当前位置:网站首页>XSS cross site scripting attack
XSS cross site scripting attack
2022-06-26 08:52:00 【Cwillchris】
One 、XSS Cross-site scripting attacks
1、Cookie summary
2、 Use JavaScript establish Cookie
JavaScript have access to document.cookie Property to create 、 Read 、 And delete cookie.
example 1:JavaScript in , establish cookie As shown below :
document.cookie="username=John Doe";
example 2: You can also for cookie Add an expiration time ( With UTC or GMT Time ). By default ,cookie stay Delete when browser closes :
document.cookie="username=John Doe; expires=Thu, 18 Dec 2043 12:00:00 GMT";
Such as :

3、JavaScript Cookie example
Description of the experiment :
In the following example , We will create cookie To store visitor names .
First , Visitors visit web page , He will be asked to fill in his name . The name will be stored in cookie in .
边栏推荐
- opencv学习笔记二
- How to correctly PIP install pyscipopt
- Tokenizer description in Bert
- I Summary Preface
- SQL learning experience (II): question brushing record
- 51 MCU project design: Based on 51 MCU clock perpetual calendar
- Fourier transform of image
- Zlib static library compilation
- Degree of freedom analysis_ nanyangjx
- FFmpeg音视频播放器实现
猜你喜欢

Reverse crawling verification code identification login (OCR character recognition)

Whale conference provides digital upgrade scheme for the event site

51 MCU project design: Based on 51 MCU clock perpetual calendar

【云原生 | Kubernetes篇】深入万物基础-容器(五)

Exploration of webots and ROS joint simulation (I): software installation

OpenCV Learning notes iii

First character that appears only once

Remote centralized control of distributed sensor signals using wireless technology

Trimming_ nanyangjx

QT_ AI
随机推荐
Recovering the system with Clonezilla USB disk
Batch execute SQL file
关于极客时间 | MySQL实战45讲的部分总结
Use of PCL
[resolved]setonnavigationitemselectedlistener() deprecated
How to realize wireless Ethernet high-speed communication for multiple Mitsubishi PLCs?
Using transformers of hugging face to realize text classification
多台三菱PLC如何实现无线以太网高速通讯?
Addition of attention function in yolov5
Backward usage
Relationship extraction --r-bert
Convex optimization of quadruped
Esp8266wifi module tutorial: punctual atom atk-esp8266 for network communication, single chip microcomputer and computer, single chip microcomputer and mobile phone to send data
Regular Expression 正则表达式
在同花顺开户证券安全吗,
Detailed process of generating URDF file from SW model
Pandas vs. SQL 1_ nanyangjx
Using MySQL and Qt5 to develop takeout management system (I): environment configuration
And are two numbers of S
Object extraction_ nanyangjx