SlideShare a Scribd company logo
CROSS SITE SCRIPTING
BY :-
ASHUTOSH KUMAR RAI
Sunday,
July 27,
2014
1
INDEX
 INTRODUCTION
 TYPES OF XSS
 PREVENTION
 WORST CASE SCENARIO
 CONCLUSION
Sunday, July 27,
2014
2
WHAT IS CROSS SITE
SCRIPTING..??
 According to current statistics, Cross Site Scripting (XSS) is
one of the most widespread security problems today.
 XSS is an attack technique that forces a website to echo
attacker-supplied executable code, which then loads in a
user’s Web browser.
 The server is merely the host, while the attack executes
within the Web browser.
 Samy worm1 became the first major worm to use Cross-
Site Scripting for infection propagation. Sunday, July 27,
2014
3
WHAT IS CROSS SITE-SCRIPTING..??
 AN ATTACKER
1. Anonymous Internet User
2. Malicious Internal User
 A WEB SEREVER
External (e.g.: Social networking website, Shop,
Information). Internal (e.g.: Employees Self Service Portal)
 A CLIENT
• Any type of customer
• Anonymous user accessing the Web-Server
Sunday, July 27,
2014
4
TYPES OF XSS
• PERSISTENT
a) It does not require specially crafted links for execution
b) A hacker merely submits XSS exploit code to an area
of a website that is likely to be visited by other users.
c) These areas could be blog comments, user reviews,
message board posts etc
d) Persistent XSS much more dangerous than non-
persistent because the user has no means of defending
himself
Sunday, July 27,
2014
5
TYPES OF XSS..
• USED TRICK SOME WAY
TO OPEN THE LINK.
Sunday, July 27,
2014
6
TYPES OF XSS..
• NON – PERSISTENT
The non-persistent cross-site scripting
vulnerability is by far the
most common type.
Sunday, July 27,
2014
7
TYPES OF XSS..
• EMBEDDED HTML TAGS
• Several HTML tags possess attributes
that initiate Web browser HTTP requests
automatically upon page load
• This is done by finding an unvalidated
request parameter that is reflected into the
response header
Sunday, July 27,
2014
8
PREVENTION..
 The first and most effective solution is to disable all
scripting language proxy servers can help filter out
malicious scripting in HTML.
 Four approaches of prevention against XSS:
a) USERS
b) CUSTOMER WEB APPLICATIONS
c) SECURITY PROFESSIONALS
d) BROWSER SECURITY
Sunday, July 27,
2014
9
PREVENTION
 USERS :
 Exercise caution when clicking on links
 Install some browser add-ons such as NoScript25 or the Netcraft
Toolbar26
 avoiding questionable websites such as those offering hacking information
etc.
 CUSTOMER WEB APPLICATIONS :
 developers must focus on performing rock solid Input Validation on all
user-submitted content
 Protect sensitive functionality from being executed from third-party websites
 Code must contain no javascript
Sunday, July 27,
2014
10
PREVENTION..
 SECURITY PROFESSIONALS
a. The only way to determine if your security practices are providing
adequate safeguards is to measure them and measure often
b. It may take tens, if not hundreds, of thousands of security tests to
properly assess the security of a website
 BROWSER VENDORS
a. Mozilla (Firefox), Microsoft and Opera development teams must begin
formalizing and implementing Content-Restrictions
b. Mozilla (Firefox) developer, please implement http Only. It’s been around
for years! Sunday, July 27,
2014
11
WORST CASE SCENARIO
 An attacker can use your web site to
launch attacks against your users.
 A cross-site Scripting vulnerability in
one server in your domain presents a risk
to others in its environment since it can
become a launching pad for attacks
against other servers. Sunday, July 27,
2014
12
WORST CASE SCENARIO
• Example of how
websites include
google adsense
using javascript
Sunday, July 27,
2014
13
CONCLUSION
• Malware authors are contend to experiment with the
new possiblities.
• The techniques of the malware authors dramatically
improved as propagation becomes faster.
• Payload becomes more severe with the introuction of
backdoors,rootkits and botnets.
• XSS malware is in it's early stage of exploration.
Sunday, July 27,
2014
14
CONCLUSION
• The first major XSS worm which was successful
experiment in propagation was the samy worm
• If history continues to repeat itself it is safe to say we
will witness and increased volume of XSS malware
outbreaks
• Who is responsible...???
• The business owner who operates a business application
is in charge for secure operation.
Sunday, July 27,
2014
15
CONCLUSION
• Every piece of software could be vulnerable if developer
doesn't do his homework in terms of security.
• A process is required that insures that security is
considered throughout the complete life cycle of the
application.
• GISWS survey showed that 51% of those surved feel
that internal employees are indeed the bigger threat
• Undetected and unchecked exploitation can also lead to
implantation of malicious software giving malicious attacker
the ability to attack any time
Sunday, July 27,
2014
16
THANK YOU…..!!!!
Sunday, July 27,
2014
17
Ad

