Preview

Cross Site Scripting Attacks

Good Essays
Open Document
Open Document
684 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cross Site Scripting Attacks
Kaplan University
IT542
Ethical Hacking and Network Defense
Unit 3 Assignment
Cross-scripting Attacks
Jamie Carter
Professor North

Cross-Site Scripting Attacks
1.
Penetration testing on web servers and applications is extremely important to ensure the application or server is not vulnerable to any of the 5 known main issues. These issues include SQL injection, "cross site scripting (XSS)", username enumeration, string format weaknesses, and remote code implementation (Symantec, 2006).
2.
This type of attack uses a vulnerability to inject code. The content injected is not under the control of the attacker. The attack takes place when a third party user accesses the content causing it to be executed (Google, 2010).
3.
These attacks are the most common. This type of attack requires the victim to click or use other input to initiate the attack (Sawyer, 2009). These inputs use a link set by the attacker to bounce a signal through the victims web browser and execute the attack.
4.
The most common methods of obfuscation are numeric variance, character scrambling, nulling, aggregating, encoding, artificial data generating, and repeating of the character masking process (Magnabosco, 2009). These methods rely on functions that exist in the SQL system server.

5. The most common application exploit or attack is through SQL injection. This type of attack can be countered by removing the ability to run direct SQL queries through input and having a thorough exception handling principles in the applications. Closing the window on weakness through exception handling vulnerabilities will help secure against SQL injection.
6.
Audits and account activity logs are the best way to check production databases for attacks and injections. The audits will help to ensure the code has not changed. Ensuring there are no unauthorized changes in the coding will help to prevent injection attacks, also ensuring exception handling measures are



References: Google, (2010). Cross-site scripting (XSS). Retrieved from http://google-gruyere.appspot.com/part2 Magnabosco, J. (2009). Obfuscating your SQL Server Data. Retrieved from https://www.simple-talk.com/sql/database-administration/obfuscating-your-sql-server-data/ Sawyer, J. (2009).Tech insight: XSS exposed. Retrieved from http://www.darkreading.com/applications/tech-insight-xss-exposed/219501411 Symantec, (2006). Five common web application vulnerabilities. Retrieved from http://www.symantec.com/connect/articles/five-common-web-application-vulnerabilities

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Security: Web applications are typically deployed on dedicated servers, which are monitored and maintained by experienced server…

    • 776 Words
    • 4 Pages
    Good Essays
  • Good Essays

    5. If you can monitor when SQL injections are performed on an SQL database, what would you recommend as a security countermeasure to monitor your production SQL databases?…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Database penetration testing is the technique of testing a database for vulnerabilities to hacking attacks. This type of penetration testing uses techniques designed to address general database vulnerabilities as well as specific database issues such as those related to Microsoft SQL or Oracle servers. Port scanning is a basic technique used in database penetration, in which is the process of scanning a network or system to find accessible ports. Familiarity with port scanning techniques is important. However open ports are vulnerable to an intrusion by a hacker.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    - Any action that a database takes, creating objects, adding rows, changing data in rows, removing rows, and so on.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    Vulnerabilities in the computers may be due the unauthorized access of the person to corrupt the information in the system related to the database, some may also format the databases where upon usage they can easily hack the information. For example, the Blaster Worm abused a Windows 2000 feebleness to make foreswearing of association conditions.…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 748 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    The number two web based attack of 2009 was the Microsoft Internet Explorer ADODB.Stream Object file installation weakness. This exploit accounted for 18% of the total number of web based exploits for the year.This vulnerability allows hackers to install malicious files on a vulnerable computer when a user visits a website hosting an exploit. In…

    • 601 Words
    • 3 Pages
    Better Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    Cross-Site Scripting is a type of injection problem in which malicious scripts (vb, js etc.) are into a trusted web site. XSS flaws occur whenever an application takes untrusted (typically user supplied) data and sends it invalidated to a web browser. XSS allows attackers to execute script in the victim’s browser and the malicious script can…

    • 556 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers such as a WAF, IDS, or Mod Security to react in real time to various hacking and threats for HTTP requests. However, securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cross-site scripting is a type of computer security exposure found in web function such as XSS which attacker attach to the client side of a script.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Gaining access to resources is the whole point of a modern-day attack. The usual goal is to either extract information of value to the attacker or use the network as a launch site for attacks against other targets. In either situation, the attacker must gain some level of access to one or more network devices.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    "SQL History and Revisions." 30 Tutorial Books by Herong Yang on Software Programming Technologies. N.p., n.d. Web. 26 Sept. 2012. <http://www.herongyang.com/MySQL/SQL-History-and-Revisions.html>.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    Cross-site scripting is a type of computer security vulnerability typically found in web applications that enables attacks to inject client side script into web pages viewed by others…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    A SQL, or sequel, Injection refers to an attacker inserting sequel coding into the user input, such as the username/password user input at the applications login screen. Doing this, the attacker would be able to gain access to the list of passwords that could be stored within the application database. That said, the attacker’s motivation would be that of gain. He would like to gain access to this application in order to scam others, steal money, or change data around to his or her liking. This is the developer’s role to ensure that SQL Injections cannot occur. The security engineer can periodically test the user inputs to ensure that the user input has a SQL checker and/or limits to what characters can and cannot be used.…

    • 565 Words
    • 2 Pages
    Good Essays