Image for post
Image for post
© PortSwigger

What can an attacker do?


Image for post
Image for post
© PortSwigger
  • Self-XSS / Reflected XSS / Non-persistent XSS / Type-II XSS
  • Persistent XSS / Stored XSS / Type-I XSS
  • DOM based XSS

Self-XSS

Self-XSS Example


Image for post
Image for post

A summary


How do you go from raw data to a fully working machine learning solutions?



Image for post
Image for post

What’s the most difficult way to earn $1M US Dollars?


Checksums

Image for post
Image for post


Humans



This article was published in 2015, so it doesn’t reflect the current state of things but you can read the 2019 update.

About

Michele Preziuso

CEO @KaosDynamics. AWS Certified DevOps Engineer, Solutions Architect @Peach_video. Security fanatic. I build things, I break things. Also a human …sometimes.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store