SlideShare a Scribd company logo
Presented by: Nabin Dutta
3rd Year , IT
Class Roll: 44
Mentor:
Mrs. Suparna Seal
Sl. No Topic
1 What is XSS?
2 Diagram of Typical XSS attack
3 XSS attack used for:
4 Types of XSS
5 Reflected XSS
6 Attack Scenario of Reflected XSS
7 Stored XSS
8 Attack Scenario of Stored XSS
9 DOM-Based XSS
10 Attack Scenario of DOM Based XSS
11 Steps to an XSS attack
12 Protection
13 Conclusion
 Cross-site scripting or XSS is defined as a computer
security vulnerability (weakness) found in web
applications.
 It allows a variety of code to be injected by a
malicious user into a webpage
 The code is written in JavaScript, VBScript, ActiveX,
HTML, or Flash
 It can cause Installation of Trojan horse programs
 the CSS attack involves three parties – the attacker,
a client and the web site.
 During an attack “everything looks fine” to the end
user, but in actuality they are subject to an endless
amount of threats
Cross Site Scripting(XSS)
 Hijacking Accounts(stealing their private
information)
 False Advertising & inserting hostile content
 Cookie theft(stealing other user’s cookies)
/poisoning & defacing websites
 Changing of users settings
 Conducting phishing attacks
 performing actions on behalf of other users
 Spying on user’s web browsing habits.
1. Non-Persistent (Reflected)
2. Persistent (Stored )
3. DOM-Based (Local)
 Most common type
 An attacker convinces a user to follow a
malicious URL which injects code into the
resulting page
 Now the attacker has full access to that pages
content
Cross Site Scripting(XSS)
 The user comes in contact with a malicious link, form,
or a malicious redirection.
 The Web application is requested prepared the call by
the Bank.
 The XSS-code is an XSS vulnerability of the banking
application, inserted into the page.
 The infected page with XSS code is sent to the user.
 The XSS-code context of the page arrived at the user
and thus bypassing the "Same Origin" security setting
of the Web browser.
 XSS-code sends stolen data to the server of the
attacker.
 JavaScript supplied by the attacker is stored by
the website (e.g. in a database)
 Doesn’t require the victim to supply the
JavaScript somehow, just visit the exploited
web page
 More dangerous than Reflected XSS
Cross Site Scripting(XSS)
 The Web application of the bank is called with the
XSS code.
 The malicious code enters into an XSS
vulnerability in the application and is stored there.
 A user calls the Web application of the Bank.
 The malicious code is installed from the memory
to the website.
 The infected Web page is sent to the user.
 The XSS code context of the page arrived at the
user, and thus bypassing the "Same Origin"
security setting of the Web browser.
 The XSS code sends stolen data to the server of the
attacker.
 Occur in the content processing stages
performed by the client
 DOM-Based (Local)
 Document Object Model
 Standard object model for representing html or xhtml
 Problem exists within the page’s client side script
 If an attacker hosts a malicious site, which contains
a vulnerable website on a clients local system, a
script can be injected
 Now the attacker can run the privileges of that
users browser on their system.
Cross Site Scripting(XSS)
 The Web application is requested by the Bank
prepared the call.
 The XSS-code inserted in the cookie.
 The cookie with the malicious code is sent to the
user and stored with him.
 The user calls the Web application of the Bank.
 The malicious code is installed from the cookie in
the Web page.
 The infected Web page is sent to the user.
 The XSS code sends stolen data to the server of the
attacker.
 Select a target
 Find an XSS hole, and look if it has any cookies
 If it has a cookie, then you have found a target
 Testing
 Insert code or script pointing to the vulnerability
 Make sure the page does not appear broken
 XSS Execution
 Send your crafted URL to launch it
 More experienced attackers would do a few redirects to steal
cookies, return to site, then attack them harder
 Decide what to do with the data
 After collecting data, it is possible to perform an attack
• The simplest form of XSS protection is to pass all
external data through a filter (in server-side).
• It is recommended to use libraries that has been
tried and tested by the community.
• XSS techniques keep changing (your filters will
need to be updated periodically).
 XSS is defined as the number one and utmost
prevalent website vulnerability on the internet
 No one is ever completely safe from XSS
 Can not be expected to write flawless code or have
round the clock personnel to answer all possible
vulnerability issues
 As XSS vulnerabilities continue to grow, the
best way to protect yourself from it is to be
careful and be aware of its existence

