Miniseries: XSS to the core — Pt.2

In the second part of our mini-series, we are going to look at the types of XSS and what we can do to evade those pesky filters! In the last part, we are diving deeper into exploiting these filter evasions in different contexts.

Photo by Caspar Camille Rubin on Unsplash

Stored vs Reflected

Stored and reflected XSS are two types that differ by the way their attack vector is retrieved, their exploitability…

--

--

--

No b*llshit Hacking tutorials with extreme value in short bursts

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

MAP Protocol Weekly Report #49 (November 23rd — November 29th)

Your “face” can be bought for 50 cents

CORE’s Bug Bounty: Reward Announcement

Secure Data SecureDrive KP Portable Encrypted Data Storage REVIEW | MacSources

DataLocker Sentry K300 8GB Flash Drive review | MacSources

TikTok and Xi Jinping

How hard/easy is it to defraud your company?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Thexssrat

Thexssrat

No b*llshit Hacking tutorials with extreme value in short bursts

More from Medium

Miniseries: XSS to the core — Pt.1

Secure Code Review -1 | Cheat sheet For Security Vulnerability In Python — Injection Flaws

Using Burp Suite to Bruteforce Anti CSRF token-based forms

How I Exploited 4 Vulnerabilities In A Website