Skip main navigation

New offer! Get 30% off one whole year of Unlimited learning. Subscribe for just £249.99 £174.99. New subscribers only T&Cs apply

Find out more

Threat Analysis: What Damage Can Be Done by Targeting XSS?

In this video, Paulo Silva will explain more about how hackers target XSS and the damage they can do.
6
Let’s put things simply regarding XSS attack vectors. You just have to focus on user controlled data, regardless its source. URL parameters and form data may be the first things to come to your mind, but there’s a lot more. You should realize that users control the HTTP request, and so request headers and cookies may also be sources of hostile data. Browser’s local storage is another typical attack vector since malicious actors may be able to tamper with it. If your application expects file uploads such as photos, and then you’re reading the photo’s metadata, then it can also be used as an attack vector. Finally, a less obvious source of hostile data– external services.
53.8
If the application retrieves data from other services, for example, by means of APIs, malicious actors may decide to go after those third party services, indirectly compromising your application. Any data source is a potential attack vector. Keep in mind that attackers will be able to execute code remotely on victims’ browsers. The first thing attackers will look for is session tokens. If they can exfiltrate such token from a victim’s browser, chances are they will be able to use it in another browser to impersonate the victim. This is called session highjacking.
91.8
Even if session hijacking is not possible, attackers will be able to use JavaScript to automate tasks to scrape user data from the DOM or to do some actions on victim’s behalf, such as fraudulent transactions. Being able to execute code remotely in specific pages, such as the login page, may give attackers access to credentials. There are other techniques to trick the browser and password managers to leak credentials. Among other impacts, attackers will always be able to exploit the trust relationship between the victim and the website owner, driving the former to download and install malware. Technical skills are required to identify and exploit the cross site scripting vulnerability.
134.7
Nevertheless, there are automated tools to assist this task and plenty of information about the subject. Threat agents may be after specific victims. Targeting an application administrator may allow attackers to gain control over a privileged account and access sensitive data or shut down the system. On the other hand, attackers may be interested in a particular individual, let’s say a VIP. If your application manages sensitive data, such as health records, the XSS exploitation may give attackers access to sensitive information regarding that individual. XSS can also be used for widespread attacks. It happened already in the past, creating a worm effect.
179.7
To identify threats agents, consider who may wants to gain control over your application, and how sensitive is the information your application manages, and who may want to access it. You’ll find this table in the OWASP Top 10. Pause the video and take your time to carefully read it. In the next part, we will exploit XSS on our intentionally vulnerable application.

In this video, you will learn more about how hackers target XSS.

In the previous step, you learned what XSS is and then read the OWASP page on XSS. Now you will learn more about how hackers target XSS and the damage they can do.

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now