Hackernoon logoTypes of Cross-Site Scripting(XSS) Attacks by@obetomuniz

Types of Cross-Site Scripting(XSS) Attacks

image
Beto Muniz Hacker Noon profile picture

@obetomunizBeto Muniz

Writing about Web Development. I want to show you how amazing the web is.

Know how each Cross-Site Scripting Attack behaves is crucial to start to think about how vulnerabilities in our web apps allow malicious codes to be executed using the browser to take sensible data from users.

That's what this article is about.

๐Ÿ”“ย Reflected XSS

๐Ÿ“Œ This attack XSS use URL parameters or data submitted via POST in forms to inject malicious code on that server request that persists some data for later execution in the browser. Third-party Browser extensions could even be an access point to inject such a malicious code.

๐Ÿ”“ย Stored XSS

๐Ÿ“Œ This attack XSS happens when malicious code is persisted by the attacker directly in the server-side of the web app and is executed by the user (victim) when she accesses the infected application.

๐Ÿ”“ย DOM XSS

๐Ÿ“Œ This attack XSS happens when the application manipulates the DOM incorrectly, opening breaches to malicious scripts sent by URL parameters to inject malicious code.

๐Ÿ”“ย The question is... How to defend against attacks XSS?

๐Ÿ“Œ There's no formula - A system security is always dependent on that system context, keep this in mind, but there are practices against well-known XSS attacks to stay updated about XSS attacks.

๐Ÿ‘‰ Start reading aboutย Content Security Policy,ย Mozilla Observatory, OWASP recommendations, andย signing up my newsletter. As a web security lover, I always talk about it.

Also published on Dev.to

Tags

Join Hacker Noon

Create your free account to unlock your custom reading experience.