当前位置:网站首页>XSS related knowledge points
XSS related knowledge points
2022-08-04 03:35:00 【Lord Chaser】
1. Introduction to XSS
The full name of XSS is Cross Site Scripting. In order to avoid confusion with the abbreviation of Cascading Style Sheets (CSS), it is abbreviated as XSS.It means that a malicious attacker inserts malicious Script code into a Web page, and when a user browses the page, the html code embedded in the Web will be executed, so as to achieve the purpose of maliciously attacking the user.XSS attacks are aimed at user-level attacks.
2. Reasons for XSS
The main reason for the formation of XSS vulnerabilities is that the program's control and filtering of input and output are not perfect and strict, resulting in "well-constructed" script input, which will be blocked by the browser when it is input to the front end.It is parsed and executed as valid code to cause harm.
3. Classification of XSS Vulnerabilities
1. Reflected XSS
Reflected XSS is a non-persistent, parametric cross-site scripting. This attack method is often one-time and only triggered when the user clicks.
Reflected XSS: through the back end, not through the database
Data flow: browser front end --> back end --> browser front end
2. DOM XSS
DoM is the document object model(Document Object Model) abbreviation.It is the object representation of the HTML document and is also the interface between external content (such as JavaScript) and HTML elements.
It is a vulnerability based on the DoM document object model, and DOM-type XSS is based on JS and does not require interaction with the server.It is an XSS cross-site scripting attack formed by modifying the data information of the DOM node of the page.Different from reflected XSS and stored XSS, DOM-based XSS cross-site scripting attacks often need to analyze specific Javascript DOM codes, and use XSS cross-site scripting attacks according to the actual situation.
Data flow: URL–> Browser front end
3. Stored XSS
Stored XSS is persistent cross-site scripting.Persistence is reflected in the fact that the XSS code is not in a parameter (variable), but is written into a medium such as a database or file that can permanently save data.Stored XSS usually occurs in places like message boards.
Data flow: browser –> backend –> database –> backend –> browser
Fourth, summary
Reflected XSS is non-persistent cross-site scripting.
DOM-type XSS is a vulnerability based on the DOM Document Object Model.
Stored XSS is persistent cross-site scripting.
On Harm: Stored XSS > DOM-XSS > Reflected XSS.
边栏推荐
- [Study Notes Dish Dog Learning C] Dynamic Memory Management
- 机器学习之视频学习【更新】
- 2千兆光+6千兆电导轨式网管型工业级以太网交换机支持X-Ring冗余环网一键环网交换机
- Oracle与Postgresql在PLSQL内事务回滚的重大差异
- 2022年最新海南建筑八大员(材料员)模拟考试试题及答案
- C语言--环形缓存区
- C language -- ring buffer
- 数据集类型转换—TFRecords文件
- MySQL query optimization and tuning
- Implementing a server-side message active push solution based on SSE
猜你喜欢
全网没有之一的JMeter 接口测试流程详解
Y86. Chapter iv Prometheus giant monitoring system and the actual combat, Prometheus storage (17)
一文详解DHCP原理及配置
【 observe 】 super fusion: the first mention of "calculate net nine order" evaluation model, build open prosperity of power network
拿捏JVM性能优化(自己笔记版本)
6-port full Gigabit Layer 2 network managed industrial Ethernet switch Gigabit 2 optical 4 electrical fiber self-healing ERPS ring network switch
Pine Script | How to display and typeset a plot switch?
y86.第四章 Prometheus大厂监控体系及实战 -- prometheus存储(十七)
什么是数字孪生智慧城市应用场景
new Date将字符串转化成日期格式 兼容IE,ie8如何通过new Date将字符串转化成日期格式,js中如何进行字符串替换, replace() 方法详解
随机推荐
TOML configuration file format, YAML's top contender
Basic form validation process
MySQL Query Exercise (1)
4路双向HDMI综合业务高清视频光端机8路HDMI高清视频光端机
类如何只能静态分配和只能动态分配
Introduction to the memory model of the JVM
STM8S-----option byte
如果禁用了安全启动,GNOME 就会发出警告
怎样提高网络数据安全性
docker+bridge+redis master-slave+sentry mode
new Date converts strings into date formats Compatible with IE, how ie8 converts strings into date formats through new Date, how to replace strings in js, and explain the replace() method in detail
Returns the maximum number of palindromes in a string
多线程间的通信方式你知道几种?
2022杭电多校联赛第五场 题解
Metaverse "Drummer" Unity: Crazy expansion, suspense still exists
网络工程师入门必懂华为认证体系,附系统学习路线分享
返回字符串中的最大回文数
系统太多,多账号互通如何实现?
Deep Learning (3) Classification Theory Part
C语言--环形缓存区