(no title)
jdsleppy | 2 months ago
I believe if you always keep session cookies in secure, HTTP-only cookies, then you are more resilient to this attack.
I interviewed frontend devs last year and was shocked how few knew about this stuff.
jdsleppy | 2 months ago
I believe if you always keep session cookies in secure, HTTP-only cookies, then you are more resilient to this attack.
I interviewed frontend devs last year and was shocked how few knew about this stuff.
notnullorvoid|2 months ago
It's true that an HTTP-only session cookie couldn't be directly taken, but it's trivial to present the user with a login screen and collect their password (and OTP), at which point you can easily get a session remotely. It can look entirely like the regular login page right down to the url path (because the script can modify that without causing a page load).
socketcluster|2 months ago
drewvlaz|2 months ago
jonfw|2 months ago
giancarlostoro|2 months ago
seaal|2 months ago
ddlsmurf|2 months ago
collinmanderson|2 months ago
hackermondev|2 months ago
edoceo|2 months ago
s_ting765|2 months ago
z3t4|2 months ago
abustamam|2 months ago
j-krieger|2 months ago
collinmanderson|2 months ago
netdevphoenix|2 months ago
Aldipower|2 months ago