wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cross site scripting Attack

profile
02_Shaheen Ansari
Oct 20, 2021
0 Likes
0 Discussions
73 Reads

Cross site scripting attack when attacker injects the malicious code into the code of the web application or a web server .

It can happen in many ways like attacker can attack the web server through victim visits or Attackers can also attack victim through web server database .

Generally Attacker do cross site scripting attacks to steal the victim personal data or to get the access to the web server database where all the users of that website is stored. Attacker can also hijack the session it can be dangerous because with that session I'd attacker can access to the user activity without even login to the site.

To prevent from this kind of attacks , we can scan the vulnerabilities of the website, or also we can limit the use of HTML in inputs, sanitizing the data inputs or use the web application firewall and many more.

With the help of very common vectors this attack can be possible, few common vectors listed below:-

<Script>

<Img>

<iframe>

<Body>

<Link>

Through this vectors attackers can inject their code in this tag and get the desired output.

From preventing from this attacks the developer must understand the how cross site scripting works so developer's can take proper precautions to avoid this kind of attacks in future.


Comments ()


Sign in

Read Next

IT GOVERNANCE

Blog banner

Top 10 Logos and their meanings

Blog banner

Music helps reduce stress

Blog banner

History of ITIL

Blog banner

Deadlock and Starvation

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Platonic Solids

Blog banner

ADIDAS

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Message Passing in OS

Blog banner

File Sharing

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Security issues

Blog banner

VIRTUAL MACHINES

Blog banner

SQL Injection practice on DVWA

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Memory managment

Blog banner

File system

Blog banner

Inventory management software system

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Developments in Modern Operating Systems

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

operating system

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

RACI model in IT services

Blog banner

Threat management

Blog banner

Memory Management

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Artical on FreshBooks

Blog banner

Blockchain uses and use cases

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

What is Network Security?

Blog banner

MPL and how its effects?

Blog banner

NETWORK SECURITY RISKS

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner