Главная
Study mode:
on
1
Intro
2
WHAT DO I DO?
3
OVERVIEW
4
WHAT IS REST?
5
REST AUTHENTICATION
6
WHAT IS A CROSS-ORIGIN REQUEST?
7
CORS REQUEST HEADERS FOR PRE-FLIGHT
8
CORS PRE-FLIGHT RESPONSE HEADERS
9
BYPASSING CORS
10
COMMON CORS PITFALLS BY TESTERS
11
MULTI-STEP CORS EXPLOIT EXAMPLE
12
CORS DEFENSES
13
DO AUTHORIZATION HEADERS HELP?
14
SUMMARY
15
RESOURCES
Description:
Explore the intricacies of Cross-Origin Resource Sharing (CORS) in this 42-minute conference talk from Circle City Con 2019. Delve into REST authentication, cross-origin requests, and CORS request headers for pre-flight. Learn about CORS pre-flight response headers, methods for bypassing CORS, and common pitfalls encountered by testers. Examine a multi-step CORS exploit example and discover effective CORS defenses. Investigate the role of authorization headers in security and gain valuable insights from a comprehensive summary and additional resources provided.

Of CORS It's Exploitable - What's Possible with Cross-Origin Resource Sharing

Add to list