CHAPTER 6
Browser Security Principles: Cross-Site Scripting and Cross-Site Request Forgery

We’ll Cover

image Cross-site scripting

image Cross-site request forgery

Sometimes the most effective way that an attacker can compromise your application is not to attack the server directly, but instead to attack your users through their web browsers. Browsers have the inherent defense of the same-origin policy to prevent attacks like this, but vulnerabilities present in your code can allow attackers to circumvent that defense. Now that we have a good understanding of the same-origin policy and why it’s so important, it’s time to take a look at two of the most common of those vulnerabilities: cross-site scripting and cross-site request forgery.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset