December 2011
Beginner
384 pages
9h 38m
English
We’ll Cover
Cross-site scripting
Cross-site request forgery
Sometimes the most effective way that an attacker can compromise your application is not to attack the server directly, but instead to attack your users through their web browsers. Browsers have the inherent defense of the same-origin policy to prevent attacks like this, but vulnerabilities present in your code can allow attackers to circumvent that defense. Now that we have a good understanding of ...