当前位置:网站首页>XSS essential knowledge
XSS essential knowledge
2022-07-23 07:05:00 【Chang Jiazhuang】
xss What is it? ?
The following is from the Internet :
XSS Full name (Cross Site Scripting) Cross-site scripting attacks ,XSS It belongs to client attack , The victim is the end user , But it should be noted that website administrators are also one of the users , That means XSS Can be done “ Server side ” attack , Because administrators have much more permissions than ordinary users , General administrators can manage files on the website , Data management and other operations , The attacker usually acts as an administrator “ The springboard ” Carry out an attack
XSS The ultimate goal of the attack is to embed the malicious script code of the client in the web page , The most common attack code is javascript Language , But other scripting languages are also used
xss Causes of the vulnerability ?
The failure to filter the user's controllable input and the failure to properly handle the output content led to the front end or the output point being directly considered as valid code and executed
xss What vulnerabilities can do ?
Common are :
- Hijack the user cookie
- Framework for fishing
- Keyboard record
- Website hang horse
some xss The platform or tool also has other functions, such as screen monitoring 、 Read file contents 、 Send error upgrade prompt, etc
What is cross domain ?
As the agreements 、 host ( The main domain name , subdomain )、 Any one of the ports is not the same , It's called different domains , The operation of requesting data between different domains , Become a cross domain operation
xss The classification of :
reflective : Interactive data will not be stored in the database , Just simply reflect the user's input data to the browser , Just one time Storage type : Interactive data will be stored in the database , Permanent storage , It has strong stability DOM type : No data interaction with background server , Through the front end dom Nodes form XSS Loophole
边栏推荐
- 记事本文件太大打不开怎么办?TXT文件太大无法打开现象的解决办法介绍
- 12306史上最奇葩验证码:正常用户可轻松识别 抢票软件被拒之门外
- 《STL容器篇》-string模拟实现
- 第五章 传播训练
- Common operators
- Alibaba cloud cloud box and exclusive region passed the comprehensive capability assessment of trusted cloud and proprietary cloud for the first batch of full marks
- 电脑桌面卡住了怎么办?电脑死机桌面卡死现象的解决办法介绍
- Combing the docking process between the integration base and the business system
- Gom引擎Key.lic配套的X-FKGOM授权启动
- 电商项目如何解决线上优惠券超发(排错+解决方案)(荣耀典藏)
猜你喜欢

At the forefront of the times, Huawei aims at the wind and sea of digital finance

CV target detection model sketch (1)

GB28181流媒体服务LiveGBS使用和二次开发中常见问题总结

Uric acid detection and precautions

Pay attention to the pitfalls of using enumeration in MySQL!

【MATLAB项目实战】基于SPI指数的某地区地区干旱时空特征分析

Data warehouse: Exploration and practice of integrating flow and batch

Apifox learning record

BGP Confederacy experiment

In the name of "upgrade", talk about the core technology of cloud native data warehouse analyticdb
随机推荐
What problems do let and const solve and the differences between them
Realize the national standard gb28181 streaming media service solution
ipv4无internet访问权限怎么办?ipv4无internet访问权限解决方法(图文详解)
Why does TCP establish a connection protocol with three handshakes, but close the connection with four handshakes?
炒股网上开户转账提示未激活存管及转账服务的解决方法(招商银行)
Apifox learning record
Demo19- (to be updated)
Gom引擎Key.lic配套的X-FKGOM授权启动
100 行代码透彻解析 RPC 原理
Installation and login installation
无法删除文件提示找不到指定文件导致文件无法删除的解决方法
Combing the docking process between the integration base and the business system
电脑桌面卡住了怎么办?电脑死机桌面卡死现象的解决办法介绍
Flink数据源拆解分析(WikipediaEditsSource)
XSS必备知识
mysql约束之_外键约束 foreign key
第八章 使用时序数据
Stability control and Simulation of double inverted pendulum system (matlab/simulink)
科学计算与仿真-高斯牛顿法的非线性最小二乘问题简单介绍与应用
《STL适配器》stack和queue