<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mihara</id>
	<title>ICO wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mihara"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php/Special:Contributions/Mihara"/>
	<updated>2026-05-06T00:09:31Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Category:I802_Firewalls_and_VPN_IPSec_(2017)&amp;diff=124310</id>
		<title>Category:I802 Firewalls and VPN IPSec (2017)</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Category:I802_Firewalls_and_VPN_IPSec_(2017)&amp;diff=124310"/>
		<updated>2017-09-20T07:08:48Z</updated>

		<summary type="html">&lt;p&gt;Mihara: /* Services */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Firewalls and VPN/IPSec=&lt;br /&gt;
&lt;br /&gt;
==General information==&lt;br /&gt;
&lt;br /&gt;
ECTS: 4&lt;br /&gt;
&lt;br /&gt;
Lecturer: Lauri Võsandi&lt;br /&gt;
&lt;br /&gt;
To register to this course send your SSH public key to Lauri and state which service you want to configure.&lt;br /&gt;
&lt;br /&gt;
==Scenario==&lt;br /&gt;
&lt;br /&gt;
In this course we will attempt to set up a network similar to a corporate network with multiple offices, eg http://docplayer.it/docs-images/20/596222/images/25-0.png&lt;br /&gt;
&lt;br /&gt;
Our virtual company&#039;s story is based on [http://futurama.wikia.com/wiki/MomCorp Mom&#039;s Friendly Robot Company].&lt;br /&gt;
&lt;br /&gt;
We will use VPN software to connect subnets to each other and we will use VPN software to connect our personal computers to the intranet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Hardware==&lt;br /&gt;
&lt;br /&gt;
School&#039;s infra provides with public subnet for 62 hosts:&lt;br /&gt;
&lt;br /&gt;
* IPv4 address: 193.40.244.129-188&lt;br /&gt;
* Subnet: /26&lt;br /&gt;
* Gateway: 193.40.244.188&lt;br /&gt;
* DNS: 8.8.8.8&lt;br /&gt;
&lt;br /&gt;
That network is physically routed to 413-6-16 port in room 413.&lt;br /&gt;
&lt;br /&gt;
We have total of about 264GB of RAM and couple of terabytes of SSD storage:&lt;br /&gt;
&lt;br /&gt;
* Marek&#039;s box HP Proliant G5 2x quadcore Xeon, 64G RAM, 2 NIC-s (hosts 130-139)&lt;br /&gt;
* Madis&#039; box HP Proliant G5, 4x quadcore Opteron, 64GB RAM, 2 NIC-s (hosts 140-149)&lt;br /&gt;
* Erik&#039;s box Sun 32GB, 2x 256GB SSD (hosts 155-159)&lt;br /&gt;
* Lauri&#039;s box HP Proliant G5 2x quadcore Xeon, 64G RAM, 2 NIC-s, 4x 250G SSD (hosts 160-179)&lt;br /&gt;
* Frank&#039;s box DELL 16GB, 2x 256GB SSD, 6 NIC (hosts 180-185)&lt;br /&gt;
* Another Sun box with 24G of RAM, dying harddisks&lt;br /&gt;
&lt;br /&gt;
NB! Replace BIOS batteries; replace thermal paste&lt;br /&gt;
&lt;br /&gt;
==Grading==&lt;br /&gt;
&lt;br /&gt;
If you don&#039;t know what to do pick a topic from the services list below.&lt;br /&gt;
Send your SSH public key to Lauri and state which service you want to take care of.&lt;br /&gt;
&lt;br /&gt;
Collect 100p in total to pass the course, note that there are opportunities to collect much more points in total:&lt;br /&gt;
&lt;br /&gt;
* Get the service up and running (15p)&lt;br /&gt;
* Configure Let&#039;s Encrypt certificates for your service if applicable (15p)&lt;br /&gt;
* Add your service to monitoring at mon.momcorp.eu (15p)&lt;br /&gt;
* Enable log forwarding to log.momcorp.eu, if applicable configure auditing for your service (15p)&lt;br /&gt;
* Configure your service to send e-mails (mail.momcorp.eu) if applicable (15p)&lt;br /&gt;
* Keep the service up and running through the semester (up to -20p)&lt;br /&gt;
* Keep the bad guys out from your servers (up to -30p)&lt;br /&gt;
* Have a disaster recovery plan (up to -20p)&lt;br /&gt;
* Configure layer3 firewall (15p)&lt;br /&gt;
* Configure application firewall(s) if applicable&lt;br /&gt;
* Configure your laptop to connect to intranet using OpenVPN and IPSec (15p)&lt;br /&gt;
* Configure your mobile device to connect to intranet using OpenVPN or IPSec (15p)&lt;br /&gt;
* Configure your service to use authentication from AD (20p)&lt;br /&gt;
&lt;br /&gt;
We will start with services facing the public internet, see what&#039;s the worst that can happen in that case and later migrate some services to intranet only. Some services will retain connectivity to public internet due to their nature (eg OwnCloud, mailserver) and some services will be available only in the intranet (eg fileserver)&lt;br /&gt;
&lt;br /&gt;
==Services==&lt;br /&gt;
&lt;br /&gt;
To support our virtual company in everyday business we need to provide them with a variety of services:&lt;br /&gt;
&lt;br /&gt;
* www.momcorp.eu - Install webserver/load balancer and create a homepage for the company and link to remaining sites. Olusiji&lt;br /&gt;
* shop.momcorp.eu - Install Magento and add some fictive products like dark matter and neutron star. Sander&lt;br /&gt;
* wiki.momcorp.eu - Install MediaWiki, later integrate with AD. Peep&lt;br /&gt;
* blog.momcorp.eu - Install WordPress, later integrate with AD. Steven&lt;br /&gt;
* chat.momcorp.eu - Install IRC server, provide  multiple channels for developers. Install some web based software for customer helldesk. Ardi&lt;br /&gt;
* ns1.momcorp.eu - Primary Bind9 installation, later also add DNSSEC. Erik J&lt;br /&gt;
* ns2.momcorp.eu - Secondary Bind9 installation in another physical host. ???&lt;br /&gt;
* git.momcorp.eu - Gogs installation. ???&lt;br /&gt;
* mon.momcorp.eu - Nagios monitoring. Nika&lt;br /&gt;
* mail.momcorp.eu - Mailserver with Postfix (postfw, greylisting, dkim, spf, setup secondary mx), later with AD integration if exchange won&#039;t be used. Andris&lt;br /&gt;
* ca.momcorp.eu - Java servlet container, EJBCA installation for certificate management. Masaki&lt;br /&gt;
* nas.momcorp.eu - Samba fileserver. Hindrek&lt;br /&gt;
* log.momcorp.eu - Graylog or similar for central logging. Kaspar, Sten-Erik&lt;br /&gt;
* vpn.momcorp.eu - OpenVPN gateway. Moira&lt;br /&gt;
* cs.momcorp.eu - Teamspeak and/or gaming server for entertainment. Christopher&lt;br /&gt;
&lt;br /&gt;
Additionally for each physical box listed under Hardware we could set up:&lt;br /&gt;
&lt;br /&gt;
* Person responsible for the hypervisor on that box&lt;br /&gt;
* Virtual machine with router OS - Mikrotik RouterOS, Vyatta, pfsense or just vanilla Debian with shell scripts&lt;br /&gt;
&lt;br /&gt;
Other topics:&lt;br /&gt;
&lt;br /&gt;
* Mikus - Remote management: Puppet master, DSC, postfix with kerberos (and AD?)&lt;br /&gt;
* Strongswan gateway&lt;br /&gt;
* OpenVPN gateway, later AD integration&lt;br /&gt;
* Exchange&lt;br /&gt;
* failover/high availability (heartbeat)&lt;br /&gt;
* db clusters/shards/replication (mysql/mariadb)&lt;br /&gt;
* clustered filesystems/servers (clvm, corosync, fenced, gfs)&lt;br /&gt;
* web caches (varnish, squid, nginx)&lt;br /&gt;
* load balancing (haproxy, nginx, simple roundrobin)&lt;br /&gt;
&lt;br /&gt;
==Lectures==&lt;br /&gt;
&lt;br /&gt;
Following lectures are planned:&lt;br /&gt;
&lt;br /&gt;
* 7. sept - Intro, virtualization, containers etc. Relevant story [https://lauri.xn--vsandi-pxa.com/lan/virtualization.html here]&lt;br /&gt;
* 14. sept - Network topology, bridges, tagging, trunking, subnetting, LAN, WAN&lt;br /&gt;
* 21. sept - iptables, ebtables, packet forwarding, DNAT, SNAT, routing tables&lt;br /&gt;
* 28. sept - X.509 certificates, certificate authority, TLS, symmetric, asymmetric, keyexchange, Let&#039;s Encrypt, relevant slides [https://docs.google.com/presentation/d/1kqTyhhUu5CfwODmOTIC7odhlYfeEeJALTd4RX7XhPLE/edit?usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
Order to be determined:&lt;br /&gt;
&lt;br /&gt;
* OpenVPN&lt;br /&gt;
* IPSec&lt;br /&gt;
* TBD, there are a lot of topics to discuss&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Category:I802_Firewalls_and_VPN_IPSec_(2017)&amp;diff=124156</id>
		<title>Category:I802 Firewalls and VPN IPSec (2017)</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Category:I802_Firewalls_and_VPN_IPSec_(2017)&amp;diff=124156"/>
		<updated>2017-09-13T07:18:28Z</updated>

