SlideShare a Scribd company logo
2
Most read
6
Most read
16
Most read
Cross-Site Scripting
The most prevalent web application risk
What damage can XSS cause?
Attacker can execute scripts in a victim’s browser to hijack user
sessions, deface websites, insert hostile content, redirect users, hijack
the
user’s browser using malware, etc.
What kind of applications are vulnerable
to XSS attacks?
Whenever it takes untrusted user data and sends it to a web browser.
WASC revealed that 58% of the applications are vulnerable to XSS.
Types of XSS
1, Reflected XSS
2. Stored XSS
3. DOM based XSS
Terminology
 Active content – Malicious data embedded in user.
 Input which should always be text.
 Malicious data – Attacker embedded JavaScript in user input.
 Injected code – same as malicious data.
 Payload – same as malicious data.
 Script – JavaScriptUser input – User supplied data like recipient email
address.
 Untrusted data – same as user data.
Reflected XSS
Reflected XSS attacks, also known as non-persistent
attacks, occur when a malicious script is reflected off of a
web application to the victim's browser. The script is
activated through a link, which sends a request to a
website with a vulnerability that enables execution of
malicious scripts.
Reflected XSS
Impact of Reflected XSS attacks
If an attacker can control a script that is executed in the victim's browser,
then they can typically fully compromise that user. Amongst other things,
the attacker can:
 Perform any action within the application that the user can perform.
 View any information that the user is able to view.
 Modify any information that the user is able to modify.
 Initiate interactions with other application users, including malicious
attacks, that will appear to originate from the initial victim user.
Stored XSS
• Stored attacks are those where the injected script is permanently
stored on the target servers, such as in a database, in a message
forum, visitor log, comment field, etc. The victim then retrieves the
malicious script from the server when it requests the stored
information. Stored XSS is also sometimes referred to as Persistent
XSS
Stored XSS
Impact of stored XSS attacks
If an attacker can control a script that is executed in the victim's
browser, then they can typically fully compromise that user. The
attacker can carry out any of the actions that are applicable to the
impact of reflected XSS vulnerabilities.
In terms of exploitability, the key difference between reflected and
stored XSS is that a stored XSS vulnerability enables attacks that are
self-contained within the application itself. The attacker does not need
to find an external way of inducing other users to make a particular
request containing their exploit. Rather, the attacker places their
exploit into the application itself and simply waits for users to
encounter it
DOM Based XSS
• DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an
XSS attack wherein the attack payload is executed as a result of
modifying the DOM “environment” in the victim's browser used by
the original client side script, so that the client side code runs in an
“unexpected” manner.
Dom Based XSS
Impact of DOM attacks
• DOM XSS can have huge implications for a web application and its
users. User accounts can be hijacked, credentials could be stolen,
sensitive data could be exfiltrated, and lastly, access to your client
computers can be obtained
How to Prevent Stored and Reflected XSS?
1. Validate input – be very strict
2. Validate output – use untrusted data for display only
3. Eliminate dangerous insertion points
How to Prevent DOM Based XSS?
1. Validate input
2. Avoid using untrusted data in sensitive client side actions
3. Analyze and harden client side JavaScript code
Thank You

More Related Content

PDF
Cross site scripting attacks and defenses
Mohammed A. Imran
 
PDF
Cross site scripting
n|u - The Open Security Community
 
PPTX
Cross Site Scripting Defense Presentation
Ikhade Maro Igbape
 
PDF
Owasp top 10
YasserElsnbary
 
PPTX
Xss attack
Manjushree Mashal
 
PPTX
Vulnerabilities in modern web applications
Niyas Nazar
 
PDF
Secure Session Management
GuidePoint Security, LLC
 
PPTX
Security testing
Khizra Sammad
 
Cross site scripting attacks and defenses
Mohammed A. Imran
 
Cross site scripting
n|u - The Open Security Community
 
Cross Site Scripting Defense Presentation
Ikhade Maro Igbape
 
Owasp top 10
YasserElsnbary
 
Xss attack
Manjushree Mashal
 
Vulnerabilities in modern web applications
Niyas Nazar
 
Secure Session Management
GuidePoint Security, LLC
 
Security testing
Khizra Sammad
 

What's hot (20)

PPTX
Cross-Site Scripting (XSS)
Daniel Tumser
 
PPTX
Cross Site Scripting ( XSS)
Amit Tyagi
 
PPTX
Web application security
Kapil Sharma
 
PPT
Intro to Web Application Security
Rob Ragan
 
PPTX
Xss (cross site scripting)
vinayh.vaghamshi _
 
PPT
Cross site scripting (xss)
Manish Kumar
 
PPTX
Understanding Cross-site Request Forgery
Daniel Miessler
 
PPTX
Web Security Attacks
Sajid Hasan
 
PDF
Secure coding-guidelines
Trupti Shiralkar, CISSP
 
PPT
Web Proxy Server
Mohit Dhankher
 
PPTX
Directory Traversal & File Inclusion Attacks
Raghav Bisht
 
PPTX
Application Security Architecture and Threat Modelling
Priyanka Aash
 
PPTX
Cross site scripting
kinish kumar
 
PPTX
Web application attacks
hruth
 
PDF
Penetration testing web application web application (in) security
Nahidul Kibria
 
PPTX
Cross Site Scripting: Prevention and Detection(XSS)
Aman Singh
 
PDF
OWASP API Security Top 10 Examples
42Crunch
 
PDF
Web application security & Testing
Deepu S Nath
 
Cross-Site Scripting (XSS)
Daniel Tumser
 
Cross Site Scripting ( XSS)
Amit Tyagi
 
Web application security
Kapil Sharma
 
Intro to Web Application Security
Rob Ragan
 
Xss (cross site scripting)
vinayh.vaghamshi _
 
Cross site scripting (xss)
Manish Kumar
 
Understanding Cross-site Request Forgery
Daniel Miessler
 
Web Security Attacks
Sajid Hasan
 
Secure coding-guidelines
Trupti Shiralkar, CISSP
 
Web Proxy Server
Mohit Dhankher
 
Directory Traversal & File Inclusion Attacks
Raghav Bisht
 
Application Security Architecture and Threat Modelling
Priyanka Aash
 
Cross site scripting
kinish kumar
 
Web application attacks
hruth
 
Penetration testing web application web application (in) security
Nahidul Kibria
 
Cross Site Scripting: Prevention and Detection(XSS)
Aman Singh
 
OWASP API Security Top 10 Examples
42Crunch
 
Web application security & Testing
Deepu S Nath
 
Ad

Similar to Xss ppt (20)

PDF
XSS.pdf
Okan YILDIZ
 
PDF
XSS.pdf
Okan YILDIZ
 
PDF
The Cross Site Scripting Guide
Daisuke_Dan
 
PPTX
Cm7 secure code_training_1day_xss
dcervigni
 
PPTX
Cross Site Scripting
Ali Mattash
 
PPTX
Xss_Hritwik_Roy.pptx@kjfbbwefhjoiqrw[i0-3envnvig87trhgohiulefvonvrivfgkmlghoi...
jafixew160
 
PPT
Cross Site scripting Attacks - by Adam Nurudini
Adam Nurudini
 
PPTX
Cross Site Scripting (XSS)
Barrel Software
 
PPTX
Xss
Ilan Mindel
 
PPTX
XSeyeyeyeyeyeyeyeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeS.pptx
VikasTuwar1
 
PDF
XSS Exploitation
Hacking Articles
 
PDF
Xss 101 by-sai-shanthan
Raghunath G
 
PPTX
STORED XSS IN DVWA
Rutvik patel
 
PDF
Complete xss walkthrough
Ahmed Elhady Mohamed
 
PPT
CROSS SITE SCRIPTING.ppt
yashvirsingh48
 
PPTX
Identifying XSS Vulnerabilities
n|u - The Open Security Community
 
PDF
Study of Cross-Site Scripting Attacks and Their Countermeasures
Editor IJCATR
 
DOC
HallTumserFinalPaper
Daniel Tumser
 
XSS.pdf
Okan YILDIZ
 
XSS.pdf
Okan YILDIZ
 
The Cross Site Scripting Guide
Daisuke_Dan
 
Cm7 secure code_training_1day_xss
dcervigni
 
Cross Site Scripting
Ali Mattash
 
Xss_Hritwik_Roy.pptx@kjfbbwefhjoiqrw[i0-3envnvig87trhgohiulefvonvrivfgkmlghoi...
jafixew160
 
