wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cross site scripting Attack

profile
02_Shaheen Ansari
Oct 20, 2021
0 Likes
0 Discussions
73 Reads

Cross site scripting attack when attacker injects the malicious code into the code of the web application or a web server .

It can happen in many ways like attacker can attack the web server through victim visits or Attackers can also attack victim through web server database .

Generally Attacker do cross site scripting attacks to steal the victim personal data or to get the access to the web server database where all the users of that website is stored. Attacker can also hijack the session it can be dangerous because with that session I'd attacker can access to the user activity without even login to the site.

To prevent from this kind of attacks , we can scan the vulnerabilities of the website, or also we can limit the use of HTML in inputs, sanitizing the data inputs or use the web application firewall and many more.

With the help of very common vectors this attack can be possible, few common vectors listed below:-

<Script>

<Img>

<iframe>

<Body>

<Link>

Through this vectors attackers can inject their code in this tag and get the desired output.

From preventing from this attacks the developer must understand the how cross site scripting works so developer's can take proper precautions to avoid this kind of attacks in future.


Comments ()


Sign in

Read Next

Microsoft Windows Overview

Blog banner

Evolution of Operating Sytems

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Virtual machine and virtualizing

Blog banner

Data is an asset and it is your responsibility!

Blog banner

DBMS and various career options related to it.

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

How Does SSO Works

Blog banner

clock

Blog banner

Os assignment

Blog banner

Broken Authentication Attacks

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Session Vulnerabilities

Blog banner

EdTech (Education Technology)

Blog banner

Different memory allocation strategies

Blog banner

Linux 94

Blog banner

MailChimp

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Life of an army person

Blog banner

Hello World

Blog banner

Mumbai Metro 3

Blog banner

Music is life

Blog banner

Virtual Machine

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

The Peephole

Blog banner

Digital Forensics Challenges and Tools

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Paginng In OS

Blog banner

Elegant fashion style

Blog banner

Memory Management

Blog banner

Critical success factors

Blog banner

Uniprocessor scheduling

Blog banner

Logical and physical address

Blog banner

The seven-step improvement process

Blog banner

Child labour

Blog banner

How to make Pancakes

Blog banner

Uniprocessor and Types

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Virtual Machine

Blog banner