wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cross site scripting Attack

profile
02_Shaheen Ansari
Oct 20, 2021
0 Likes
0 Discussions
73 Reads

Cross site scripting attack when attacker injects the malicious code into the code of the web application or a web server .

It can happen in many ways like attacker can attack the web server through victim visits or Attackers can also attack victim through web server database .

Generally Attacker do cross site scripting attacks to steal the victim personal data or to get the access to the web server database where all the users of that website is stored. Attacker can also hijack the session it can be dangerous because with that session I'd attacker can access to the user activity without even login to the site.

To prevent from this kind of attacks , we can scan the vulnerabilities of the website, or also we can limit the use of HTML in inputs, sanitizing the data inputs or use the web application firewall and many more.

With the help of very common vectors this attack can be possible, few common vectors listed below:-

<Script>

<Img>

<iframe>

<Body>

<Link>

Through this vectors attackers can inject their code in this tag and get the desired output.

From preventing from this attacks the developer must understand the how cross site scripting works so developer's can take proper precautions to avoid this kind of attacks in future.


Comments ()


Sign in

Read Next

SQL Injection

Blog banner

Virtual Memory

Blog banner

File Management In OS

Blog banner

Data Structures

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

bulk email software

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

How I use google in my daily life

Blog banner

Deadlock and Starvation

Blog banner

My favourite food

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Google App Engine

Blog banner

I/O Buffering

Blog banner

Data Exfiltration

Blog banner

Virtual memory

Blog banner

Data Visualization

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Online Education

Blog banner

Steganography

Blog banner

Types of email

Blog banner

Hello World

Blog banner

Processing Crime and Incident Scenes

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Threads

Blog banner

Broken Authentication Attacks

Blog banner

Instagram

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Interrupts

Blog banner

Race Condition in Operating Theatre

Blog banner

On-Page SEO

Blog banner

Big Data Architecture

Blog banner

Goa Trip With Friends

Blog banner

Modern operating system

Blog banner

How to write a cover letter

Blog banner

Network Security Risks

Blog banner

Synchronization

Blog banner

Memory Management in Operating System

Blog banner

How To Secure Operating Systems ?

Blog banner

Security Issues and Countermeasures

Blog banner