<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>keylogger on Asa&#39;s Website</title><link>https://ahessmat.netlify.com/tags/keylogger/</link><description>Recent content in keylogger on Asa&#39;s Website</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Fri, 05 Mar 2021 19:48:49 +0000</lastBuildDate><atom:link href="https://ahessmat.netlify.com/tags/keylogger/index.xml" rel="self" type="application/rss+xml"/><item><title>Review: Javascript for Pentesters</title><link>https://ahessmat.netlify.com/post/2021-03-review-javascript-for-pentesters/</link><pubDate>Fri, 05 Mar 2021 19:48:49 +0000</pubDate><guid>https://ahessmat.netlify.com/post/2021-03-review-javascript-for-pentesters/</guid><description>Preamble I just finished the &amp;ldquo;Javascript for Pentesters&amp;rdquo; course offered by PentesterAcademy. I found it to be an effective refresher in injecting Javascript and manipulating the Document Object Model (DOM). However, it was woefully thin on educational material.
The course is composed of 21 Tasks that progressively build upon each other. Initially, the attacker is simply editing the DOM; overtime, this goes into hijacking Cross-Site Request Forgery (CSRF) tokens, working with JSON-formatted string data, and passing data to an attacker controlled webserver.</description></item></channel></rss>