当前位置:网站首页>XSS injection
XSS injection
2022-07-05 04:45:00 【Whoa, whoa, whoa, whoa, whoa】
List of articles
XSS A brief introduction
Cross-site scripting attacks (Cross Site Scripting), For not cascading style sheets (Cascading Style Sheets,CSS) Confusion of abbreviations , Therefore, the cross-site scripting attack is abbreviated as XSS. Malicious attacker to Web Malicious insert in the page Script Code , When users browse the page , Embedded in Web Inside Script Code will be executed , So as to achieve the purpose of malicious attack on users .
XSS harm :
Traffic hijacking
Get users cookie Information , Stealing account number
Tampering 、 Delete page information ( go fishing )
coordination CSRF attack , Carry out further attacks
XSS classification
reflective XSS: reflective XSS Also known as non persistence XSS, When a user accesses a with XSS Code HTML When asked , The server receives data and processes it , Then put the belt with XSS Send your data to the browser , The browser parses this section with XSS Code data after , To create XSS Loophole , This process is like a reflection , So it's called reflective XSS.
Storage type XSS: Storage type XSS Also known as persistence XSS, Storage type XSS Is one of the most dangerous cross site scripting vulnerabilities , When an attacker submits a paragraph XSS After code , Received and stored by the server , When an attacker or user visits a page again , This paragraph XSS The code is read by the program and responded to the browser , cause XSS Cross Station attack , This is a storage type XSS.
DOM type : Without going through the back end ,DOM—based XSS The vulnerability is based on the document object model Document Objeet Model,DOM) A loophole in ,dom-xss It's through url Pass in parameters to control the trigger .
Whether the test management interface exists XSS:
Enter ">( closed input label )
result , Interface pop-up , Prove that the system exists XSS Inject
From the previous verification , The page exists XSS Loophole . Next, modify the link attribute to jump to the phishing interface
stay username= Followed by "><a( Change forgotten password a Labeled href, Make it point to phishing sites )
Click forget password , Go to the phishing site
Storage type xss
cms The message board of the article management system exists xss Loophole , Now we inject by constructing code
Simulate the administrator to log in to the background of the article management system to browse and review the user's comments , Discovery triggers xss Popup , Looking at the source code, we find that the information entered by the user is embedded in html It is parsed and executed by the browser .
After the administrator approves , Anyone who browses the content of this message will also parse and execute our injected payload Of .
XSS Loophole prevention
XSS The power of depends mainly on JavaScript The extent to which it can be achieved ,XSS The reason for the formation of cross site scripts is that there is no strict filtering of input and output , Results in execution of... On the page JavaScript Wait for client code , So just filter sensitive characters , You can fix XSS Cross site loopholes .
Repair and prevention methods :
Three types of XSS Vulnerabilities can be fixed by filtering or coding .
reflective XSS And storage XSS You can filter and encode the contents of user input and output at the server , Filter keywords , Key symbols are encoded , If all on event script Wait for keywords to filter , Will all <,>,”,’,= And other special symbols url Coding can be repaired .
DOM type XSS If so, interact with the server , You can also refer to the above method for repair , If there is no interaction with the server , It can be used on the client JavaScript And other client scripting languages for coding and filtering .
边栏推荐
- [PCL self study: feature9] global aligned spatial distribution (GASD) descriptor (continuously updated)
- 可观测|时序数据降采样在Prometheus实践复盘
- Neural networks and deep learning Chapter 5: convolutional neural networks reading questions
- Scope of package class package
- Variable category (automatic, static, register, external)
- Neural networks and deep learning Chapter 2: machine learning overview reading questions
- Discussion on the dimension of confrontation subspace
- Solution of circular dependency
- Solutions and answers for the 2021 Shenzhen cup
- 函数(易错)
猜你喜欢
Minor spanning tree
Qt蓝牙:搜索蓝牙设备的类——QBluetoothDeviceDiscoveryAgent
[AI bulletin 20220211] the hard core up owner has built a lidar and detailed AI accelerator
Special information | real estate and office buildings - 22.1.9
JVM 原理和流程简介
Raki's notes on reading paper: soft gazetteers for low resource named entity recognition
Looking at Chinese science and technology from the Winter Olympics: what is the mystery of the high-speed camera that the whole people thank?
MySQL in-depth learning - index creation and deletion, index design principles, index failure scenarios, query optimization, index push down ICP
【acwing】240. food chain
指针函数(基础)
随机推荐
【acwing】836. Merge sets
Data security -- 14 -- Analysis of privacy protection governance
Function overloading
[ideas] 2021 may day mathematical modeling competition / May Day mathematical modeling ideas + references + codes
MySQL in-depth learning - index creation and deletion, index design principles, index failure scenarios, query optimization, index push down ICP
Decimal to hexadecimal
Function template
[groovy] closure (closure parameter list rule | default parameter list | do not receive parameters | receive custom parameters)
Special information | finance, accounting, audit - 22.1.23
CUDA Programming atomic operation atomicadd reports error err:msb3721, return code 1
Advanced length of redis -- deletion strategy, master-slave replication, sentinel mode
JMeter -- distributed pressure measurement
Error statuslogger log4j2 could not find a logging implementation
[popular science] basic knowledge of thermal design: heat dissipation analysis of 5g optical devices
函數(易錯)
揭秘技术 Leader 必备的七大清奇脑回路
Cookie learning diary 1
Setting up redis cluster cluster under Windows
You Li takes you to talk about C language 7 (define constants and macros)
直播预告 | 容器服务 ACK 弹性预测最佳实践