Learn

Awesome job! XSS Attacks are still very common and it’s important to be aware of them so you don’t fall victim to one. We’ve looked at what can happen behind the scenes if an attacker successfully injects malicious code into a vulnerable site, but that’s not the only way to create an XSS attack. That’s why it’s important to never click suspicious links or submit private data into any unknown application!

Let’s break down what we’ve learned so far:

  • How DOM-Based, Reflected, and Stored XSS attacks are different from each other and how they can be used to retrieve vulnerable data.

  • How an attacker can inject malicious code into a vulnerable application using <script> tags and Javascript.

  • How a user can be tricked into submitting their private information using cookies.

  • How to use express-validator and its built-in methods in order to validate input data.

  • Why it’s important to use data validation packages in order to sanitize data in an application to prevent malicious code injection.

  • How to use secure cookies in express-session to prevent an XSS attack.

  • How to use helmet to secure HTTP headers and protect yourself from numerous types of attacks, including XSS attacks.

When creating an application, there is no silver bullet. It’s important to consider all possible ways an attacker might inject malicious code into your app, and take the appropriate measures to protect yourself and your users.

Sign up to start coding

Mini Info Outline Icon
By signing up for Codecademy, you agree to Codecademy's Terms of Service & Privacy Policy.
Already have an account?