Главная
Study mode:
on
1
Intro
2
OWASP Agenda
3
OWASP Cross-Site-Scripting (XSS) primer
4
OWASP Isn't XSS a solved problem?
5
OWASP How do mitigations work?
6
OWASP Modern Applications - Example
7
OWASP What are Script Gadgets?
8
OWASP Attacker model
9
OWASP Methodology
10
OWASP Bypassing WAFS & XSS filters
11
OWASP Bypassing HTML sanitizers
12
OWASP Bypassing Content Security Policy
13
OWASP Bypassing CSP strict dynamic
14
OWASP Gadgets in expression parsers
15
OWASP Empirical Study
16
OWASP Research Questions
17
OWASP Script Gadgets in user land code
18
OWASP Gadgets effectiveness - user land code
19
OWASP Root Cause Analysis
20
OWASP Example
21
OWASP Challenges
22
OWASP Call to arms
23
OWASP Summary
Description:
Explore a novel web hacking technique that bypasses most XSS mitigations in this 42-minute conference talk from OWASP BeNeLux Day. Delve into the concept of script gadgets, legitimate JavaScript pieces that can be exploited to circumvent HTML sanitizers and security policies. Examine case studies and real-world examples demonstrating the inadequacy of current mitigation techniques for modern applications. Learn about the prevalence of these gadgets in popular JavaScript libraries, APIs, and applications. Understand the methodology behind bypassing Web Application Firewalls, XSS filters, HTML sanitizers, and various Content Security Policy implementations. Analyze empirical study results, root causes, and challenges associated with script gadgets. Gain insights into the need for more preventive mechanisms in web security and the limitations of current XSS mitigations.

Don't Trust the DOM - Bypassing XSS Mitigations via Script Gadgets

OWASP Foundation
Add to list