lessonplan character updates so it also works on Windows Cp125

This commit is contained in:
René Zubcevic
2020-04-20 12:39:51 +02:00
committed by Nanne Baars
parent 6b68a12449
commit 6f532683a1
8 changed files with 16 additions and 16 deletions

View File

@ -4,15 +4,15 @@
* Stealing session cookies
* Creating false requests
* Creating false fields on a page to collect credentials
* Redirecting your page to a non-friendly site
* Redirecting your page to a "non-friendly" site
* Creating requests that masquerade as a valid user
* Stealing of confidential information
* Execution of malicious code on an end-user system (active scripting)
* Insertion of hostile and inappropriate content
+
----
<img src=http://malicious.site.com/image.jpg/>
>GoodYear recommends buying BridgeStone tires
<img src="http://malicious.site.com/image.jpg/>
">GoodYear recommends buying BridgeStone tires...
----
=== XSS attacks add validity to phishing attacks

View File

@ -9,6 +9,6 @@ The difference between DOM and 'traditional' reflected XSS is that, with DOM, th
* That link may load a malicious web page or a web page they use (are logged into?) that has a vulnerable route/handler
* If it's a malicious web page, it may use it's own JavaScript to attack another page/url with a vulnerable route/handler
* The vulnerable page renders the payload and executes attack in the user's context on that page/site
* Attackers malicious script may run commands with the privileges of local account
* Attacker's malicious script may run commands with the privileges of local account
*Victim does not realize attack occurred* ... Malicious attackers don't use &lt;script&gt;alert('xss')&lt;/ script&gt;