wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cross site scripting Attack

profile
02_Shaheen Ansari
Oct 20, 2021
0 Likes
0 Discussions
73 Reads

Cross site scripting attack when attacker injects the malicious code into the code of the web application or a web server .

It can happen in many ways like attacker can attack the web server through victim visits or Attackers can also attack victim through web server database .

Generally Attacker do cross site scripting attacks to steal the victim personal data or to get the access to the web server database where all the users of that website is stored. Attacker can also hijack the session it can be dangerous because with that session I'd attacker can access to the user activity without even login to the site.

To prevent from this kind of attacks , we can scan the vulnerabilities of the website, or also we can limit the use of HTML in inputs, sanitizing the data inputs or use the web application firewall and many more.

With the help of very common vectors this attack can be possible, few common vectors listed below:-

<Script>

<Img>

<iframe>

<Body>

<Link>

Through this vectors attackers can inject their code in this tag and get the desired output.

From preventing from this attacks the developer must understand the how cross site scripting works so developer's can take proper precautions to avoid this kind of attacks in future.


Comments ()


Sign in

Read Next

DIGITAL TECHNOLOGY

Blog banner

Memory heirachy (Operating system)

Blog banner

Fitness regime by Deepesh

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Wiretapping

Blog banner

Quality check in IT services

Blog banner

Fitness

Blog banner

CONCURRENCY

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Short note on Microsoft office

Blog banner

Pandas Matrix Applications

Blog banner

virtual machines and virtualization

Blog banner

Multicore and Multithreading

Blog banner

SPAM

Blog banner

Education?

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Traveling

Blog banner

100 Awesome Keyboard Shortcuts that you didn't knew

Blog banner

Types of Viruses

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Linux Memory Management

Blog banner

Cache memory

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Odoo

Blog banner

How to use open SSL for web server - browser communication

Blog banner

History of Money

Blog banner

Understanding the 'Ambiverts'

Blog banner

Starting Android Activity Using Intent

Blog banner

Outlook.com

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Theads

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Virtual Machine

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

The art of being alone

Blog banner

GIS info about Bermuda Triangle

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Modern Operating Systems

Blog banner