1 00:00:00,210 --> 00:00:04,500 So hi, guys, in this lecture, we are going to see what other types of cross site scripting, the 2 00:00:04,500 --> 00:00:09,810 meaning of exercise to execute JavaScript on the victim's browser, but there are different ways to 3 00:00:09,810 --> 00:00:10,320 achieve it. 4 00:00:10,650 --> 00:00:16,080 So depending on the design and purposes of the website, there are three major categories of exercise 5 00:00:16,350 --> 00:00:17,250 which you can see. 6 00:00:17,250 --> 00:00:23,130 If one is persistent, then we are having reflected accesses, then we are having DOM access. 7 00:00:23,490 --> 00:00:26,130 So we're going to go at each and everyone one by one. 8 00:00:26,160 --> 00:00:29,590 OK, so first one is we are having persistent. 9 00:00:29,940 --> 00:00:35,540 So this form of crossette scripting or exercise also known as is stored accessors. 10 00:00:35,850 --> 00:00:43,680 OK, so excesses flow is called as persistent excess as when injected data stored on a web server or 11 00:00:43,680 --> 00:00:47,100 the database on the server side and the application. 12 00:00:47,120 --> 00:00:52,700 So it simply it stops it back to the user without validation. 13 00:00:53,340 --> 00:00:59,490 So an attacker whose aim is to infect every visitor of the website would use the persistent or stored 14 00:00:59,490 --> 00:01:04,860 based accesses which would enable him or her to exploit the website on a larger scale. 15 00:01:05,760 --> 00:01:11,220 So this is about the persistence of a story based exercice then we are having reflected based. 16 00:01:11,430 --> 00:01:13,530 OK, so this is for the reflectiveness. 17 00:01:13,680 --> 00:01:19,560 So reflected based Xerces, also known as the non persistent accesses as the names are distinct, died 18 00:01:19,710 --> 00:01:26,250 in the form of a dog normalises script is a part of the victims request up to the application, which 19 00:01:26,250 --> 00:01:30,010 is reflected back by the application in form of the response. 20 00:01:30,300 --> 00:01:36,510 So this may look difficult to exploit as users won't willingly sustain a malicious script or so, but 21 00:01:36,510 --> 00:01:42,280 there are several ways they use it to launch a deflected accessors attack against its browser. 22 00:01:42,990 --> 00:01:46,850 So this is all about reflected then we are having addendum based. 23 00:01:47,730 --> 00:01:48,950 So now let's talk about this. 24 00:01:49,290 --> 00:01:54,900 So this is the third type, of course, that the scripting is the local and directly affected the victims 25 00:01:54,900 --> 00:01:55,330 browser. 26 00:01:55,530 --> 00:02:01,140 So this attack does not rely on the malicious content being sent to the server in the persistent and 27 00:02:01,140 --> 00:02:02,190 reflected beast. 28 00:02:02,460 --> 00:02:07,740 The script is included in the response where the server, the victim's browser, accept it and assume 29 00:02:07,740 --> 00:02:12,920 it to be a legitimate part of the webpage and execute it as a child. 30 00:02:13,020 --> 00:02:21,000 But in case of Doumbia successes, only to meet to meta script that is provided by the Web server is 31 00:02:21,000 --> 00:02:21,780 executed. 32 00:02:22,350 --> 00:02:28,470 So as increasing number of achievement pages are generated by the downloading of JavaScript on a client 33 00:02:28,470 --> 00:02:29,880 side rather than by the SOA. 34 00:02:30,150 --> 00:02:36,770 So any time an element of the web page is to be changed without repressing the entire page. 35 00:02:37,200 --> 00:02:39,480 So it is done using that JavaScript. 36 00:02:39,690 --> 00:02:44,160 So typical example is a website providing a light update of cricket match. 37 00:02:44,490 --> 00:02:48,660 So which references that score section in regular interval. 38 00:02:49,630 --> 00:02:54,120 So guys, this is all about all three types of exercise that we have from the Nicollet John or they 39 00:02:54,120 --> 00:02:56,270 are going to start with our attacking phase. 40 00:02:56,520 --> 00:02:57,900 So this is all for this Lechuga.