Upgrade to Pro — share decks privately, control downloads, hide ads and more …

XSS

 XSS

Ivan Banov

March 03, 2017
Tweet

More Decks by Ivan Banov

Other Decks in Technology

Transcript

  1. OWASP OWASP is a non-profit organization with the goal of

    improving the security of software and the internet
  2. OWASP 1 - Injection 2 - Broken Authentication and Session

    Management (XSS) 3 - Cross Site Scripting (XSS) 4 - Insecure Direct Object References 5 - Security Misconfiguration 6 - Sensitive Data Exposure 7 - Missing Function Level Access Control 8 - Cross Site Request Forgery (CSRF) 9 - Using Components with Known Vulnerabilities 10 - Unvalidated Redirects and Forwards
  3. OWASP 1 - Injection 2 - Broken Authentication and Session

    Management (XSS) 3 - Cross Site Scripting (XSS) 4 - Insecure Direct Object References 5 - Security Misconfiguration 6 - Sensitive Data Exposure 7 - Missing Function Level Access Control 8 - Cross Site Request Forgery (CSRF) 9 - Using Components with Known Vulnerabilities 10 - Unvalidated Redirects and Forwards
  4. Store This is when an attacker could inject script code

    onto your site permanently and every user who views the page where the script is injected will execute it.
  5. Reflected This is when an attacker could forge a link

    to inject script code that will execute from your website. This is also the most common type of XSS
  6. DOM-based This kind of XSS is executed at some point

    after the page has loaded, many time needs user interaction, which means that the attacker must trick the user to execute the script himself. This one is very similar to the reflected XSS, but for needing user interaction makes it harder for the attacker
  7. FAKE LINK http://site.com/?query=<script>xss</script> DOM USE QUERY <html> <button onclick="javascript:search()"> Search

    </button> </html> // search uses query param and BANG! RECEIVE DATA e.g. document.cookie POST
  8. XSS ON REACT { user: { username: "Xss User", bio:

    "...</script><script>xss</script>" } }