DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1

s - s i t e s c r i p t i n g ( X S S )



  1. The webpage is loaded, and the
    malicious code copies the user’s
    cookies.

  2. The system sends an HTTP
    request to an attacker’s web server
    with the stolen cookies in the body
    of the request.

  3. The attacker can then use cookies
    to access sensitive data.


an
d
san
itiz
e
inp
ut
dat
a.

Em
plo
y
coo
kie
sec
urit
y,
suc
h
as
tim
eou
ts,
enc
odi
ng
the
clie
nt
IP
ad
dre
ss,
an
d
so
on.

P h i s h i n g
A threat actor procures sensitive
information—typically usernames,
passwords, and so on—from emails or web
pages.


Ed
uca
te
use
rs
to
avo
id
fall
ing
Free download pdf