Question

1) Some people group XSS attacks with XSRF attacks, while others think they should be considered...

1) Some people group XSS attacks with XSRF attacks, while others think they should be considered separate. Make an argument that they are different and do this with an example of an attack under each (illustrating their differences).

2) Suppose I want to do a XSS attack that executes through someone’s brower, but I know the server blacklists the string Dogs as well as the word script. Describe at least two distinct ways to bypass this filter and give me the strings that do so.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

As we know Cross-site request forgery is a type of web attack which destroys the trust of a website in the user’s browser. Furthermore,the attacker manipulates the victim’s browser to send requests in the user’s name to websites that he has visited or are currently visiting, without the victim knowing about these activities happening in the background.

On the other hand xss destroys the trust of the victim’s browser in a web server. While CSRF does not require the presence of a vulnerabiliy, XSS needs a vulnerability in order to be successful.

The two attacks are different and are opposites when it comes to damage, popularity and ease of enacting.

Example: if the victim is an accountant for a small business, making online payments to suppliers and contractors on a daily basis, it is highly likely that the victim’s browser has authentication cookies available for the online payment website or web application. Now Assuming that the attackers already have the knowledge of the online payment web application, they can create legitimate Money transfer requests then trick the victims into visiting the malicious web pages that will manipulate their browser into sending these requests to the online payment system. The end result may be the online payment system transferring funds to the target account.

Ans 2) To avoid the blacklist the use of various filter evasion techniques are required which may seem tivialat first. The naïve blacklist that blocks words or patterns of words can be circumvented by using context-specific encodings that the browser will then decode and interpret as code.

e.g. using JavaScript encoding when the landing space is a JavaScript context.

Alternative forms of JavaScript function calls or property accessors are also useful in getting around the blacklist. Because of the flexibility of HTML and JavaScript, bypassing a blacklist filter can be done with small but informed effort.

Add a comment
Know the answer?
Add Answer to:
1) Some people group XSS attacks with XSRF attacks, while others think they should be considered...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • This last lab teaches you to think and solve problems in the functional programming framework of...

    This last lab teaches you to think and solve problems in the functional programming framework of the Java 8 computation streams. Therefore in this lab, you are absolutely forbidden to use any conditional statements (either if or switch), loops (either for, while or do-while) or even recursion. All computation must be implemented using only computation streams and their operations! In this lab, we also check out the Java NIO framework for better file operations than those offered in the old...

  • C++. Need some help getting started. We will also have the following two functions: 1. A...

    C++. Need some help getting started. We will also have the following two functions: 1. A mutate function that randomly modifies a chromosome. 2. A crossover function that takes two chromosomes and splits each one at the same spot, then combines them together. Our genetic algorithm works by iterating over generations of chromosomes via the following process: 1. Generate random population. 2. Until we get an answer that is good enough, do the next steps in a loop: (a) Do...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT