![]() ![]() ![]() “XSS” thus has been classified into three main categories : So, when any user visits that website, the XSS suffering web-page will deliver the malicious JavaScript code directly over to his browser without his knowledge. In this attack, the users are not directly targeted through a payload, although the attacker shoots the XSS vulnerability by inserting a malicious script into a web page that appears to be a genuine part of the website. Credential Capturing with Burp CollaboratorĬross- Site Scripting is a client-side code injection attack where malicious scripts are injected into trusted websites. ![]() Session Hijacking with Burp Collaborator.I recommend, to revisit our previous article for better understanding, before going deeper with the attack scenarios implemented in this section. “Are you one of them, who thinks that Cross-Site Scripting is just for some errors or pop-ups on the screen?” Yes? Then today in this article, you’ll see how an XSS suffering web-page is not only responsible for the defacement of the web-application but also, it could disrupt a visitor’s privacy by sharing the login credentials or his authenticated cookies to an attacker without his/her concern. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |