wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cross site scripting Attack

profile
02_Shaheen Ansari
Oct 20, 2021
0 Likes
0 Discussions
73 Reads

Cross site scripting attack when attacker injects the malicious code into the code of the web application or a web server .

It can happen in many ways like attacker can attack the web server through victim visits or Attackers can also attack victim through web server database .

Generally Attacker do cross site scripting attacks to steal the victim personal data or to get the access to the web server database where all the users of that website is stored. Attacker can also hijack the session it can be dangerous because with that session I'd attacker can access to the user activity without even login to the site.

To prevent from this kind of attacks , we can scan the vulnerabilities of the website, or also we can limit the use of HTML in inputs, sanitizing the data inputs or use the web application firewall and many more.

With the help of very common vectors this attack can be possible, few common vectors listed below:-

<Script>

<Img>

<iframe>

<Body>

<Link>

Through this vectors attackers can inject their code in this tag and get the desired output.

From preventing from this attacks the developer must understand the how cross site scripting works so developer's can take proper precautions to avoid this kind of attacks in future.


Comments ()


Sign in

Read Next

Modern operating system

Blog banner

Traveling

Blog banner

OS Assignment-3

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Cyber Security in Data Breaching

Blog banner

WomenEmpowerment

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Policies for Service Transition

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Instagram

Blog banner

PHONE TECHNOLOGY

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

EMAIL INVESTIGATION

Blog banner

12 Principles of Animation

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

Google classroom

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Technical SEO : Total Guide

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

The most common internet security threats

Blog banner

Microsoft Word

Blog banner

IOT- Internet Of Things

Blog banner

Information Technology In E- Commerce

Blog banner

Hacking of web server and application

Blog banner

Software

Blog banner

IT RISK

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

RAID

Blog banner

Telegram and it's features

Blog banner

URL vs Domain

Blog banner

Outlook mail

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

LTE Technology

Blog banner

FRIENDSHIP

Blog banner

undefined

Blog banner

Random Forests

Blog banner