Cse543 Web Security 23
Cse543 Web Security 23
• JavaScript
‣ embedded in web pages and executed inside browser
• Java applets
‣ small pieces of Java bytecodes executed in browsers
https://portswigger.net/web-security/cross-site-scripting
https://portswigger.net/web-security/cross-site-scripting
Encoding approach
● Encode data to make JavaScript interpreted as a string
<script>alert(“attack”);</script>
becomes
<script> alert(“attack”);</script>
Source: https://portswigger.net/web-security/cross-site-scripting
CSE543 - Computer Security Page 17
Big picture
• Take away from last few classes: do not trust user input
• Bank does not accept request unless referred to (linked from) the bank’s own webpage
• Disadvantage:
‣ privacy issues
‣ can be bypassed: https://www.sjoerdlangkemper.nl/2017/06/21/bypass-csrf-check-using-referrer-policy/
http://www.abine.com/
https://www.nytimes.com/2021/01/27/magazine/scam-call-centers.html
https://www.youtube.com/watch?v=R1etkjUN6Ak&t=607&start=60
Pretext
development
Attack
plan
Execute
Hadnagy, Christopher. Social engineering: The science of human hacking. Second edition. John Wiley & Sons, 2018.
OSINT
Pretext
development
Attack
plan
Execute
OSINT
Pretext
development
Attack
plan
Execute
Pretext
development
Attack
plan
Execute
Questions?