© PortSwigger

What can an attacker do?

© PortSwigger
  • Self-XSS / Reflected XSS / Non-persistent XSS / Type-II XSS
  • Persistent XSS / Stored XSS / Type-I XSS
  • DOM based XSS


Self-XSS Example

A summary

How do you go from raw data to a fully working machine learning solutions?

What’s the most difficult way to earn $1M US Dollars?



This article was published in 2015, so it doesn’t reflect the current state of things but you can read the 2019 update.

Michele Preziuso

CEO @KaosDynamics. Sr. Software Engineer @Peach_video. AWS Certified DevOps Engineer, Solutions Architect. Security fanatic.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store