XSS And XSRF Flashcards
(6 cards)
XXS
Cross-Site Scripting - injects malicious script into a trusted site to compromise the site’s visitors
-powerful attack to circumvent the browser’s security model and trusted zone or a site
-Relies on site not performing input validating
4 Steps of XXS Attack
- Attacker identifies input validation vulnerability within a trusted site
- Attacker crafts a URL to perform code injection against trusted site and gets someone to click on it
- Trusted site returns page containing the malicious code injection
- Malicious code runs in the client browsers with same permission level as the trusted site
Reflected/Non-Persistent XXS
Type of attack only occurs once when it’s launched
Persistent XXS
Allows an attacker to insert code to the backend database used by the trusted website.
- Attacker doesn’t have to wait for a user to click on URl anymore, malicious code now embedded in the website’s database
-any time a user loads page/ data from the website’s database? They’ll be loading the malicious code as well
What type of scripting is XXS (Persistent and Non-Persistent)
Server-side scripting
Session hijacking
Type of spoofing attack where the attacker attempts to predict the session token in order to hijack the session
Protect from this attack by:
Generate session tokens by using non-predictable algorithm
- session tokens should not reveal any information about the session client
- Should be a one-time use ticket for a give. Duration