wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cross site scripting Attack

profile
02_Shaheen Ansari
Oct 20, 2021
0 Likes
0 Discussions
73 Reads

Cross site scripting attack when attacker injects the malicious code into the code of the web application or a web server .

It can happen in many ways like attacker can attack the web server through victim visits or Attackers can also attack victim through web server database .

Generally Attacker do cross site scripting attacks to steal the victim personal data or to get the access to the web server database where all the users of that website is stored. Attacker can also hijack the session it can be dangerous because with that session I'd attacker can access to the user activity without even login to the site.

To prevent from this kind of attacks , we can scan the vulnerabilities of the website, or also we can limit the use of HTML in inputs, sanitizing the data inputs or use the web application firewall and many more.

With the help of very common vectors this attack can be possible, few common vectors listed below:-

<Script>

<Img>

<iframe>

<Body>

<Link>

Through this vectors attackers can inject their code in this tag and get the desired output.

From preventing from this attacks the developer must understand the how cross site scripting works so developer's can take proper precautions to avoid this kind of attacks in future.


Comments ()


Sign in

Read Next

Virtual memory

Blog banner

Art and Culture of Rajasthan

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Virtual Machine

Blog banner

PROCESS STATE:

Blog banner

CRISP-DM Methodology

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Mental Health

Blog banner

Child labour

Blog banner

memory managment

Blog banner

Modern Operating Systems

Blog banner

An Overivew Of Cache Memory

Blog banner

Mumbai Metro 3

Blog banner

Principles of Service Operation

Blog banner

1.1 basic elements

Blog banner

Uber

Blog banner

Blog name

Blog banner

File Management system

Blog banner

Understanding Regression Analysis

Blog banner

Diwali

Blog banner

Risk mitigation and management

Blog banner

Hypothesis Testing in Data Science

Blog banner

Note Taker App

Blog banner

Development Of Modern Operating System

Blog banner

5 Stages of Digital Marketing

Blog banner

Multiprocessor and scheduling

Blog banner

Rapido

Blog banner

LiquidPlanner

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Explain website hacking issues

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Sage business cloud accounting

Blog banner

Memory Management

Blog banner

Theads

Blog banner

Amazon

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Deadlock

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

PPT methodology

Blog banner

Supervised and unsupervised learning

Blog banner

social media issue

Blog banner