A8 and A3: Cross-Site Attacks

OWASP
  • 12 Videos | 51m 23s
  • Includes Assessment
  • Earns a Badge
Likes 56 Likes 56
OWASP Top 10 list items 8 and 3 include cross-site attacks, which are very common exploits in modern web applications

WHAT YOU WILL LEARN

  • explain what Cross-site Request Forgery (CSRF) is
    exploit CSRF and what kind of access is needed to exploit it
    detect CSRF and how common they are
    list technical and business impacts of CSRFs
    provide examples of CSRF attacks
    describe what Cross-site Scripting (XSS) is
  • exploit XSS and what kind of access is needed to exploit it
    detect XSS and how common it is
    list the technical and business impacts of XSS
    provide examples of XSS attacks
    review an XSS attack
    describe how CSRF and XSS can be exploited by an attacker

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

CHANNEL OWASP
Likes 132 Likes 132  
Likes 34 Likes 34  
Likes 38 Likes 38  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 91 Likes 91  
Likes 107 Likes 107  
Likes 132 Likes 132