More Related Content

What's hot (20)

Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
n|u - The Open Security Community
 
Cross Site Scripting
Cross Site ScriptingCross Site Scripting
Cross Site Scripting
Ali Mattash
 
XSS
XSSXSS
XSS
Hrishikesh Mishra
 
XSS- an application security vulnerability
XSS-   an application security vulnerabilityXSS-   an application security vulnerability
XSS- an application security vulnerability
Soumyasanto Sen
 
Xss (cross site scripting)
Xss (cross site scripting)Xss (cross site scripting)
Xss (cross site scripting)
vinayh.vaghamshi _
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
kinish kumar
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting Guide
Daisuke_Dan
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
Ikhade Maro Igbape
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
Manish Kumar
 
XSS-Alert-Pentration testing tool
XSS-Alert-Pentration testing toolXSS-Alert-Pentration testing tool
XSS-Alert-Pentration testing tool
Arjun Jain
 
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbharCross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Sandeep Kumbhar
 
Secure coding | XSS Attacks on current Web Applications
Secure coding | XSS Attacks on current Web ApplicationsSecure coding | XSS Attacks on current Web Applications
Secure coding | XSS Attacks on current Web Applications
n|u - The Open Security Community
 
Cross site scripting
Cross site scripting Cross site scripting
Cross site scripting
Bilal Mazhar MS(IS)Cyber Security II Privacy Professional
 
Xss talk, attack and defense
Xss talk, attack and defenseXss talk, attack and defense
Xss talk, attack and defense
Prakashchand Suthar
 
Xss attack
Xss attackXss attack
Xss attack
Manjushree Mashal
 
What is xss, blind xss and xploiting google gadgets
What is xss, blind xss and xploiting google gadgetsWhat is xss, blind xss and xploiting google gadgets
What is xss, blind xss and xploiting google gadgets
Ziv Ginsberg
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
OWASP Khartoum
 
Identifying Cross Site Scripting Vulnerabilities in Web Applications
Identifying Cross Site Scripting Vulnerabilities in Web ApplicationsIdentifying Cross Site Scripting Vulnerabilities in Web Applications
Identifying Cross Site Scripting Vulnerabilities in Web Applications
Porfirio Tramontana
 
Xss what the heck-!
Xss   what the heck-!Xss   what the heck-!
Xss what the heck-!
VodqaBLR
 
Cross site scripting XSS
Cross site scripting XSSCross site scripting XSS
Cross site scripting XSS
Ronan Dunne, CEH, SSCP
 
Cross Site Scripting
Cross Site ScriptingCross Site Scripting
Cross Site Scripting
Ali Mattash
 
XSS- an application security vulnerability
XSS-   an application security vulnerabilityXSS-   an application security vulnerability
XSS- an application security vulnerability
Soumyasanto Sen
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
kinish kumar
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting Guide
Daisuke_Dan
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
Ikhade Maro Igbape
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
Manish Kumar
 
