wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cross site scripting Attack

profile
02_Shaheen Ansari
Oct 20, 2021
0 Likes
0 Discussions
73 Reads

Cross site scripting attack when attacker injects the malicious code into the code of the web application or a web server .

It can happen in many ways like attacker can attack the web server through victim visits or Attackers can also attack victim through web server database .

Generally Attacker do cross site scripting attacks to steal the victim personal data or to get the access to the web server database where all the users of that website is stored. Attacker can also hijack the session it can be dangerous because with that session I'd attacker can access to the user activity without even login to the site.

To prevent from this kind of attacks , we can scan the vulnerabilities of the website, or also we can limit the use of HTML in inputs, sanitizing the data inputs or use the web application firewall and many more.

With the help of very common vectors this attack can be possible, few common vectors listed below:-

<Script>

<Img>

<iframe>

<Body>

<Link>

Through this vectors attackers can inject their code in this tag and get the desired output.

From preventing from this attacks the developer must understand the how cross site scripting works so developer's can take proper precautions to avoid this kind of attacks in future.


Comments ()


Sign in

Read Next

TAILS OS

Blog banner

Never give up

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

I/O Buffering

Blog banner

Constrained Management in IT

Blog banner

Health and fitness

Blog banner

OS Assignment 3

Blog banner

Interrupts in OS

Blog banner

Google

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Lucidchart

Blog banner

Social Media.

Blog banner

A Heartfelt Act of Kindness

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Strengthening Active Directory Security

Blog banner

DIGITAL TECHNOLOGY

Blog banner

What is metaverse?

Blog banner

Microsoft Windows Overview

Blog banner

virtual machines and virtualization

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Jio .....A Revolution ?? ??

Blog banner

File management

Blog banner

Operating System Objectives and Functions

Blog banner

THE DESIRE OF MANY

Blog banner

Kernel in Operating System

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Cyber Laws In India and Around the World

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Deadlock in operating system

Blog banner

The Right way of cooking

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Modern Operating System

Blog banner

AI and cyber Security

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

Traveling

Blog banner

Smitten Kitchen Keepers

Blog banner

Virtual Machine

Blog banner

Understanding E-mail Servers

Blog banner

Guidelines for a Low sodium Diet.

Blog banner