XSS Attacks in ASP.NET Core

  Рет қаралды 9,593

Raw Coding

Raw Coding

Күн бұрын

Пікірлер: 14
@boogyman2501
@boogyman2501 Жыл бұрын
Really appreciate the videos that you make. Security is always an afterthought at companies, especially application-level security, so it's hard to find people who share their views and get a different approach to certain problems. Thank you for the effort that you put into this!
@Tolmachovtv
@Tolmachovtv 9 ай бұрын
Nice explanation. Thanks for the video, stay inspired!
@emmanueladebiyi2109
@emmanueladebiyi2109 Жыл бұрын
Great video, really helpfui!
@brandonmanuelventuraumana1035
@brandonmanuelventuraumana1035 Жыл бұрын
Oh man! You are in the game! I have to learn about all those kind of attacks. Do you have nore videos about them? If not, please do more videos about them (SQL injection for example, etc, etc). Thanks your for this video.
@RawCoding
@RawCoding Жыл бұрын
got a CSRF one kzbin.info/www/bejne/b4C4kIaphMdliac
@brandonmanuelventuraumana1035
@brandonmanuelventuraumana1035 Жыл бұрын
@@RawCoding Thank you so much man!
@ahmedifhaam7266
@ahmedifhaam7266 Жыл бұрын
hi, will putting annotations on my api functions help?
@tomekbednarek2672
@tomekbednarek2672 Жыл бұрын
who updates anything with a GET? would that still be a thing with a POST?
@RawCoding
@RawCoding Жыл бұрын
Nobody should, I update with get because I can do it via url instead of typing out a fetch in the console or having more ui
@Kitulous
@Kitulous Жыл бұрын
post and get really only differ by the verb. the http request structure is the same, and it goes like this: HTTP/version VERB address Headers: Values Body as you can see, the request is really generic, and get and post really only differ in the first line. and maybe something else will be different, but generally speaking get and post requests are really similar. the verb merely indicates the intention (getting or adding or patching-editing or deleting etc).
@Klayperson
@Klayperson Жыл бұрын
watch out for that sun injection
@RawCoding
@RawCoding Жыл бұрын
Windows has shit security against the sun (they say it's a feature). need to purchase the blinds system, though that needs a wall adapter, pita
@Kitulous
@Kitulous Жыл бұрын
​@@RawCodingjust use come shit and sticks (cardboard and tape)
@tamaskrisztiannagy3820
@tamaskrisztiannagy3820 Жыл бұрын
One of the best KZbinrs with content focused on high-quality coding and pitfalls. However, cannot do anything against the Sun shining on a monitor. Does anyone know of a KZbin channel dedicated to high-quality blocking of the sun?
Dangers of using IHttpContextAccessor
15:44
Raw Coding
Рет қаралды 13 М.
Cracking Websites with Cross Site Scripting - Computerphile
8:34
Computerphile
Рет қаралды 1,5 МЛН
“Don’t stop the chances.”
00:44
ISSEI / いっせい
Рет қаралды 62 МЛН
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.
Sigma Kid Mistake #funny #sigma
00:17
CRAZY GREAPA
Рет қаралды 30 МЛН
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН
Understanding CORS with ASP.NET Core C#
17:44
Raw Coding
Рет қаралды 13 М.
The Beginner's Guide to Blind XSS (Cross-Site Scripting)
21:21
Don't let MediatR hold you back, try this...
17:48
Raw Coding
Рет қаралды 13 М.
Cross-Site Scripting (XSS) Explained in 7 minutes
7:19
Cross-Site Scripting (XSS) Explained And Demonstrated By A Pro Hacker!
9:31
ASP.NET Core Kestrel Explained
15:58
Raw Coding
Рет қаралды 13 М.
How to Fix + Prevent XSS attacks (Cross Site Scripting)
7:08
“Don’t stop the chances.”
00:44
ISSEI / いっせい
Рет қаралды 62 МЛН