== XSS Defense * HTML entity input encoding ** Converting ‘<‘ and ‘>’ to < and > before storage * HTML entity output encoding ** Converting ‘<‘ and ‘>’ to < and > before writing * Input validation ** Positive model to allow valid characters only ** New attacks found everyday *** negative filter not reliable * Setting HTTPOnly as a cookie attribute * Only allow post data to prevent reflected XSS * Use language specific built-in mechanisms ** Page validation for .NET in web.config + ---- <%page ValidateRequest="true" %> ---- ** Struts + ---- ---- *Any problems with these approaches?*