7 days of WordPress plugins, themes & templates - for free!* Unlimited asset downloads! Start 7-Day Free Trial

Next lesson playing in 5 seconds

  • Overview
  • Transcript

3.1 Injection Attacks and Defenses (Reflected, PHP, and JavaScript)

Injection attacks are the number one vulnerability found in web applications. In this lesson, I’ll demonstrate some of the many attack vectors that allow an attacker to inject data using JavaScript or PHP in a reflected XSS attack. I’ll also demonstrate the built-in protections that JavaScript and PHP have to guard against this, as well as mention JavaScript frameworks that have built-in protections.

Related Links