Cross Site scripting Attacks - by Adam Nurudini
Adam Nurudini
 
Cross Site Scripting (XSS)
Barrel Software
 
XSeyeyeyeyeyeyeyeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeS.pptx
VikasTuwar1
 
XSS Exploitation
Hacking Articles
 
Xss 101 by-sai-shanthan
Raghunath G
 
STORED XSS IN DVWA
Rutvik patel
 
Complete xss walkthrough
Ahmed Elhady Mohamed
 
CROSS SITE SCRIPTING.ppt
yashvirsingh48
 
Identifying XSS Vulnerabilities
n|u - The Open Security Community
 
Study of Cross-Site Scripting Attacks and Their Countermeasures
Editor IJCATR
 
HallTumserFinalPaper
Daniel Tumser
 
Ad

More from penetration Tester (20)

PPTX
Jenkins
penetration Tester
 
PDF
Jenkins
penetration Tester
 
PPTX
Sonar qube
penetration Tester
 
PPTX
Owasp zap
penetration Tester
 
PPTX
Sonarlint
penetration Tester
 
PPTX
Shift left
penetration Tester
 
PPTX
Deployment Strategies
penetration Tester
 
PPTX
Devops
penetration Tester
 
PPTX
Shift left
penetration Tester
 
PPTX
Directory traversal
penetration Tester
 
PDF
Burp documentation
penetration Tester
 
DOCX
7 layer OSI model
penetration Tester
 
PPTX
Virtual box
penetration Tester
 
PPTX
Tcp IP OSI
penetration Tester
 
PPTX
Burp repeater
penetration Tester
 
PPTX
Burp intruder
penetration Tester
 
PPTX
Hippa
penetration Tester
 
Sonar qube
penetration Tester
 
Shift left
penetration Tester
 
Deployment Strategies
penetration Tester
 
Shift left
penetration Tester
 
Directory traversal
penetration Tester
 
Burp documentation
penetration Tester
 
7 layer OSI model
penetration Tester
 
Virtual box
penetration Tester
 
Tcp IP OSI
penetration Tester
 
Burp repeater
penetration Tester
 
Burp intruder
penetration Tester
 

Recently uploaded (20)

PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 

Xss ppt

  • 1. Cross-Site Scripting The most prevalent web application risk
  • 2. What damage can XSS cause? Attacker can execute scripts in a victim’s browser to hijack user sessions, deface websites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.
  • 3. What kind of applications are vulnerable to XSS attacks? Whenever it takes untrusted user data and sends it to a web browser. WASC revealed that 58% of the applications are vulnerable to XSS.
  • 4. Types of XSS 1, Reflected XSS 2. Stored XSS 3. DOM based XSS
  • 5. Terminology  Active content – Malicious data embedded in user.  Input which should always be text.  Malicious data – Attacker embedded JavaScript in user input.  Injected code – same as malicious data.  Payload – same as malicious data.  Script – JavaScriptUser input – User supplied data like recipient email address.  Untrusted data – same as user data.
  • 6. Reflected XSS Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off of a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.
  • 8. Impact of Reflected XSS attacks If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:  Perform any action within the application that the user can perform.  View any information that the user is able to view.  Modify any information that the user is able to modify.  Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.
  • 9. Stored XSS • Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent XSS
  • 11. Impact of stored XSS attacks If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. The attacker can carry out any of the actions that are applicable to the impact of reflected XSS vulnerabilities. In terms of exploitability, the key difference between reflected and stored XSS is that a stored XSS vulnerability enables attacks that are self-contained within the application itself. The attacker does not need to find an external way of inducing other users to make a particular request containing their exploit. Rather, the attacker places their exploit into the application itself and simply waits for users to encounter it
  • 12. DOM Based XSS • DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim's browser used by the original client side script, so that the client side code runs in an “unexpected” manner.
  • 14. Impact of DOM attacks • DOM XSS can have huge implications for a web application and its users. User accounts can be hijacked, credentials could be stolen, sensitive data could be exfiltrated, and lastly, access to your client computers can be obtained
  • 15. How to Prevent Stored and Reflected XSS? 1. Validate input – be very strict 2. Validate output – use untrusted data for display only 3. Eliminate dangerous insertion points
  • 16. How to Prevent DOM Based XSS? 1. Validate input 2. Avoid using untrusted data in sensitive client side actions 3. Analyze and harden client side JavaScript code