SYCS TimeTable
SYCS TimeTable
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are
injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses
a web application to send malicious code, generally in the form of a browser side script, to a
different end user. Flaws that allow these attacks to succeed are quite widespread and occur
anywhere a web application uses input from a user within the output it generates without
validating or encoding it.
An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s
browser has no way to know that the script should not be trusted, and will execute the script.
Because it thinks the script came from a trusted source, the malicious script can access any
cookies, session tokens, or other sensitive information retained by the browser and used with
that site. These scripts can even rewrite the content of the HTML page.
Methods to mitigate the XSS vulnerability include:
Educate app and website developers in coding best practices such as proper
HTML/JavaScript escaping/encoding techniques.
Implement code vulnerability testing at the design and development phases, and scan code in
production environments as well.
Take a zero-trust approach to user input data. Separate active browser content from
unvalidated data.
Implement a Content Security Policy that provides for appropriate website defenses against
XSS.
Sniffing attack
A sniffing attack, also known as packet sniffing or network sniffing, is a type of cybersecurity
attack where an attacker intercepts and captures network traffic passing between two or
more devices on a network. The attacker uses a packet sniffer tool to capture the data
packets transmitted over the network, and then analyzes the captured data to extract
sensitive information such as login credentials, credit card numbers, or other confidential
information.
Packet sniffers work by capturing the packets of data that are transmitted over a network,
and then reconstructing the data in a format that is readable by humans or other software.
An attacker can use packet sniffing to intercept and analyze network traffic that is not
encrypted, such as unsecured HTTP web traffic, unencrypted email messages, or FTP file
transfers.
Sniffing attacks can be carried out using both wired and wireless networks, and can be
especially effective in public Wi-Fi networks where data is often transmitted without
encryption
Wireshark is a popular open-source network protocol analyzer used for network
troubleshooting, analysis, and packet sniffing. It is available for various operating
systems, including Windows, macOS, and Linux.
*A. ipconfig:*i internet protocol configuration
Displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)
settings. Used without parameters, ipconfig displays Internet Protocol version 4
(IPv4) and IPv6 addresses, subnet mask, and default gateway for all adapters.
*B. Ping:*
Ping is a computer network administration software utility used to test the reachability
of a host on an Internet Protocol network. It is available for virtually all operating
systems that have networking capability, including most embedded network
administration software
*C. Netstat:*
The network statistics ( netstat ) command is a networking tool used for
troubleshooting and configuration, that can also serve as a monitoring tool for
connections over the network. Both incoming and outgoing connections, routing
tables, port listening, and usage statistics are common uses for this command.
*D. Traceroute:*
Traceroute is a network diagnostic tool used to track in real-time the pathway taken
by a packet on an IP network from source to destination, reporting the IP addresses of
all the routers it pinged in between. Traceroute also records the time taken for each
hop the packet makes during its route to the destination.
Keylogger
Hardware-based keyloggers are physical devices that are attached to the victim's
computer or keyboard to capture keystrokes.
Keylogger attacks can be very effective because they can capture information that is
not protected by encryption, such as passwords typed into a login form or sensitive
information entered into a document or email.
logging.basicConfig(filename=("keylogger.txt"),level=logging.DEBUG,format="%(ascti
me)s_%(message)s")
def on_press(key):
logging.info(str(key))