XSS-Alert-Pentration testing tool
XSS-Alert-Pentration testing toolXSS-Alert-Pentration testing tool
XSS-Alert-Pentration testing tool
Arjun Jain
 
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbharCross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Sandeep Kumbhar
 
What is xss, blind xss and xploiting google gadgets
What is xss, blind xss and xploiting google gadgetsWhat is xss, blind xss and xploiting google gadgets
What is xss, blind xss and xploiting google gadgets
Ziv Ginsberg
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
OWASP Khartoum
 
Identifying Cross Site Scripting Vulnerabilities in Web Applications
Identifying Cross Site Scripting Vulnerabilities in Web ApplicationsIdentifying Cross Site Scripting Vulnerabilities in Web Applications
Identifying Cross Site Scripting Vulnerabilities in Web Applications
Porfirio Tramontana
 
Xss what the heck-!
Xss   what the heck-!Xss   what the heck-!
Xss what the heck-!
VodqaBLR
 

Similar to Cross site scripting (20)

VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
karthikvcyber
 
4774.projectb.securitysquad
4774.projectb.securitysquad4774.projectb.securitysquad
4774.projectb.securitysquad
Josh Howell
 
Cross Site Scripting Attacks and Preventive Measures
Cross Site Scripting Attacks and Preventive MeasuresCross Site Scripting Attacks and Preventive Measures
Cross Site Scripting Attacks and Preventive Measures
IRJET Journal
 
T04505103106
T04505103106T04505103106
T04505103106
IJERA Editor
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
IJERA Editor
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
IJERA Editor
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
Bhagyashri Chalakh
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Imperva Incapsula
 
vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting tool
Bhagyashri Chalakh
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerable
IIMBNSRCEL
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0
Jason Edelstein
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security Threats
Lacework
 
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload ProtectionReducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Alert Logic
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
sudip pudasaini
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
IBM Security
 
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and BrowsersAnalysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
cscpconf
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
ISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection ModelISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection Model
Aditya K Sood
 
Project Presentation
Project Presentation Project Presentation
Project Presentation
Inaam Ishaque Shaikh
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
karthikvcyber
 
4774.projectb.securitysquad
4774.projectb.securitysquad4774.projectb.securitysquad
4774.projectb.securitysquad
Josh Howell
 
Cross Site Scripting Attacks and Preventive Measures
Cross Site Scripting Attacks and Preventive MeasuresCross Site Scripting Attacks and Preventive Measures
Cross Site Scripting Attacks and Preventive Measures
IRJET Journal
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
Bhagyashri Chalakh
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Imperva Incapsula
 
vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting tool
Bhagyashri Chalakh
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerable
IIMBNSRCEL
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0
Jason Edelstein
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security Threats
Lacework
 
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload ProtectionReducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Alert Logic
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
sudip pudasaini
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
IBM Security
 
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and BrowsersAnalysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
cscpconf
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
ISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection ModelISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection Model
Aditya K Sood
 
Ad

Recently uploaded (20)

