XSS
Task 1 - Introduction
read and then click on completed button
Task 2 - Terminology and Types
Q1. Which XSS vulnerability relies on saving the malicious script?

Answer - Stored XSS
Q2. Which prevalent XSS vulnerability executes within the browser session without being saved?

Answer - Reflected XSS
Q3. What does DOM stand for?

Answer - Document Object Model
Task 3 - Causes and Implications
Q1. Based on the leading causes of XSS vulnerabilities, what operations should be performed on the user input?

Answer - validation and sanitization
Q2. To prevent XSS vulnerabilities, what operations should be performed on the data before it is output to the user?

Answer - encoding
Task 4 - Reflected XSS
The character we specially have to encode are -

Q1. Which one of the following characters do you expect to be encoded? ., ,, ;, &, or #?
Answer - &
Q2. Which one of the following characters do you expect to be encoded? +, -, *, <, =, or ^?
Answer - <
Q3. Which function can we use in JavaScript to replace (unsafe) special characters with HTML entities?

Answer - escapeHtml()
Q4. Which function did we use in PHP to replace HTML special characters?

Answer - htmlspecialchars()
Task 5 - Vulnerable Web Application 1
Q1. What type of vulnerability is it?

Answer - Reflected XSS
Task 1 - Brief
Q1. What does SQL stand for?

Answer - Structured Query Language
Task 1 - Brief
Q1. What does SQL stand for?

Answer - Structured Query Language
Task 1 - Brief
Q1. What does SQL stand for?

Answer - Structured Query Language