Identifying Good Research to actually Learn Something - Cross-site Scripting
How to get good at XSS? There are a lot of charlatans out their overhyping by posting misleading content. It's infuriating because a lot of the actual research is less flashy and thus more hidden. Maybe I'm a bit too pessemistic in this video, but I think it's a concrete example we can use talk about it.
XSS Introduction: https://www.youtube.com/watch?v=8GwVBpTgR2c&index=4&list=PLhixgUqwRTjx2BmNF5-GddyqZcizwLLGP
uXSS in Safari: https://www.youtube.com/watch?v=0uejy9aCNbI
Cross-Origin Stylesheets: https://www.youtube.com/watch?v=bMPAXsgWNAc
Gareth Heyes: https://twitter.com/garethheyes
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
https://amzn.to/2SESPO0 switch
jetson TX1 https://amzn.to/2C6uw4m
Видео Identifying Good Research to actually Learn Something - Cross-site Scripting канала LiveOverflow
XSS Introduction: https://www.youtube.com/watch?v=8GwVBpTgR2c&index=4&list=PLhixgUqwRTjx2BmNF5-GddyqZcizwLLGP
uXSS in Safari: https://www.youtube.com/watch?v=0uejy9aCNbI
Cross-Origin Stylesheets: https://www.youtube.com/watch?v=bMPAXsgWNAc
Gareth Heyes: https://twitter.com/garethheyes
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
https://amzn.to/2SESPO0 switch
jetson TX1 https://amzn.to/2C6uw4m
Видео Identifying Good Research to actually Learn Something - Cross-site Scripting канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctfCritical .zip vulnerabilities? - Zip Slip and ZipperDownWhat do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-throughReverse engineering obfuscated JavaScript - PopUnder Chrome 59Hacking My Instagram AccountHardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)The Curse of Cross-Origin Stylesheets - Web Security ResearchNintendo Switch (NVIDIA Tegra X1) - BootROM VulnerabilityFinding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605Fuzzing Browsers for weird XSS VectorsHOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128Cookie Stealing - ComputerphileSome thoughts on Mobile App Security - is it FUD?XSS on Google Search - Sanitizing HTML in The Client?Solving a JavaScript crackme: JS SAFE 2.0 (web) - Google CTF 2018Custom Chromium Build to Reverse Engineer Pop-Under TrickWhat is a File Format?ShellShock & Kernel Exploits - TryHackMe! 0day