
(Replay) HACKERS: How we GET IN and how to STOP US
The Cyber Threat Perspective
00:00
Using XSS for Initial Access and Phishing
Brad details stored XSS abuse to push malicious payloads to users and capture sessions using tools like BeEF for lateral access.
Play episode from 20:38
Transcript


