Attack the article

XSS

Stored XSS

Reflect lines XSS

DOM-based XSS

Reflected vs DOM-based

CSRF

CSRF–GET

Injection

Injection demo 1

Infection is more than SQL

injection demo 2

SSRF demo

DoS

ReDoS

DDoS

Man-in-the-middle attack

Defense article

XSS

String generation DOM

The user loops SVG

User-defined style

The same-origin policy

CSP

CSRF defense

token

The iframe attacks

CSRF anti-pattern

SameSite Cookie

Correct posture to defend against CSRF

Defend against CSRF in middleware

Injection

Injection beyond SQL

  • Principle of least authority
  • Set up the allowed list + filter
  • Restrictions on URL type parameters such as protocol, domain name, and IP address

DDos

Defensive middleman

HTTPS

Some features of HTTPS

  • Asymmetric encryption
  • Symmetric encryption

integrity

A digital signature

Non-repudiation: digital signature

A certificate is also a certificate

SRI

Add the content