当前位置:网站首页>XSS injection
XSS injection
2022-07-05 04:45:00 【Whoa, whoa, whoa, whoa, whoa】
List of articles
XSS A brief introduction
Cross-site scripting attacks (Cross Site Scripting), For not cascading style sheets (Cascading Style Sheets,CSS) Confusion of abbreviations , Therefore, the cross-site scripting attack is abbreviated as XSS. Malicious attacker to Web Malicious insert in the page Script Code , When users browse the page , Embedded in Web Inside Script Code will be executed , So as to achieve the purpose of malicious attack on users .
XSS harm :
Traffic hijacking
Get users cookie Information , Stealing account number
Tampering 、 Delete page information ( go fishing )
coordination CSRF attack , Carry out further attacks
XSS classification
reflective XSS: reflective XSS Also known as non persistence XSS, When a user accesses a with XSS Code HTML When asked , The server receives data and processes it , Then put the belt with XSS Send your data to the browser , The browser parses this section with XSS Code data after , To create XSS Loophole , This process is like a reflection , So it's called reflective XSS.
Storage type XSS: Storage type XSS Also known as persistence XSS, Storage type XSS Is one of the most dangerous cross site scripting vulnerabilities , When an attacker submits a paragraph XSS After code , Received and stored by the server , When an attacker or user visits a page again , This paragraph XSS The code is read by the program and responded to the browser , cause XSS Cross Station attack , This is a storage type XSS.
DOM type : Without going through the back end ,DOM—based XSS The vulnerability is based on the document object model Document Objeet Model,DOM) A loophole in ,dom-xss It's through url Pass in parameters to control the trigger .
Whether the test management interface exists XSS:
Enter ">( closed input label )
result , Interface pop-up , Prove that the system exists XSS Inject 
From the previous verification , The page exists XSS Loophole . Next, modify the link attribute to jump to the phishing interface
stay username= Followed by "><a( Change forgotten password a Labeled href, Make it point to phishing sites )
Click forget password , Go to the phishing site
Storage type xss
cms The message board of the article management system exists xss Loophole , Now we inject by constructing code 
Simulate the administrator to log in to the background of the article management system to browse and review the user's comments , Discovery triggers xss Popup , Looking at the source code, we find that the information entered by the user is embedded in html It is parsed and executed by the browser .
After the administrator approves , Anyone who browses the content of this message will also parse and execute our injected payload Of .
XSS Loophole prevention
XSS The power of depends mainly on JavaScript The extent to which it can be achieved ,XSS The reason for the formation of cross site scripts is that there is no strict filtering of input and output , Results in execution of... On the page JavaScript Wait for client code , So just filter sensitive characters , You can fix XSS Cross site loopholes .
Repair and prevention methods :
Three types of XSS Vulnerabilities can be fixed by filtering or coding .
reflective XSS And storage XSS You can filter and encode the contents of user input and output at the server , Filter keywords , Key symbols are encoded , If all on event script Wait for keywords to filter , Will all <,>,”,’,= And other special symbols url Coding can be repaired .
DOM type XSS If so, interact with the server , You can also refer to the above method for repair , If there is no interaction with the server , It can be used on the client JavaScript And other client scripting languages for coding and filtering .
边栏推荐
- MySQL in-depth learning - index creation and deletion, index design principles, index failure scenarios, query optimization, index push down ICP
- Burpsuite grabs app packets
- [AI bulletin 20220211] the hard core up owner has built a lidar and detailed AI accelerator
- 2021 huashubei mathematical modeling idea + reference + paper
- Practice | mobile end practice
- [ideas] 2021 may day mathematical modeling competition / May Day mathematical modeling ideas + references + codes
- Decryption function calculates "task state and lifecycle management" of asynchronous task capability
- Observable time series data downsampling practice in Prometheus
- PHP reads the INI file and writes the modified content
- Neural networks and deep learning Chapter 4: feedforward neural networks reading questions
猜你喜欢

次小生成树

首席信息官如何利用业务分析构建业务价值?

介绍汉明距离及计算示例

直播預告 | 容器服務 ACK 彈性預測最佳實踐

Power management bus (pmbus)

Raki's notes on reading paper: code and named entity recognition in stackoverflow

Uncover the seven quirky brain circuits necessary for technology leaders
![[groovy] closure (closure parameter list rule | default parameter list | do not receive parameters | receive custom parameters)](/img/36/c4206a95c007e41df628d99e06ba18.jpg)
[groovy] closure (closure parameter list rule | default parameter list | do not receive parameters | receive custom parameters)

指针函数(基础)
![[groovy] closure (closure call is associated with call method | call () method is defined in interface | call () method is defined in class | code example)](/img/03/329adb314606f29c8a4cb2260e84c8.jpg)
[groovy] closure (closure call is associated with call method | call () method is defined in interface | call () method is defined in class | code example)
随机推荐
电源管理总线 (PMBus)
Neural networks and deep learning Chapter 5: convolutional neural networks reading questions
[groovy] closure (closure call | closure default parameter it | code example)
[Business Research Report] top ten trends of science and technology and it in 2022 - with download link
2022-2028 global and Chinese video coding and transcoding Market Research Report
The remainder operation is a hash function
How should programmers learn mathematics
How to force activerecord to reload a class- How do I force ActiveRecord to reload a class?
Matplotlib draws three-dimensional scatter and surface graphs
Hypothesis testing -- learning notes of Chapter 8 of probability theory and mathematical statistics
Key review route of probability theory and mathematical statistics examination
Uncover the seven quirky brain circuits necessary for technology leaders
[ideas] 2021 may day mathematical modeling competition / May Day mathematical modeling ideas + references + codes
English topic assignment (27)
Burpsuite grabs app packets
[groovy] closure (closure parameter list rule | default parameter list | do not receive parameters | receive custom parameters)
level17
OWASP top 10 vulnerability Guide (2021)
How can CIOs use business analysis to build business value?
Advanced length of redis -- deletion strategy, master-slave replication, sentinel mode