Skip to Content
Practical Web Penetration Testing
book

Practical Web Penetration Testing

by Gus Khawaja
June 2018
Intermediate to advanced
294 pages
7h 5m
English
Packt Publishing
Content preview from Practical Web Penetration Testing

Second case – Reflected XSS

The tester was able to inject JavaScript into the URL parameter, and the browser executed the script:

  • AV:N: The hacker will connect through a network to execute the attack.
  • AC:L: The complexity is very low; the hacker tested the JavaScript on all browsers, and it worked.
  • PR:N: No privilege is required.
  • UI:N: The victim needs to click on a link through a social engineering attack.
  • S:C: The scope is not the web server only; the victim browser is impacted, as well.
  • C:L: Since the HttpOnly flag is set, the confidentiality impact is low, because the attacker has not accessed sufficient cookie data to hijack the victim's session.
  • I:L: The hacker can probably change the data only in the victim's browser context.
  • A:N ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands-On Web Penetration Testing with Metasploit

Hands-On Web Penetration Testing with Metasploit

Harpreet Singh, Himanshu Sharma
Penetration Testing

Penetration Testing

Georgia Weidman

Publisher Resources

ISBN: 9781788624039Supplemental Content