15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
Ad

Cross site scripting

  • 1. CROSS SITE SCRIPTING BY :- ASHUTOSH KUMAR RAI Sunday, July 27, 2014 1
  • 2. INDEX  INTRODUCTION  TYPES OF XSS  PREVENTION  WORST CASE SCENARIO  CONCLUSION Sunday, July 27, 2014 2
  • 3. WHAT IS CROSS SITE SCRIPTING..??  According to current statistics, Cross Site Scripting (XSS) is one of the most widespread security problems today.  XSS is an attack technique that forces a website to echo attacker-supplied executable code, which then loads in a user’s Web browser.  The server is merely the host, while the attack executes within the Web browser.  Samy worm1 became the first major worm to use Cross- Site Scripting for infection propagation. Sunday, July 27, 2014 3
  • 4. WHAT IS CROSS SITE-SCRIPTING..??  AN ATTACKER 1. Anonymous Internet User 2. Malicious Internal User  A WEB SEREVER External (e.g.: Social networking website, Shop, Information). Internal (e.g.: Employees Self Service Portal)  A CLIENT • Any type of customer • Anonymous user accessing the Web-Server Sunday, July 27, 2014 4
  • 5. TYPES OF XSS • PERSISTENT a) It does not require specially crafted links for execution b) A hacker merely submits XSS exploit code to an area of a website that is likely to be visited by other users. c) These areas could be blog comments, user reviews, message board posts etc d) Persistent XSS much more dangerous than non- persistent because the user has no means of defending himself Sunday, July 27, 2014 5
  • 6. TYPES OF XSS.. • USED TRICK SOME WAY TO OPEN THE LINK. Sunday, July 27, 2014 6
  • 7. TYPES OF XSS.. • NON – PERSISTENT The non-persistent cross-site scripting vulnerability is by far the most common type. Sunday, July 27, 2014 7
  • 8. TYPES OF XSS.. • EMBEDDED HTML TAGS • Several HTML tags possess attributes that initiate Web browser HTTP requests automatically upon page load • This is done by finding an unvalidated request parameter that is reflected into the response header Sunday, July 27, 2014 8
  • 9. PREVENTION..  The first and most effective solution is to disable all scripting language proxy servers can help filter out malicious scripting in HTML.  Four approaches of prevention against XSS: a) USERS b) CUSTOMER WEB APPLICATIONS c) SECURITY PROFESSIONALS d) BROWSER SECURITY Sunday, July 27, 2014 9
  • 10. PREVENTION  USERS :  Exercise caution when clicking on links  Install some browser add-ons such as NoScript25 or the Netcraft Toolbar26  avoiding questionable websites such as those offering hacking information etc.  CUSTOMER WEB APPLICATIONS :  developers must focus on performing rock solid Input Validation on all user-submitted content  Protect sensitive functionality from being executed from third-party websites  Code must contain no javascript Sunday, July 27, 2014 10
  • 11. PREVENTION..  SECURITY PROFESSIONALS a. The only way to determine if your security practices are providing adequate safeguards is to measure them and measure often b. It may take tens, if not hundreds, of thousands of security tests to properly assess the security of a website  BROWSER VENDORS a. Mozilla (Firefox), Microsoft and Opera development teams must begin formalizing and implementing Content-Restrictions b. Mozilla (Firefox) developer, please implement http Only. It’s been around for years! Sunday, July 27, 2014 11
  • 12. WORST CASE SCENARIO  An attacker can use your web site to launch attacks against your users.  A cross-site Scripting vulnerability in one server in your domain presents a risk to others in its environment since it can become a launching pad for attacks against other servers. Sunday, July 27, 2014 12
  • 13. WORST CASE SCENARIO • Example of how websites include google adsense using javascript Sunday, July 27, 2014 13
  • 14. CONCLUSION • Malware authors are contend to experiment with the new possiblities. • The techniques of the malware authors dramatically improved as propagation becomes faster. • Payload becomes more severe with the introuction of backdoors,rootkits and botnets. • XSS malware is in it's early stage of exploration. Sunday, July 27, 2014 14
  • 15. CONCLUSION • The first major XSS worm which was successful experiment in propagation was the samy worm • If history continues to repeat itself it is safe to say we will witness and increased volume of XSS malware outbreaks • Who is responsible...??? • The business owner who operates a business application is in charge for secure operation. Sunday, July 27, 2014 15
  • 16. CONCLUSION • Every piece of software could be vulnerable if developer doesn't do his homework in terms of security. • A process is required that insures that security is considered throughout the complete life cycle of the application. • GISWS survey showed that 51% of those surved feel that internal employees are indeed the bigger threat • Undetected and unchecked exploitation can also lead to implantation of malicious software giving malicious attacker the ability to attack any time Sunday, July 27, 2014 16