Cracking Websites with Cross Site Scripting - Computerphile

  Рет қаралды 1,534,902

Computerphile

Computerphile

Күн бұрын

Пікірлер: 905
@Computerphile
@Computerphile 11 жыл бұрын
now, should we keep that end graphic? :)
@Tokkemon
@Tokkemon 9 жыл бұрын
That's Javascript! I'm gonna run that!!! -Quote of the year.
@SpencerGreenDotNet
@SpencerGreenDotNet 8 жыл бұрын
"That's JavaScript code! I'm gonna run that!" Gotta love the childlike enthusiasm of this personification of web browsers.
@idamontede
@idamontede 8 жыл бұрын
*-html styling does not work in youtube comments. believe me-*
@PrivatePaul
@PrivatePaul 9 жыл бұрын
why in the world are you doing this in a hotel lobby?
@Wrswest
@Wrswest 8 жыл бұрын
There's a comment in a Javascript project I worked on that says: [bunch of checks for user input] //You know, if the users could just be more considerate //I wouldn't have to do any of this.
@zwz.zdenek
@zwz.zdenek 10 жыл бұрын
The guy who found the Facebook vulnerability was actually rudely rejected by Facebook and got his well deserved money as donations!
@DavidChipman
@DavidChipman 8 жыл бұрын
I love Tom Scott's enthusiasm for this stuff!
@ComputersAreRealCool
@ComputersAreRealCool 9 жыл бұрын
*Apparently HTML Works in KZbin Comments, judging by the large amount of bold comments* Can I put bootstrap into my comments to make them look pretty?
@Computerphile
@Computerphile 11 жыл бұрын
In a very dark place that wouldn't let us use a light! - its the Renaissance Hotel at St Pancras, London >Sean
@カラスKarasu
@カラスKarasu 9 жыл бұрын
"Which is not entiiiirely legal under the computer misuse act, but no one pressed charges" I didn't know he was such a rebel XD
@tajultonim
@tajultonim 10 ай бұрын
"Cross site scripting is the number one vulnerability on the web today" me watching in 2023: hmmmm, sounds legit...
@el__monke
@el__monke 8 жыл бұрын
*bold* _slant_ -strike- *_-Magic-_*
@nandoflorestan
@nandoflorestan 8 жыл бұрын
The content of this video is true, however, none of it is about cross-site scripting.
@joeytje50
@joeytje50 11 жыл бұрын
Another cool thing for input dropdowns, is changing the value of one of the s in the , and then submitting. Especially if the output does something with the value of the dropdown, for example with an age input where the output has control over the date format, it completely screws up. Example: I change my birthday to "Cake Pie 1000BC". That will, on a lot of sites with profiles that use this dropdown system for birthdays, completely break the thing when it's trying to convert the month number for example to the month name, since there is no "Pie"th month in the year. It's quite harmless, unless the site actually displays the thing you entered in the input directly on the page, in which case you might indeed be able to insert a script tag. PS: I've managed to cause my profile to completely break by doing this on a site once, after which it just gave me back an error 500. Great fun. I decided to change it back afterwards though. (keep in mind that if your birthday is loaded onto your settings page too, you might also get an error on the settings page, and you won't be able to change it back)
@henhouse
@henhouse 8 жыл бұрын
This video just helped me notice an XSS vulnerability on one of my sites. Thank you. :|
@UberJamesMan
@UberJamesMan 9 жыл бұрын
wut wut
@vuralmecbur9958
@vuralmecbur9958 10 жыл бұрын
2:35 I've never seen a JavaScript code that looks like "i+i=2", it looks more like an equation :D
@hakeemgreen8788
@hakeemgreen8788 9 жыл бұрын
I love this guys enthusiasm when explaining. Makes it more interesting.
@capnapalm
@capnapalm 11 жыл бұрын
I love these videos because they explain how people have broken into webpages to re-write them, steal info, etc. You always hear how vulnerable stuff can be but never the specifics about how people get in. Great videos as usual, Brady!
@voxlvalyx
@voxlvalyx 9 жыл бұрын
The white balancing in this video confuses me.
@xSCOOTERx2
@xSCOOTERx2 10 жыл бұрын
alert("hi");
@PrimusProductions
@PrimusProductions 11 жыл бұрын
test
@juan193
@juan193 8 жыл бұрын
So Wikipedia describes him as a comedian to which I agree, but... Does he have a Masters in computer science or a title alike? He's got an amazing skill to explain complex stuff!
@aspermwhalespontaneouslyca8938
@aspermwhalespontaneouslyca8938 Жыл бұрын
The ending doesn't have a dash because you are supposed to binge the next 20 computerphile videos after it...
@NetgearProductions
@NetgearProductions 10 жыл бұрын
So how on earth could you use javascript to make a webpage send users info to your pc if it only affects you?
@tinypotato2112
@tinypotato2112 10 жыл бұрын
I fucking love this guy!
@_Super_Hans_
@_Super_Hans_ 11 жыл бұрын
I didn't understand a single word of what that guy just said but he's super engaging and the 8 minutes flew by.
@RichardMurrie
@RichardMurrie 11 жыл бұрын
Great video. I wish I had been taught at school by someone speaking passionately about their subjects like he does!
@IceMetalPunk
@IceMetalPunk 11 жыл бұрын
Omegle had that same problem for a bit when they introduced Spy Mode. They weren't sanitizing their question inputs, so for a while I would go around sticking JS in there that froze the computers of whoever got stuck with my question XD They fixed it in a few days, though.
@DivinityStripes
@DivinityStripes 11 жыл бұрын
Tom Scott is really good at explaining things and I LOVE the concepts he explains. More from Mr. Scott? :3
@60RPM
@60RPM 9 жыл бұрын
Pfft... ? You should use instead.
@maurerpe
@maurerpe 11 жыл бұрын
Client side filtering is a good idea because it can make it easier on the legitimate user. E.g. tell them the phone number is invalid before they hit submit, saving them time. But client side prefiltering does not add any additional security. All inputs must be fully validated at the server. There is no guarantee that an attacker will be using a polite client that follows your prefiltering rules. An attacker can download the page and remove the rules.
@runescaper1333
@runescaper1333 9 жыл бұрын
So if I typed *and closed it with* , youtube will make it bold?
@mohamedelgamal3202
@mohamedelgamal3202 4 жыл бұрын
so basically this is SQL injection but with javascript
@idevilousbho5491
@idevilousbho5491 5 жыл бұрын
I'm a BS Physics student(first year) I really want to learn more about Cyber Security, I want to shift but I would waste my scholarship so yeah I'm watching your videos...Thank you!
@kimbosprite
@kimbosprite 9 жыл бұрын
This man has a lot of energy and enthusiasm for this topic.
@EliPerelman
@EliPerelman 11 жыл бұрын
XSS is even more dangerous when coupled with Cross-site Request Forgery (CSRF). A video on CSRF would probably be a nice follow-up to this.
@alpenwasser6869
@alpenwasser6869 11 жыл бұрын
Ah yes, Bobby Tables. Definitely one of the more amusing tech jokes I've come across, still gets a good chuckle from me every time I read it. :)
@1redrider100
@1redrider100 8 жыл бұрын
Why does HTML use while BBCode use [/]? I'm fairly code illiterate so no big words please @.@
@1redrider100
@1redrider100 8 жыл бұрын
***** Thank you
@HarshKanakhara
@HarshKanakhara 10 жыл бұрын
alert("What a Duhhh...???");
@ShellmanDeluxe
@ShellmanDeluxe 11 жыл бұрын
I like the dark lighting. Makes it feel more laid back and down to earth :D
@indago9
@indago9 11 жыл бұрын
You should do Cross-Site Reference Forgery next. Tom is so cute~~
@won1853
@won1853 11 жыл бұрын
He's so funny yet so informative. More of this guy!
@4226sniper
@4226sniper 9 жыл бұрын
Just trying to see if the bold tag works here
@Soitisisit
@Soitisisit 5 жыл бұрын
Wheeeeeee
@Alex2Buzz
@Alex2Buzz 9 жыл бұрын
"Someone *at Netscape* comes along and invents JavaScript!"
@therattman
@therattman 9 жыл бұрын
Its funny how many people are actually trying to do XSS on KZbin just because they saw a video explaining about it xD
@Falconcoder
@Falconcoder 9 жыл бұрын
*_GUYS IT WORKS!_*
@jasonneu81
@jasonneu81 9 жыл бұрын
Nope.
@midsummerstation3345
@midsummerstation3345 9 жыл бұрын
***** *i think so*
@danielsimmons3956
@danielsimmons3956 7 жыл бұрын
Where did you even get dot matrix printer paper?
@NehalemUnleashed
@NehalemUnleashed 10 жыл бұрын
That is JavaScript! I'm gonna RUN that!
@clementboutaric3952
@clementboutaric3952 5 жыл бұрын
But how can you influence the web page of others by just modifying script on the page you were sent ? You can modify whatever you want, but when another person will send a request to the site, it will send them back the original page, without any of the modification you applied. Am I wrong ?
@martonlovas4583
@martonlovas4583 5 жыл бұрын
5:58 not TECHNICALLY ENTIRELY LEGAL
@011azr
@011azr 9 жыл бұрын
Test *Test* Test
@011azr
@011azr 9 жыл бұрын
011azr -Test- *_Test_* _Test_ Um, okay *:O*
@error.418
@error.418 9 жыл бұрын
The and tags were deprecated loooong before this video was released :(
@beat461
@beat461 8 жыл бұрын
So you are basically adding scripts in input boxes where the designers never intended you to be able to do that, just like xml injection, but with javascript. Why is it called cross site scripting then? there is only one site involved in this process right? for me the name implied that you scripted something from one site to another, somehow.
@AdamYarris
@AdamYarris 9 жыл бұрын
You have ruined my internet searching for life. Not every time I see a user input box i need to put in code xD
@PrimusProductions
@PrimusProductions 11 жыл бұрын
3:55 Just send Rick Astley instead.
@icewallowcome3023
@icewallowcome3023 11 жыл бұрын
"never trust user input" This should have been this video's conclusion! =)
@noeldoesthings
@noeldoesthings 2 жыл бұрын
I just accidentally crashed the website of my mothers business. I thought searching for "kast" (dutch for closet) wouldn't do anything...turns out it did, and the site is down Edit: turns out it's only on the wifi that i'm on (I guess it has something to do with IP-adresses?) so that's a relief.
@prestonferry
@prestonferry 5 жыл бұрын
Tom “You should know this” Scott
@xCmOn3yx777
@xCmOn3yx777 Жыл бұрын
I saw a video where someone explained how to gain (control) of /root; using this method on the most secure linux systems through a stack buffer overflow (overloading the system memory in a way that lets them right whatever they choose). /root on a systme = god
@danman6669
@danman6669 3 жыл бұрын
"Someone comes along and invents JavaScript." It would be nice if you gave him credit. It was Brendan Eich.
@_GhostMiner
@_GhostMiner Жыл бұрын
Discord forgot about XSS on their new servers page and someone used it to steal accounts 😂
@imagedezach
@imagedezach 5 жыл бұрын
Tom explains this in 8 mins better than my Network security professor in an entire lecture
@DungNguyen-cr3hv
@DungNguyen-cr3hv 7 ай бұрын
That's quite bold
@durchschnittlich
@durchschnittlich 8 жыл бұрын
Computerphile can just have a self-closing one:
@Nomoreidsleft
@Nomoreidsleft 11 жыл бұрын
All possible in theory, except that all browsers will not allow you to use javascript to send data from one page to another page or out to another server that's not part of the website you are on. He also said that javascript runs on the server, but in fact it runs locally on your browser. You can hack a browser to allow inter-page and inter-site sending, but then you have to get that browser into the target's machine and make them use it instead of the real one.
@illustriouschin
@illustriouschin 11 жыл бұрын
I would just like to thank who ever's idea it was to do the Audible promotion because audio books are expensive and getting a free one was a really nice gesture.
@21awp
@21awp 11 жыл бұрын
Surprisingly, a few years back (2010) KZbin messed up and something similar to that would work...
@Macfanize
@Macfanize 11 жыл бұрын
The passion and enthousiasm is great ! More please :)
@shazbots
@shazbots 8 жыл бұрын
This reminds me of Bobby Tables.
@hapatraditionalist1478
@hapatraditionalist1478 8 жыл бұрын
should be for a single-tag element, not as most people will suggest, because the latter is the closing tag for a double-tag element.
@smygaxel720
@smygaxel720 10 жыл бұрын
*_-I'm A Wizard-_*
@rlamacraft
@rlamacraft 11 жыл бұрын
Great video! More please :) Also, love his impression of a web browser at 5:33 :)
@addisonbean
@addisonbean 10 жыл бұрын
What about the Javascript consoles that almost all browsers have? Why aren't those dangerous?
@DahChen
@DahChen 9 жыл бұрын
LOL everyone in the comments apparently don't know that not all textboxes translates your input into pure HTML *sigh*
@M1mer
@M1mer 11 жыл бұрын
I don't quite understand this... How come, if I change the javascript on a certain webpage locally, other people can see it? I've never heard of that before - Or are you guys on about sites that don't check values on serverside and just save whatever you post to it?
@TehGordonFreeman
@TehGordonFreeman 11 жыл бұрын
I like the darkness, it adds to the atmosphere, and (at least I can) still see everything just fine...
@TheSpacecraftX
@TheSpacecraftX 9 жыл бұрын
Somebody recently got a bunch of money from Google because they found something like this in KZbin that made it possible for people to delete every video on the site.
@MrHyde-fu5sr
@MrHyde-fu5sr 9 жыл бұрын
don't understand how this could be dangerous.For example anyone can click inspect element and type some text into their web browser and change a COPY of the page they're looking at no one else will ever use that copy you have changed.In this same manner, how would me writing a script inside of my copy of a webpage effect someone else's copy?
@lolbajset
@lolbajset 9 жыл бұрын
+Curran Hyde If i understood the video correctly it is when someone else visits your webpage that the script gets executed. If I make a website and add a script in the middle of its html, it will run when you or anyone else loads the page, thus enabling attacks. Again, that's at least how I understood it, could be wrong
@MrAntiKnowledge
@MrAntiKnowledge 9 жыл бұрын
+Curran Hyde It only becomes a problem for sites which allow users to post something which gets displayed to other users. Like this comment here (only that youtube is smart enought to filter out code). If you don't have a filter active that say... replaces "" with "<script>"* then whatever the user writes in between and will be run as code in the Browser of another user who happens to get that text either because it was send to his account, or cause he visited the page where it was posted. *("<script>" would be displayed as to the user, but the browser understands that it shouldnt be run as code)
@funnyasdeath
@funnyasdeath 11 жыл бұрын
So let's say I find an exploit, but I decide not to tell the company... Who else can I tell?
@davidj2826
@davidj2826 9 жыл бұрын
Dot Matrix paper for notes!?! Someone's got funding!
@madboys2936
@madboys2936 6 жыл бұрын
i will try to hack the comment section by using script lol!!!
@noredine
@noredine 8 жыл бұрын
Googled Rick Astley, rick rolled again :/
@andrewpeterson5016
@andrewpeterson5016 9 жыл бұрын
_All of you guys talking about and ...I'll be over here having fun with my _*__*_ tag!!_
@craigharkins4669
@craigharkins4669 8 жыл бұрын
bold text: *test*
@crazyarchon476
@crazyarchon476 Жыл бұрын
that's why i tried breaking things lol
@_multigrin
@_multigrin 10 жыл бұрын
"That is Javascript code I'm gonna run that!" love it!
@MichaelPomeroyinmauritania
@MichaelPomeroyinmauritania 11 жыл бұрын
Doug65536, Please make a video about how one should conduct an XSS attack. Lemmi know when its up. Thanks
@BrettGregson
@BrettGregson 10 жыл бұрын
alert("hello");
@MrBenMcLean
@MrBenMcLean 7 жыл бұрын
Great description of unauthorized Javascript execution but I didn't quite get what was the "cross site" part of this.
@hoon4tw
@hoon4tw 11 жыл бұрын
Tom Scott is definitely my new favorite, especially considering all of Brady's other channels have slowed down. Tom is making a very good showing. Keep it up.
@RyanHansen_101
@RyanHansen_101 11 жыл бұрын
4:03 "Because myspace hadn't quite filtered javascript properly". Brilliant!
@AureliusR
@AureliusR 8 жыл бұрын
What the hell? What happened to the white balance between this video and the last?!
@Computerphile
@Computerphile 8 жыл бұрын
it got dark.... :) >Sean
@justpaulo
@justpaulo 9 жыл бұрын
" **it works** " "it doesn't work"
@Hiimstring3
@Hiimstring3 11 жыл бұрын
Defiantly the most ecstatic video you've done, really entertaining, whilst also quite educational.
@calvinjonesyoutube
@calvinjonesyoutube 9 жыл бұрын
The bold, scorethrough and italics formatting of text in the comments isn't due to html. It's using specific symbols youtube has designated for this purpose such as asterixes before and after txt for *BOLD*
@vacklinge
@vacklinge 11 жыл бұрын
I love this guy. He really seems to love what he's doing.
@THB192
@THB192 10 жыл бұрын
BAD, BAD, TOM. Do not put formatting in your HTML.
Cross Site Request Forgery - Computerphile
9:20
Computerphile
Рет қаралды 764 М.
Hacking Websites with SQL Injection - Computerphile
8:59
Computerphile
Рет қаралды 2,4 МЛН
Watermelon magic box! #shorts by Leisi Crazy
00:20
Leisi Crazy
Рет қаралды 48 МЛН
Electric Flying Bird with Hanging Wire Automatic for Ceiling Parrot
00:15
How NOT to Store Passwords! - Computerphile
9:24
Computerphile
Рет қаралды 2,3 МЛН
The Worst Typo I Ever Made
11:25
Tom Scott
Рет қаралды 6 МЛН
Has Generative AI Already Peaked? - Computerphile
12:48
Computerphile
Рет қаралды 994 М.
Cross-Site Scripting (XSS) Explained
11:27
PwnFunction
Рет қаралды 446 М.
Why The Government Shouldn't Break WhatsApp
11:11
Tom Scott
Рет қаралды 3,7 МЛН
Internationalis(z)ing Code - Computerphile
8:18
Computerphile
Рет қаралды 1 МЛН
Cross-Site Scripting (XSS) Explained! // How to Bug Bounty
14:43
DO NOT USE alert(1) for XSS
12:16
LiveOverflow
Рет қаралды 165 М.
The Problem with Time & Timezones - Computerphile
10:13
Computerphile
Рет қаралды 4 МЛН
Watermelon magic box! #shorts by Leisi Crazy
00:20
Leisi Crazy
Рет қаралды 48 МЛН