当前位置:网站首页>XSS injection
XSS injection
2022-07-05 04:45:00 【Whoa, whoa, whoa, whoa, whoa】
List of articles
XSS A brief introduction
Cross-site scripting attacks (Cross Site Scripting), For not cascading style sheets (Cascading Style Sheets,CSS) Confusion of abbreviations , Therefore, the cross-site scripting attack is abbreviated as XSS. Malicious attacker to Web Malicious insert in the page Script Code , When users browse the page , Embedded in Web Inside Script Code will be executed , So as to achieve the purpose of malicious attack on users .
XSS harm :
Traffic hijacking
Get users cookie Information , Stealing account number
Tampering 、 Delete page information ( go fishing )
coordination CSRF attack , Carry out further attacks
XSS classification
reflective XSS: reflective XSS Also known as non persistence XSS, When a user accesses a with XSS Code HTML When asked , The server receives data and processes it , Then put the belt with XSS Send your data to the browser , The browser parses this section with XSS Code data after , To create XSS Loophole , This process is like a reflection , So it's called reflective XSS.
Storage type XSS: Storage type XSS Also known as persistence XSS, Storage type XSS Is one of the most dangerous cross site scripting vulnerabilities , When an attacker submits a paragraph XSS After code , Received and stored by the server , When an attacker or user visits a page again , This paragraph XSS The code is read by the program and responded to the browser , cause XSS Cross Station attack , This is a storage type XSS.
DOM type : Without going through the back end ,DOM—based XSS The vulnerability is based on the document object model Document Objeet Model,DOM) A loophole in ,dom-xss It's through url Pass in parameters to control the trigger .
Whether the test management interface exists XSS:
Enter ">( closed input label )
result , Interface pop-up , Prove that the system exists XSS Inject 
From the previous verification , The page exists XSS Loophole . Next, modify the link attribute to jump to the phishing interface
stay username= Followed by "><a( Change forgotten password a Labeled href, Make it point to phishing sites )
Click forget password , Go to the phishing site
Storage type xss
cms The message board of the article management system exists xss Loophole , Now we inject by constructing code 
Simulate the administrator to log in to the background of the article management system to browse and review the user's comments , Discovery triggers xss Popup , Looking at the source code, we find that the information entered by the user is embedded in html It is parsed and executed by the browser .
After the administrator approves , Anyone who browses the content of this message will also parse and execute our injected payload Of .
XSS Loophole prevention
XSS The power of depends mainly on JavaScript The extent to which it can be achieved ,XSS The reason for the formation of cross site scripts is that there is no strict filtering of input and output , Results in execution of... On the page JavaScript Wait for client code , So just filter sensitive characters , You can fix XSS Cross site loopholes .
Repair and prevention methods :
Three types of XSS Vulnerabilities can be fixed by filtering or coding .
reflective XSS And storage XSS You can filter and encode the contents of user input and output at the server , Filter keywords , Key symbols are encoded , If all on event script Wait for keywords to filter , Will all <,>,”,’,= And other special symbols url Coding can be repaired .
DOM type XSS If so, interact with the server , You can also refer to the above method for repair , If there is no interaction with the server , It can be used on the client JavaScript And other client scripting languages for coding and filtering .
边栏推荐
- 2021 higher education social cup mathematical modeling national tournament ABCD questions - problem solving ideas - Mathematical Modeling
- [Business Research Report] Research Report on male consumption trends in other economic times -- with download link
- What are the building energy-saving software
- Solution of circular dependency
- [groovy] closure (closure parameter list rule | default parameter list | do not receive parameters | receive custom parameters)
- 指针函数(基础)
- 自动语音识别(ASR)研究综述
- [crampon programming] lintcode decoding Encyclopedia - 872 termination process
- Looking at Chinese science and technology from the Winter Olympics: what is the mystery of the high-speed camera that the whole people thank?
- How to carry out "small step reconstruction"?
猜你喜欢

【acwing】836. Merge sets

Decryption function calculates "task state and lifecycle management" of asynchronous task capability

直播預告 | 容器服務 ACK 彈性預測最佳實踐

Key review route of probability theory and mathematical statistics examination

Manually implement heap sorting -838 Heap sort

假设检验——《概率论与数理统计》第八章学习笔记

QT Bluetooth: a class for searching Bluetooth devices -- qbluetooth devicediscoveryagent

Special information | real estate and office buildings - 22.1.9

49 pictures and 26 questions explain in detail what is WiFi?

2022-2028 global and Chinese equipment as a Service Market Research Report
随机推荐
Flutter tips: various fancy nesting of listview and pageview
Rk3399 platform development series explanation (network debugging) 7.29 summary of network performance tools
[Chongqing Guangdong education] National Open University 2047t commercial bank operation and management reference test in autumn 2018
Decimal to hexadecimal
函数(易错)
Flink集群配置
windows下Redis-cluster集群搭建
Advanced length of redis -- deletion strategy, master-slave replication, sentinel mode
How can CIOs use business analysis to build business value?
Web开发人员应该养成的10个编程习惯
托管式服务网络:云原生时代的应用体系架构进化
The difference between bundle, chunk and module
Observable time series data downsampling practice in Prometheus
Invalid bound statement (not found) in idea -- problem solving
解密函数计算异步任务能力之「任务的状态及生命周期管理」
Wan broadband access technology V EPON Technology
Aperçu en direct | Services de conteneurs ACK flexible Prediction Best Practices
Special information | real estate and office buildings - 22.1.9
WeNet:面向工业落地的E2E语音识别工具
jmeter -- 分布式压测