wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cross site scripting Attack

profile
02_Shaheen Ansari
Oct 20, 2021
0 Likes
0 Discussions
73 Reads

Cross site scripting attack when attacker injects the malicious code into the code of the web application or a web server .

It can happen in many ways like attacker can attack the web server through victim visits or Attackers can also attack victim through web server database .

Generally Attacker do cross site scripting attacks to steal the victim personal data or to get the access to the web server database where all the users of that website is stored. Attacker can also hijack the session it can be dangerous because with that session I'd attacker can access to the user activity without even login to the site.

To prevent from this kind of attacks , we can scan the vulnerabilities of the website, or also we can limit the use of HTML in inputs, sanitizing the data inputs or use the web application firewall and many more.

With the help of very common vectors this attack can be possible, few common vectors listed below:-

<Script>

<Img>

<iframe>

<Body>

<Link>

Through this vectors attackers can inject their code in this tag and get the desired output.

From preventing from this attacks the developer must understand the how cross site scripting works so developer's can take proper precautions to avoid this kind of attacks in future.


Comments ()


Sign in

Read Next

Cyber Forensics on IOT Devices

Blog banner

The Features of Blockchain

Blog banner

Socket Programming in Java

Blog banner

Importance of self defence for girls

Blog banner

Quality check in IT services

Blog banner

Difference Between Classification And Clustering

Blog banner

Crypto tax evasion

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

My First Dream Bike

Blog banner

A Short History of GIS

Blog banner

Different types of scam frauds

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Kernel in Operating System

Blog banner

Compromising Mobile Platforms

Blog banner

Evolution of operating systems

Blog banner

Random Forests

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Direct memory access

Blog banner

Sage business cloud accounting

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Telegram and it's features

Blog banner

Memory management

Blog banner

Security Issues

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Women Empowerment

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Senseless Teeths

Blog banner

Explain Multiprocessors

Blog banner

I/O Management and Disk Scheduling

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

EdTech (Education Technology)

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

undefined

Blog banner

Travelling blog

Blog banner

Segmentation and paging concept

Blog banner

Blockchain uses and use cases

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Tableau

Blog banner

Constrains in service design

Blog banner

Cloud Security: Trends and Innovations

Blog banner

USPS mail

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner