DSpace Repository

Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and Its Defense

Show simple item record

dc.contributor.author Gupta, Shashank
dc.date.accessioned 2024-11-11T07:01:51Z
dc.date.available 2024-11-11T07:01:51Z
dc.date.issued 2015-07
dc.identifier.uri https://www.tandfonline.com/doi/abs/10.1080/15536548.2015.1044865
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16311
dc.description.abstract Today cyber physical systems (CPS) facilitate physical world devices to integrate with several Internet data sources and services. In the contemporary era of Web 2.0 technologies, web applications are being developed on several advanced technologies (e.g., AJAX, JavaScript, Flash, ASP.net). However, due to the frequent usage in daily life, web applications are constantly under attack. Cross-site scripting (XSS) attacks are presently the most exploited security problems in the modern web applications. XSS attacks are generally caused by the improper sanitization of user-supplied input on the applications. These attacked use vulnerabilities in the source code, resulting in serious consequences such as stealing of session-identifications embedded in cookies, passwords, credit card numbers, and several other related personal credentials. This article describes a three-fold approach: 1) testing the vulnerabilities of XSS attack on the local host server Apache Tomcat by utilizing the malicious scripts from XSS cheat sheet website; 2) exploiting the same vulnerabilities on Web Goat; and 3) exploiting encoded versions of the injected scripts for testing the level of XSS attack prevention capability. Based on the observed results, further work is also discussed. en_US
dc.language.iso en en_US
dc.publisher Taylor & Francis en_US
dc.subject Computer Science en_US
dc.subject Cyber physical systems (CPS) en_US
dc.subject Cross-Site Scripting (XSS) en_US
dc.subject Web 2.0 technologies en_US
dc.title Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and Its Defense en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account