
Overview
Content Security Policy (CSP) is the most powerful defensive technology in modern web applications. For hackers, this is an obstacle that blocks their attacks. That’s why hackers are very interested in bypassing Content Security Policy and obviously, you don’t want that to happen.
In this course, you’ll learn how your Content Security Policy can be bypassed by hackers. What’s more, you’ll learn how to check if your Content Security Policy is vulnerable to these attacks. First, you will learn how hackers can bypass a CSP via ajax.googleapis.com.
Next, you will learn how hackers can bypass a CSP via Flash file. After that, you will understand what a polyglot file is and how it can be used to bypass a CSP.
Finally, you will understand how hackers can bypass a CSP via AngularJS. For every single attack presented in this course, there is a demo so that you can see step by step how these attacks work in practice.
What You Will Learn
- Learn how hackers can bypass the most powerful defensive technology in modern web applications
- Discover how hackers can bypass a CSP via ajax.googleapis.com
- Explore how hackers can bypass a CSP via Flash file
- Learn how hackers can bypass a CSP via polyglot file
- Discover how hackers cab bypassing a CSP via AngularJS
- Learn step by step how all these attacks work in practice (DEMOS)
- Check if your Content Security Policy is vulnerable to these attacks
- Become a successful penetration tester / ethical hacker
Prerequisites
- Basic Ethical Hacking skills.
- Basic understanding of XSS attacks.
You must reply in thread to view hidden text or upgrade your account to always see hidden content.