Table of Contents
Chapter 1. Cross-Site Scripting
Identifying Points of Injection
Distinguishing Different Delivery Vectors
Handling Character Sets Safely
Normalizing Character Sets and Encoding
Beware of Exclusion Lists and Regexes
Chapter 2. Cross-Site Request Forgery
Understanding Cross-Site Request Forgery
Request Forgery via Forced Browsing
Get Seven Deadliest Web Application Attacks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.