More Related Content

What's hot (20)

PDF
The Cross Site Scripting Guide
Daisuke_Dan
 
PPTX
Cross Site Scripting Defense Presentation
Ikhade Maro Igbape
 
PPTX
Reflective and Stored XSS- Cross Site Scripting
InMobi Technology
 
PPTX
Cross Site Scripting (XSS)
Barrel Software
 
PPT
Cross site scripting (xss)
Manish Kumar
 
PPT
Cross Site Request Forgery
Tony Bibbs
 
PPTX
Website hacking and prevention (All Tools,Topics & Technique )
Jay Nagar
 
PPTX
Cross site scripting
kinish kumar
 
PPTX
Sql injection - security testing
Napendra Singh
 
KEY
Cross Site Scripting - Mozilla Security Learning Center
Michael Coates
 
PPTX
Xss attack
Manjushree Mashal
 
PPTX
Cross Site Scripting: Prevention and Detection(XSS)
Aman Singh
 
PPT
Introduction to Web Application Penetration Testing
Anurag Srivastava
 
PPTX
Types of attacks in cyber security
Bansari Shah
 
PPTX
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
Adam Nurudini
 
PPTX
Understanding Cross-site Request Forgery
Daniel Miessler
 
PPTX
XSS- an application security vulnerability
Soumyasanto Sen
 
PPTX
Deep understanding on Cross-Site Scripting and SQL Injection
Vishal Kumar
 
The Cross Site Scripting Guide
Daisuke_Dan
 
Cross Site Scripting Defense Presentation
Ikhade Maro Igbape
 
Reflective and Stored XSS- Cross Site Scripting
InMobi Technology
 
Cross Site Scripting (XSS)
Barrel Software
 
Cross site scripting (xss)
Manish Kumar
 
Cross Site Request Forgery
Tony Bibbs
 
Website hacking and prevention (All Tools,Topics & Technique )
Jay Nagar
 
Cross site scripting
kinish kumar
 
Sql injection - security testing
Napendra Singh
 
Cross Site Scripting - Mozilla Security Learning Center
Michael Coates
 
Xss attack
Manjushree Mashal
 
Cross Site Scripting: Prevention and Detection(XSS)
Aman Singh
 
Introduction to Web Application Penetration Testing
Anurag Srivastava
 
Types of attacks in cyber security
Bansari Shah
 
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
Adam Nurudini
 
Understanding Cross-site Request Forgery
Daniel Miessler
 
XSS- an application security vulnerability
Soumyasanto Sen
 
Deep understanding on Cross-Site Scripting and SQL Injection
Vishal Kumar
 

Viewers also liked (13)

PPTX
Cross site scripting (xss)
Ritesh Gupta
 
PPTX
Cross Site Scripting (XSS)
OWASP Khartoum
 
PPTX
Cross site scripting
ashutosh rai
 
PDF
XSS Injection Vulnerabilities
Mindfire Solutions
 
PPTX
Cross Site Scripting - Web Defacement Techniques
Ronan Dunne, CEH, SSCP
 
PPTX
Owasp Top 10 A3: Cross Site Scripting (XSS)
Michael Hendrickx
 
PDF
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Ivan Ortega
 
PPTX
What is xss, blind xss and xploiting google gadgets
Ziv Ginsberg
 
PPTX
Cross site scripting XSS
Ronan Dunne, CEH, SSCP
 
PPT
Web Application Security
Abdul Wahid
 
PPTX
Cross site scripting
Abdul Hajee
 
Cross site scripting (xss)
Ritesh Gupta
 
Cross Site Scripting (XSS)
OWASP Khartoum
 
Cross site scripting
ashutosh rai
 
XSS Injection Vulnerabilities
Mindfire Solutions
 
Cross Site Scripting - Web Defacement Techniques
Ronan Dunne, CEH, SSCP
 
Owasp Top 10 A3: Cross Site Scripting (XSS)
Michael Hendrickx
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Ivan Ortega
 
What is xss, blind xss and xploiting google gadgets
Ziv Ginsberg
 
Cross site scripting XSS
Ronan Dunne, CEH, SSCP
 
Web Application Security
Abdul Wahid
 
Cross site scripting
Abdul Hajee
 
Ad

Similar to Cross Site Scripting(XSS) (20)

