Tweetovi

Blokirali ste korisnika/cu @WebSecAcademy

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @WebSecAcademy

  1. proslijedio/la je Tweet
    1. velj

    I completed the labs on "Cross-site Scripting" Wow, how high quality this content is and it is for FREE! AMAZING! I learned a ton! Tried some labs for days and sometimes I was so close :) Some were too difficult but now I can examine the solution and learn, thanks!

    Poništi
  2. proslijedio/la je Tweet
    31. sij
    Odgovor korisniku/ci

    This amazing update makes it so much easier for me to delete poor Carlos! 🧀

    Poništi
  3. 31. sij

    Do you want to learn how to pivot to an internal server using CORS and exploit internal web applications? Then you're in luck. We've got just the lab for you:

    Poništi
  4. 31. sij

    We've got 9 winners and it's nearly the weekend, so we've put the solutions live for the new XSS labs. We'll be in touch with the winners shortly to arrange their awesome Carlos T-shirts.

    Poništi
  5. 30. sij

    Learn about dangling markup injection attacks, and practice using it to exfiltrate sensitive data, on our new labs.

    Poništi
  6. 29. sij

    Discover how content security policy can be used to mitigate attacks like XSS, and how to bypass it, on our live vulnerability labs.

    Poništi
  7. 29. sij

    We now have 116 awesome labs on the Web Security Academy. We'll be adding some more soon.

    Poništi
  8. 29. sij

    We currently have 6 winners who've solved all of our fiendish new XSS labs. There are 4 more Carlos t-shirts still to be won.

    Poništi
  9. 28. sij
    Poništi
  10. 28. sij

    Check out our new page on escaping the AngularJS sandbox, including new vulnerability labs.

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    Indeed, some of the new challenges were somewhat hard, but I enjoyed them and learned new tricks. Fortunately, I solved them all fast enough, so I didn't lose my first place in the ranking. 😀 These labs are totally recommended, as always!

    Poništi
  12. 27. sij
    Poništi
  13. proslijedio/la je Tweet
    27. sij

    I completed the Web Security Academy lab: Reflected XSS into HTML context with all tags blocked except custom ones

    Poništi
  14. 27. sij

    Some of our new XSS labs are pretty fiendish. See if you can complete them all without the solutions.

    Poništi
  15. 27. sij

    If you've completed some of our XSS labs before, you can quickly find the ones you haven't completed here:

    Poništi
  16. 27. sij

    We'll be giving away an amazing Carlos T-shirt to the first 10 people on the hall of fame who complete all the XSS labs (new and old). Then we'll enable the lab solutions.

    Poništi
  17. 27. sij

    We've added 11 new XSS labs, with learning materials. There is new content on CSP, dangling markup injection, and escaping the AngularJS sandbox.

    Poništi
  18. 27. sij

    A bunch of awesome new labs (and swag) are coming later today ...

    Poništi
  19. 23. sij

    This blind XXE technique for out-of-band exfiltration was one of the core use cases we had in mind when developing Burp Collaborator:

    Poništi
  20. 21. sij

    The web framework Django used to use this flawed CSRF defence, which once exposed to attack. Check out this lab on our Web Security Academy to learn how:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·