xss:xss_attacks
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
xss:xss_attacks [2016/10/10 01:03] – peter | xss:xss_attacks [2020/04/15 08:46] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== XSS - XSS Attacks ====== | ||
- | |||
- | ===== Actors in an XSS attack ===== | ||
- | |||
- | Before we describe in detail how an XSS attack works, we need to define the actors involved in an XSS attack. | ||
- | |||
- | **The website** serves HTML pages to users who request them. In our examples, it is located at http:// | ||
- | |||
- | * The website' | ||
- | |||
- | **The victim** is a normal user of the website who requests pages from it using his browser. | ||
- | |||
- | **The attacker** is a malicious user of the website who intends to launch an attack on the victim by exploiting an XSS vulnerability in the website. | ||
- | |||
- | * The attacker' | ||
- | |||
- | |||
- | ===== An example attack scenario ===== | ||
- | |||
- | In this example, we will assume that the attacker' | ||
- | |||
- | <code html> | ||
- | < | ||
- | window.location=' | ||
- | </ | ||
- | </ | ||
- | |||
- | This script navigates the user's browser to a different URL, triggering an HTTP request to the attacker' | ||
- | |||
- | From now on, the HTML code above will be referred to as the malicious string or the malicious script. | ||
- | |||
- | How the example attack works | ||
- | |||
- | The diagram below illustrates how this example attack can be performed by an attacker: | ||
- | |||
- | {{: | ||
- | |||
- | 1. The attacker uses one of the website' | ||
- | |||
- | 2. The victim requests a page from the website. | ||
- | |||
- | 3. The website includes the malicious string from the database in the response and sends it to the victim. | ||
- | |||
- | 4. The victim' | ||
- | |||
- | |||
xss/xss_attacks.1476061408.txt.gz · Last modified: 2020/07/15 09:30 (external edit)