INTERNATIONAL JOURNAL OF NOVEL RESEARCH AND DEVELOPMENT International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2456-4184 | Impact factor: 8.76 | ESTD Year: 2016
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.76 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
This paper is supposed to support and encourage application of counseled practices for management systems security. It describes the little print of associate data security attack, named as cross-site scripting, that will be used against management systems and explains practices to mitigate this threat.
Attackers will use cross-site scripting to achieve access to and alter management systems networks. It takes advantage of net servers that come back dynamically generated sites or permit users to post visible content so as to execute discretionary hypertext markup language and active content like JavaScript, ActiveX, and VBScript on a far-off machine browsing the positioning inside the context of a client-server session. This doubtless permits the aggressor to send the web page to a malicious location, hijack the client-server session, interact in network intelligence, and plant backdoor programs.
The consequences of associate XSS attack begin with access to the cookie passed between the victim and therefore the net server. this allows associate aggressor to impersonate the victim to the online website, and is known as session hijacking. the foremost dangerous consequences occur once XSS is employed to take advantage of extra vulnerabilities. These vulnerabilities might allow associate aggressor to not solely steal cookies, however additionally log key strokes, capture screen shots, discover and collect network data, and remotely access and management the victim’s machine. Any information processing system or application that employs user input to come up with web content is also at risk of XSS. These vulnerabilities can become additional serious if associate aggressor will gain the assistance (knowing or unknowing) of associate corporate executive. to boot, attacker’s mistreatment XSS might gather data concerning potential victims before associate attack and use e-mail to focus on them directly.
Keywords:
Application-level web Security, Cross-site scripting, Computer security, Security vulnerabilities, virus and worms.
Cite Article:
"CROSS SITE SCRIPTING(XSS) THE SECURITY VULNERABILITY AND PREVENTIVE MEASURES", International Journal of Novel Research and Development (www.ijnrd.org), ISSN:2456-4184, Vol.7, Issue 5, page no.1124-1129, May-2022, Available :http://www.ijnrd.org/papers/IJNRD2205149.pdf
Downloads:
000118748
ISSN:
2456-4184 | IMPACT FACTOR: 8.76 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.76 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Facebook Twitter Instagram LinkedIn