XSS
Task 1 - Introduction
read and then click on completed button
Task 2 - Terminology and Types
Q1. Which XSS vulnerability relies on saving the malicious script?
Answer - Stored XSS
Q2. Which prevalent XSS vulnerability executes within the browser session without being saved?
Answer - Reflected XSS
Q3. What does DOM stand for?
Answer - Document Object Model
Task 3 - Causes and Implications
Q1. Based on the leading causes of XSS vulnerabilities, what operations should be performed on the user input?
Answer - validation and sanitization
Q2. To prevent XSS vulnerabilities, what operations should be performed on the data before it is output to the user?
Answer - encoding
Task 4 - Reflected XSS
The character we specially have to encode are -
Q1. Which one of the following characters do you expect to be encoded? ., ,, ;, &, or #?
Answer - &
Q2. Which one of the following characters do you expect to be encoded? +, -, *, <, =, or ^?
Answer - <
Q3. Which function can we use in JavaScript to replace (unsafe) special characters with HTML entities?
Answer - escapeHtml()
Q4. Which function did we use in PHP to replace HTML special characters?
Answer - htmlspecialchars()
Task 5 - Vulnerable Web Application 1
Q1. What type of vulnerability is it?
Answer - Reflected XSS
Task 1 - Brief
Q1. What does SQL stand for?
Answer - Structured Query Language
Task 1 - Brief
Q1. What does SQL stand for?
Answer - Structured Query Language
Task 1 - Brief
Q1. What does SQL stand for?
Answer - Structured Query Language