XSS Attack


Cross-Site Scripting (XSS) is a form of security vulnerability typically found in web applications. XSS Attack enables attackers to inject malicious scripts into the web pages viewed by other users. XSS attacks are one of the most prevalent forms of Web Attack, Accounting for an astonishing 12.75% of all web attacks.

What Is Cross-Site Scripting (XSS) ?

XSS is a security abbreviation for Cross Site Scripting. Prominent sites affected by XSS Attacks in the past include; Twitter, Facebook, MySpace & Youtube. In recent years, XSS vulnerabilities have become one of the most prevalent exploited security vulnerabilities. Approximately 70% of all web vulnerabilities are XSS related.

How Does An XSS Attack Work ?

Step #1 Hackers design a malicious script usually with the purpose of mining user data like usernames, passwords or billing details.

Step #2 Hackers inject the malicious script into a legitimate website, The script acts as a hidden layer to the user, similar to the concept behind an illicit ATM Skimmer.

Step #3 Hackers then receive feedback from the script, successfully harvesting user data.

Types Of XSS Attacks

1. Reflected Attack (Type-II XSS / Non-Persistent XSS): A reflected Attack is where the injected script is reflected off a web server as a request, such as a normal search result, error message or subsequent link. Reflected attacks target users differently, often masquerading in emails or hidden links. The browser executes the code because it came from a ‘trusted’ server.

2. Stored Attack (Type-I XSS / Persistent XSS): A stored Attack is the script that is injected and stored on the target servers, such as in a comment, database or forum. The script may then be executed while a legitimate user is using the site.

XSS Attack Statistics

XSS Attack Statistics


1. Blacklisting & Whitelisting: Two very basic techniques you can use to sanitize incoming data similar to that of parameterized inputs for migrating SQL Injection Attacks; Whitelisting uses a list of approved data, that can only be executed. Whitelisting is the most secure. Blacklisting uses a list of prohibited data to exclude from execution.

2. Application Security: At its core Barricade works like an early warning system against any attempts at breaching the security of your servers. By using attack mitigation products like Barricade you can be a step ahead of the game. Barricade quietly watches in the background and can identify any security threats. In the event, there is any serious activity Barricade notifies you and provide detailed steps needed to solve the situation.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope HACKAGON have provided a healthy knowledge about XSS Attack. So, stay secure and keep learning and if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.

  • Facebook
  • Twitter
  • Google+
  • Linkedin
  • Pinterest


Leave a Reply to Akash Cancel reply

It is main inner container footer text