PDF
XSS.pdf
Okan YILDIZ
 
PDF
XSS.pdf
Okan YILDIZ
 
PPTX
Cm7 secure code_training_1day_xss
dcervigni
 
PPT
Seguridad Web by Jordan Diaz
Jordan Diaz
 
PPT
Web Aplication Vulnerabilities
Jbyte
 
PPTX
XSeyeyeyeyeyeyeyeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeS.pptx
VikasTuwar1
 
PDF
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
Sam Bowne
 
PPT
CROSS SITE SCRIPTING.ppt
yashvirsingh48
 
PDF
xss-100908063522-phpapp02.pdf
yashvirsingh48
 
PDF
Introduction to Cross Site Scripting ( XSS )
Irfad Imtiaz
 
PPTX
STORED XSS IN DVWA
Rutvik patel
 
PPTX
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities.pptx
Gitam Gadtaula
 
PPTX
Web Hacking Series Part 4
Aditya Kamat
 
PDF
Xss 101 by-sai-shanthan
Raghunath G
 
PDF
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...
IRJET Journal
 
PDF
Session7-XSS & CSRF
zakieh alizadeh
 
PPT
Xss ppt
chanakyac1
 
PDF
Web Vulnerabilities And Exploitation - Compromising The Web
Zero Science Lab
 
DOCX
logout.php Session Data after Logout Username Email . $_.docx
smile790243
 
XSS.pdf
Okan YILDIZ
 
XSS.pdf
Okan YILDIZ
 
Cm7 secure code_training_1day_xss
dcervigni
 
Seguridad Web by Jordan Diaz
Jordan Diaz
 
Web Aplication Vulnerabilities
Jbyte
 
XSeyeyeyeyeyeyeyeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeS.pptx
VikasTuwar1
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
Sam Bowne
 
CROSS SITE SCRIPTING.ppt
yashvirsingh48
 
xss-100908063522-phpapp02.pdf
yashvirsingh48
 
Introduction to Cross Site Scripting ( XSS )
Irfad Imtiaz
 
STORED XSS IN DVWA
Rutvik patel
 
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities.pptx
Gitam Gadtaula
 
Web Hacking Series Part 4
Aditya Kamat
 
Xss 101 by-sai-shanthan
Raghunath G
 
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...
IRJET Journal
 
Session7-XSS & CSRF
zakieh alizadeh
 
Xss ppt
chanakyac1
 
Web Vulnerabilities And Exploitation - Compromising The Web
Zero Science Lab
 
logout.php Session Data after Logout Username Email . $_.docx
smile790243
 
Ad

Recently uploaded (20)

PPTX
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
PPTX
Template Timeplan & Roadmap Product.pptx
ImeldaYulistya
 
PPTX
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
PPT
introduction to networking with basics coverage
RamananMuthukrishnan
 
PDF
Digital Security in 2025 with Adut Angelina
The ClarityDesk
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PPTX
英国学位证(RCM毕业证书)皇家音乐学院毕业证书如何办理
Taqyea
 
PDF
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
PPTX
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
PDF
Technical Guide to Build a Successful Shopify Marketplace from Scratch.pdf
CartCoders
 
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
PPTX
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PDF
DevOps Design for different deployment options
henrymails
 
PPTX
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 
PDF
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
PPTX
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
PPTX
ZARA-Case.pptx djdkkdjnddkdoodkdxjidjdnhdjjdjx
RonnelPineda2
 
PPTX
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PPTX
PE introd.pptxfrgfgfdgfdgfgrtretrt44t444
nepmithibai2024
 
PPTX
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
Template Timeplan & Roadmap Product.pptx
ImeldaYulistya
 
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
introduction to networking with basics coverage
RamananMuthukrishnan
 
Digital Security in 2025 with Adut Angelina
The ClarityDesk
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
英国学位证(RCM毕业证书)皇家音乐学院毕业证书如何办理
Taqyea
 
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
Technical Guide to Build a Successful Shopify Marketplace from Scratch.pdf
CartCoders
 
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
DevOps Design for different deployment options
henrymails
 
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
ZARA-Case.pptx djdkkdjnddkdoodkdxjidjdnhdjjdjx
RonnelPineda2
 
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PE introd.pptxfrgfgfdgfdgfgrtretrt44t444
nepmithibai2024
 
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 

Cross Site Scripting(XSS)

  • 1. Presented by: Nabin Dutta 3rd Year , IT Class Roll: 44 Mentor: Mrs. Suparna Seal
  • 2. Sl. No Topic 1 What is XSS? 2 Diagram of Typical XSS attack 3 XSS attack used for: 4 Types of XSS 5 Reflected XSS 6 Attack Scenario of Reflected XSS 7 Stored XSS 8 Attack Scenario of Stored XSS 9 DOM-Based XSS 10 Attack Scenario of DOM Based XSS 11 Steps to an XSS attack 12 Protection 13 Conclusion
  • 3.  Cross-site scripting or XSS is defined as a computer security vulnerability (weakness) found in web applications.  It allows a variety of code to be injected by a malicious user into a webpage  The code is written in JavaScript, VBScript, ActiveX, HTML, or Flash  It can cause Installation of Trojan horse programs  the CSS attack involves three parties – the attacker, a client and the web site.  During an attack “everything looks fine” to the end user, but in actuality they are subject to an endless amount of threats
  • 5.  Hijacking Accounts(stealing their private information)  False Advertising & inserting hostile content  Cookie theft(stealing other user’s cookies) /poisoning & defacing websites  Changing of users settings  Conducting phishing attacks  performing actions on behalf of other users  Spying on user’s web browsing habits.
  • 6. 1. Non-Persistent (Reflected) 2. Persistent (Stored ) 3. DOM-Based (Local)
  • 7.  Most common type  An attacker convinces a user to follow a malicious URL which injects code into the resulting page  Now the attacker has full access to that pages content
  • 9.  The user comes in contact with a malicious link, form, or a malicious redirection.  The Web application is requested prepared the call by the Bank.  The XSS-code is an XSS vulnerability of the banking application, inserted into the page.  The infected page with XSS code is sent to the user.  The XSS-code context of the page arrived at the user and thus bypassing the "Same Origin" security setting of the Web browser.  XSS-code sends stolen data to the server of the attacker.
  • 10.  JavaScript supplied by the attacker is stored by the website (e.g. in a database)  Doesn’t require the victim to supply the JavaScript somehow, just visit the exploited web page  More dangerous than Reflected XSS
  • 12.  The Web application of the bank is called with the XSS code.  The malicious code enters into an XSS vulnerability in the application and is stored there.  A user calls the Web application of the Bank.  The malicious code is installed from the memory to the website.  The infected Web page is sent to the user.  The XSS code context of the page arrived at the user, and thus bypassing the "Same Origin" security setting of the Web browser.  The XSS code sends stolen data to the server of the attacker.
  • 13.  Occur in the content processing stages performed by the client  DOM-Based (Local)  Document Object Model  Standard object model for representing html or xhtml  Problem exists within the page’s client side script  If an attacker hosts a malicious site, which contains a vulnerable website on a clients local system, a script can be injected  Now the attacker can run the privileges of that users browser on their system.
  • 15.  The Web application is requested by the Bank prepared the call.  The XSS-code inserted in the cookie.  The cookie with the malicious code is sent to the user and stored with him.  The user calls the Web application of the Bank.  The malicious code is installed from the cookie in the Web page.  The infected Web page is sent to the user.  The XSS code sends stolen data to the server of the attacker.
  • 16.  Select a target  Find an XSS hole, and look if it has any cookies  If it has a cookie, then you have found a target  Testing  Insert code or script pointing to the vulnerability  Make sure the page does not appear broken  XSS Execution  Send your crafted URL to launch it  More experienced attackers would do a few redirects to steal cookies, return to site, then attack them harder  Decide what to do with the data  After collecting data, it is possible to perform an attack
  • 17. • The simplest form of XSS protection is to pass all external data through a filter (in server-side). • It is recommended to use libraries that has been tried and tested by the community. • XSS techniques keep changing (your filters will need to be updated periodically).
  • 18.  XSS is defined as the number one and utmost prevalent website vulnerability on the internet  No one is ever completely safe from XSS  Can not be expected to write flawless code or have round the clock personnel to answer all possible vulnerability issues  As XSS vulnerabilities continue to grow, the best way to protect yourself from it is to be careful and be aware of its existence