcrume 21 วันที่ผ่านมา +4

      I hope I still make sense in Korean 😊

    • @ah89971
      @ah89971 21 วันที่ผ่านมา

      Good luck in coding script with Korean

  • @Myexpectationsarerealistic
    @Myexpectationsarerealistic 12 วันที่ผ่านมา

    These exist because of the hard drive cartels not releasing certain technology to the public, which kept storage prices high. It was cheaper to have multiple servers, which used XSS to connect them as a single website.

  • @mikemaldanado6015
    @mikemaldanado6015 16 วันที่ผ่านมา +3

    ok but how is that malicious code persisting on the server? shouldn't only apply for the hackers session? ie how has he modified the coder on the server to now include his code as part of the servers. your example would only happen once, to the attacker. this only makes sense if the xss is doing an sql injection into the server which will then serve it up for all future users

    • @jeffcrume
      @jeffcrume 15 วันที่ผ่านมา

      In the example I cited, the code is injected into the comment section. It will persist until the comment is deleted

  • @Archibong.samuel
    @Archibong.samuel 21 วันที่ผ่านมา +3

    Damn I was late for class
    I'm interested in understanding how the industry is working to genuinely solve XSS (Cross-Site Scripting) attacks. Since trusted websites can sometimes be manipulated to execute an XSS attack, it raises an important question: How can end users know if a 'trusted service' has been compromised?
    While I understand that there are browser extensions aimed at detecting OWASP Top 10 vulnerabilities, I'm curious how effective they are in practice. Additionally, as a software engineer, I'm aware that methods like command injection can also exploit systems, and that attackers could theoretically use the browser API to bypass certain defenses. How does the industry address these challenges, and what are the best approaches for ensuring users' security when using trusted websites?

    • @jeffcrume
      @jeffcrume 21 วันที่ผ่านมา +1

      This is mostly a problem for the web site owners to solve. If it were easy to do, it would have been done years ago. Unfortunately, it persists

    • @seansingh4421
      @seansingh4421 21 วันที่ผ่านมา +1

      Browser isolation

    • @Archibong.samuel
      @Archibong.samuel 20 วันที่ผ่านมา

      @@jeffcrume This is interesting. Thank you.

    • @Archibong.samuel
      @Archibong.samuel 20 วันที่ผ่านมา

      @@seansingh4421 Please explain

  • @KevinStefferDk
    @KevinStefferDk 8 วันที่ผ่านมา

    Great topic but the explanation is lacking of details. Show some examples of how to place malicious code in a comment on a forum with a guided instruction on how to construct malicious code that makes stuff execute with an intension of an attack when bringing up this topic. It would make difference for developers and why it is important to protect against this type of vulnerability.

  • @krishnaSagar69
    @krishnaSagar69 20 วันที่ผ่านมา +2

    I still remember the first time I read about this. It was a masterpiece. Absolutely genius!

    • @jeffcrume
      @jeffcrume 20 วันที่ผ่านมา

      I do too. I thought it was so convoluted that it would just go away. I was clearly wrong

  • @dofilamingo8848
    @dofilamingo8848 17 วันที่ผ่านมา +4

    great video like always

    • @jeffcrume
      @jeffcrume 17 วันที่ผ่านมา +1

      Thanks for saying so!

  • @johndawson6057
    @johndawson6057 17 วันที่ผ่านมา +2

    Great expalanation. Any recommendations for someone interested in getting into cybersecurity?

  • @AlexWindsor
    @AlexWindsor 17 วันที่ผ่านมา +2

    How is he able to write mirrored letters so quickly?

    • @fiaztv3206
      @fiaztv3206 17 วันที่ผ่านมา +2

      I think he writes normally.. it is mirrored for us in software

    • @amritbhattarai5083
      @amritbhattarai5083 16 วันที่ผ่านมา +1

      The video is flipped in the horizontal axis. You can see his watch appears to be in his right hand but pretty sure he wore it on his left. Gives way for very intuitive explanation videos :)

  • @cheveznyc
    @cheveznyc 22 วันที่ผ่านมา +3

    Ty u.

  • @markjakker2091
    @markjakker2091 5 วันที่ผ่านมา

    He’s been hijacking Amazon employees. He’s hijacking techs to edit and inject exploit code on EC2 and light sail

  • @sdwone
    @sdwone 16 วันที่ผ่านมา +3

    So the Bottomline...
    NEVER... EVER... TRUST USER INPUT!!! As a web developer, your DEFAULT position should be... ALL USERS ARE EVIL!!! Stick to that... Along with copious amounts of paranoia!!! 😂 And the websites and apps that you build... Should be fine! 😊

    • @jeffcrume
      @jeffcrume 16 วันที่ผ่านมา +1

      Good point 😊

  • @chillyvanilly6352
    @chillyvanilly6352 15 วันที่ผ่านมา +1

    that is in all honesty a terrible video...bcs it doesn't actually talk about ANYTHING really, feels like `let semantics = null` if u catch my drift...
    It doesn't even mention the 2 flavours of this attack, nor does it say what is it exactly that happens, that would result in a random user getting back trusted with mixed-in malicious code...
    This is akin to the annoying uprising of "the coding bootcamp" crap that "anybody can program" which is actually rather damaging to the industry as a whole, destroys the possibility to work with amazing engineers (ideally passionate about the topic not "just as a job") and ofc unnecessarily lowering payments for those that have actually have skills and passion for the craft... #analogy
    Instead of watching this, just read the OWASP wesbite on it and associated links...

    • @Zbezt
      @Zbezt 15 วันที่ผ่านมา

      It delves into cyberwarfare use your head

    • @chillyvanilly6352
      @chillyvanilly6352 12 วันที่ผ่านมา

      @@Zbezt what exactly is it in that vid that is actually "delving" into? Except nothing...
      don't be rude just cuz meaningless vids satisfy your tiny brain...

  • @thefourthbrotherkaramazov245
    @thefourthbrotherkaramazov245 22 วันที่ผ่านมา +1

    You don't necessarily need to make the user interact with the XSS attack payload right? Can't it just run through the web browser loading the page?

    • @jeffcrume
      @jeffcrume 21 วันที่ผ่านมา +2

      If by “client” you mean the user, then yes.

    • @thefourthbrotherkaramazov245
      @thefourthbrotherkaramazov245 21 วันที่ผ่านมา

      @jeffcrume Yes thank you, changed it to say user instead.

  • @fikunyinmiadebola5725
    @fikunyinmiadebola5725 22 วันที่ผ่านมา +1

    I'm early

  • @bifforngloop321
    @bifforngloop321 16 วันที่ผ่านมา +1

    javascript was written in 7 days and was meant for a whole different purpose

  • @robertthomason8905
    @robertthomason8905 22 วันที่ผ่านมา

    👻🥸🤐👁️