wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cross site scripting Attack

profile
02_Shaheen Ansari
Oct 20, 2021
0 Likes
0 Discussions
73 Reads

Cross site scripting attack when attacker injects the malicious code into the code of the web application or a web server .

It can happen in many ways like attacker can attack the web server through victim visits or Attackers can also attack victim through web server database .

Generally Attacker do cross site scripting attacks to steal the victim personal data or to get the access to the web server database where all the users of that website is stored. Attacker can also hijack the session it can be dangerous because with that session I'd attacker can access to the user activity without even login to the site.

To prevent from this kind of attacks , we can scan the vulnerabilities of the website, or also we can limit the use of HTML in inputs, sanitizing the data inputs or use the web application firewall and many more.

With the help of very common vectors this attack can be possible, few common vectors listed below:-

<Script>

<Img>

<iframe>

<Body>

<Link>

Through this vectors attackers can inject their code in this tag and get the desired output.

From preventing from this attacks the developer must understand the how cross site scripting works so developer's can take proper precautions to avoid this kind of attacks in future.


Comments ()


Sign in

Read Next

 " Healing of Yoga "

Blog banner

Emerging threats in cyber Forensics

Blog banner

Virtualization

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Memory input output management

Blog banner

Virtual Machine

Blog banner

To-Do List In LISP

Blog banner

IT security management

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Modern Operating Systems

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

A small world of Sockets

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Blog name

Blog banner

WORKFRONT SOFTWARE

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Operating Systems

Blog banner

Getting started with Android Studio

Blog banner

Steganography and Steganalysis

Blog banner

Types of Threads

Blog banner

(Input/Output) in os

Blog banner

Memory Management of Operating System(OS)

Blog banner

File management

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Why Data Security Is Important

Blog banner

Uniprocessor Scheduling

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Data Science in Mental Health Prediction

Blog banner

What is Data, Information and Knowledge?

Blog banner

Hosting basics

Blog banner

Yahoo! mail

Blog banner

INTERNET

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Teamwork

Blog banner

Marvel Cinematic Universe

Blog banner

Introduction my self

Blog banner

Explain Multiprocessors

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Interrupts in operating system.

Blog banner