Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 10: XSS: Overview, Security Level Testing, and Real-World Attacks
In this lesson, you’ll learn about:
Definition of Cross-Site Scripting (XSS): A client-side web vulnerability where an application executes user-supplied JavaScript instead of treating it as text. It typically occurs in user input areas such as search fields, comment boxes, or feedback forms.
Main Types of XSS:
Reflected XSS (Non-persistent):
The malicious input is not stored in the database.
It only affects users who execute the injected script (e.g., by clicking a crafted link).
Commonly found in search or URL parameters.
Stored XSS (Persistent):
The injected payload is saved in the application database (e.g., in comments).
The script runs automatically for every visitor who loads the infected page.
This type has a higher impact and broader reach.
DOM-based XSS:
The vulnerability exists in the Document Object Model (DOM) layer.
The HTML response may appear unchanged, but JavaScript execution happens client-side.
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 10: XSS: Overview, Security Level Testing, and Real-World Attacks
In this lesson, you’ll learn about:
Definition of Cross-Site Scripting (XSS): A client-side web vulnerability where an application executes user-supplied JavaScript instead of treating it as text. It typically occurs in user input areas such as search fields, comment boxes, or feedback forms.
Main Types of XSS:
Reflected XSS (Non-persistent):
The malicious input is not stored in the database.
It only affects users who execute the injected script (e.g., by clicking a crafted link).
Commonly found in search or URL parameters.
Stored XSS (Persistent):
The injected payload is saved in the application database (e.g., in comments).
The script runs automatically for every visitor who loads the infected page.
This type has a higher impact and broader reach.
DOM-based XSS:
The vulnerability exists in the Document Object Model (DOM) layer.
The HTML response may appear unchanged, but JavaScript execution happens client-side.