当前位置:网站首页>XSS injection
XSS injection
2022-07-05 04:45:00 【Whoa, whoa, whoa, whoa, whoa】
List of articles
XSS A brief introduction
Cross-site scripting attacks (Cross Site Scripting), For not cascading style sheets (Cascading Style Sheets,CSS) Confusion of abbreviations , Therefore, the cross-site scripting attack is abbreviated as XSS. Malicious attacker to Web Malicious insert in the page Script Code , When users browse the page , Embedded in Web Inside Script Code will be executed , So as to achieve the purpose of malicious attack on users .
XSS harm :
Traffic hijacking
Get users cookie Information , Stealing account number
Tampering 、 Delete page information ( go fishing )
coordination CSRF attack , Carry out further attacks
XSS classification
reflective XSS: reflective XSS Also known as non persistence XSS, When a user accesses a with XSS Code HTML When asked , The server receives data and processes it , Then put the belt with XSS Send your data to the browser , The browser parses this section with XSS Code data after , To create XSS Loophole , This process is like a reflection , So it's called reflective XSS.
Storage type XSS: Storage type XSS Also known as persistence XSS, Storage type XSS Is one of the most dangerous cross site scripting vulnerabilities , When an attacker submits a paragraph XSS After code , Received and stored by the server , When an attacker or user visits a page again , This paragraph XSS The code is read by the program and responded to the browser , cause XSS Cross Station attack , This is a storage type XSS.
DOM type : Without going through the back end ,DOM—based XSS The vulnerability is based on the document object model Document Objeet Model,DOM) A loophole in ,dom-xss It's through url Pass in parameters to control the trigger .
Whether the test management interface exists XSS:
Enter ">( closed input label )
result , Interface pop-up , Prove that the system exists XSS Inject
From the previous verification , The page exists XSS Loophole . Next, modify the link attribute to jump to the phishing interface
stay username= Followed by "><a( Change forgotten password a Labeled href, Make it point to phishing sites )
Click forget password , Go to the phishing site
Storage type xss
cms The message board of the article management system exists xss Loophole , Now we inject by constructing code
Simulate the administrator to log in to the background of the article management system to browse and review the user's comments , Discovery triggers xss Popup , Looking at the source code, we find that the information entered by the user is embedded in html It is parsed and executed by the browser .
After the administrator approves , Anyone who browses the content of this message will also parse and execute our injected payload Of .
XSS Loophole prevention
XSS The power of depends mainly on JavaScript The extent to which it can be achieved ,XSS The reason for the formation of cross site scripts is that there is no strict filtering of input and output , Results in execution of... On the page JavaScript Wait for client code , So just filter sensitive characters , You can fix XSS Cross site loopholes .
Repair and prevention methods :
Three types of XSS Vulnerabilities can be fixed by filtering or coding .
reflective XSS And storage XSS You can filter and encode the contents of user input and output at the server , Filter keywords , Key symbols are encoded , If all on event script Wait for keywords to filter , Will all <,>,”,’,= And other special symbols url Coding can be repaired .
DOM type XSS If so, interact with the server , You can also refer to the above method for repair , If there is no interaction with the server , It can be used on the client JavaScript And other client scripting languages for coding and filtering .
边栏推荐
- 直播預告 | 容器服務 ACK 彈性預測最佳實踐
- [groovy] closure (Introduction to closure class closure | this, owner, delegate member assignment and source code analysis)
- JVM 原理和流程简介
- Raki's notes on reading paper: code and named entity recognition in stackoverflow
- flutter 对象和列表
- Is there a sudden failure on the line? How to make emergency diagnosis, troubleshooting and recovery
- Live broadcast preview | container service ack elasticity prediction best practice
- OWASP top 10 vulnerability Guide (2021)
- 2022-2028 global and Chinese FPGA prototype system Market Research Report
- About the prompt loading after appscan is opened: guilogic, it keeps loading and gets stuck. My personal solution. (it may be the first solution available in the whole network at present)
猜你喜欢
首席信息官如何利用业务分析构建业务价值?
Function (basic: parameter, return value)
About the prompt loading after appscan is opened: guilogic, it keeps loading and gets stuck. My personal solution. (it may be the first solution available in the whole network at present)
[AI bulletin 20220211] the hard core up owner has built a lidar and detailed AI accelerator
level17
2022-2028 global and Chinese equipment as a Service Market Research Report
Solution of circular dependency
【acwing】528. cheese
The remainder operation is a hash function
次小生成树
随机推荐
Function overloading
Neural networks and deep learning Chapter 2: machine learning overview reading questions
Managed service network: application architecture evolution in the cloud native Era
C26451: arithmetic overflow: use the operator * on a 4-byte value, and then convert the result to an 8-byte value. To avoid overflow, cast the value to wide type before calling the operator * (io.2)
[AI bulletin 20220211] the hard core up owner has built a lidar and detailed AI accelerator
[crampon programming] lintcode decoding Encyclopedia - 1100 strange printer
flutter 对象和列表
[groovy] closure (closure parameter binding | curry function | rcurry function | ncurry function | code example)
Chapter 6 text processing tools for shell programming (awk)
线上故障突突突?如何紧急诊断、排查与恢复
Debug insights
Rk3399 platform development series explanation (network debugging) 7.29 summary of network performance tools
Download the details and sequence of the original data access from the ENA database in EBI
Qt蓝牙:搜索蓝牙设备的类——QBluetoothDeviceDiscoveryAgent
[illusory engine UE] method to realize close-range rotation of operating objects under fuzzy background and pit recording
windows下Redis-cluster集群搭建
2021 electrician Cup - high speed rail traction power supply system operation data analysis and equivalent modeling ideas + code
JVM 原理和流程简介
CUDA Programming atomic operation atomicadd reports error err:msb3721, return code 1
官宣!第三届云原生编程挑战赛正式启动!