Skip main navigation

Exploitation Cont.

In this video, Paulo Silva will demonstrate a continued attempt to insert a payload into the system and expand on vulnerabilities to XSS threats.

In this video, the demonstration on identifying if the system is vulnerable to XSS threats is continued

In the last video, you saw an attempt to insert a payload into the system, which was not successful. In this video, you will see a continued attempt to do so. You will also learn what these attempts and failures can tell you about the system to help you plan an alternate attack.

Investigate and share: You have just watched a demonstration on session hijacking. Go to the OWASP Session Hijacking page and read the information there. Do you think that your system is vulnerable to these kinds of attacks? What are you currently doing to mitigate these attacks? In the next video, you will learn more about how to protect your system, but first share your comments in the section below.

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now