		<summary type="html">&lt;p&gt;Mihara: /* Services */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Firewalls and VPN/IPSec=&lt;br /&gt;
&lt;br /&gt;
==General information==&lt;br /&gt;
&lt;br /&gt;
ECTS: 4&lt;br /&gt;
&lt;br /&gt;
Lecturer: Lauri Võsandi&lt;br /&gt;
&lt;br /&gt;
To register to this course send your SSH public key to Lauri and state which service you want to configure.&lt;br /&gt;
&lt;br /&gt;
==Scenario==&lt;br /&gt;
&lt;br /&gt;
In this course we will attempt to set up a network similar to a corporate network with multiple offices, eg http://docplayer.it/docs-images/20/596222/images/25-0.png&lt;br /&gt;
&lt;br /&gt;
Our virtual company&#039;s story is based on [http://futurama.wikia.com/wiki/MomCorp Mom&#039;s Friendly Robot Company].&lt;br /&gt;
&lt;br /&gt;
We will use VPN software to connect subnets to each other and we will use VPN software to connect our personal computers to the intranet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Hardware==&lt;br /&gt;
&lt;br /&gt;
We have total of about 264GB of RAM and couple of terabytes of SSD storage:&lt;br /&gt;
&lt;br /&gt;
* Erik&#039;s box Sun 32GB, 2x 256GB SSD&lt;br /&gt;
* Frank&#039;s box DELL 16GB, 2x 256GB SSD, 6 NIC&lt;br /&gt;
* Madis&#039; box HP Proliant G5, 4x quadcore Opteron, 64GB RAM, 2 NIC-s&lt;br /&gt;
* Marek&#039;s box HP Proliant G5 2x quadcore Xeon, 64G RAM, 2 NIC-s&lt;br /&gt;
* Lauri&#039;s box HP Proliant G5 2x quadcore Xeon, 64G RAM, 2 NIC-s, 4x 250G SSD&lt;br /&gt;
* Another Sun box with 24G of RAM, dying harddisks&lt;br /&gt;
&lt;br /&gt;
NB! Replace BIOS batteries; replace thermal paste&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Grading==&lt;br /&gt;
&lt;br /&gt;
If you don&#039;t know what to do pick a topic from the services list below.&lt;br /&gt;
Send your SSH public key to Lauri and state which service you want to take care of.&lt;br /&gt;
&lt;br /&gt;
Collect 100p in total to pass the course, note that there are opportunities to collect much more points in total:&lt;br /&gt;
&lt;br /&gt;
* Get the service up and running (15p)&lt;br /&gt;
* Configure Let&#039;s Encrypt certificates for your service if applicable (15p)&lt;br /&gt;
* Add your service to monitoring at mon.momcorp.eu (15p)&lt;br /&gt;
* Enable log forwarding to log.momcorp.eu (15p)&lt;br /&gt;
* Configure your service to send e-mails (mail.momcorp.eu) if applicable (15p)&lt;br /&gt;
* Keep the service up and running through the semester (up to -20p)&lt;br /&gt;
* Keep the bad guys out from your servers (up to -30p)&lt;br /&gt;
* Have a disaster recovery plan (up to -20p)&lt;br /&gt;
* Configure layer3 firewall (15p)&lt;br /&gt;
* Configure application firewall(s) if applicable&lt;br /&gt;
* Configure your laptop to connect to intranet using OpenVPN and IPSec (15p)&lt;br /&gt;
* Configure your mobile device to connect to intranet using OpenVPN or IPSec (15p)&lt;br /&gt;
* Configure your service to use authentication from AD (20p)&lt;br /&gt;
&lt;br /&gt;
==Services==&lt;br /&gt;
&lt;br /&gt;
To support our virtual company in everyday business we need to provide them with a variety of services:&lt;br /&gt;
&lt;br /&gt;
* www.momcorp.eu - Install webserver/load balancer and create a homepage for the company and link to remaining sites. Olusiji&lt;br /&gt;
* shop.momcorp.eu - Install Magento and add some fictive products like dark matter and neutron star. ???&lt;br /&gt;
* wiki.momcorp.eu - Install MediaWiki, later integrate with AD. Peep&lt;br /&gt;
* blog.momcorp.eu - Install WordPress, later integrate with AD. Steven&lt;br /&gt;
* chat.momcorp.eu - Install IRC server, provide  multiple channels for developers. Install some web based software for customer helldesk. Ardi&lt;br /&gt;
* ns1.momcorp.eu - Primary Bind9 installation, later also add DNSSEC. Erik&lt;br /&gt;
* ns2.momcorp.eu - Secondary Bind9 installation in another physical host. ???&lt;br /&gt;
* git.momcorp.eu - Gogs installation. ???&lt;br /&gt;
* mon.momcorp.eu - Nagios monitoring. Nika&lt;br /&gt;
* mail.momcorp.eu - Mailserver with Postfix (postfw, greylisting, dkim, spf, setup secondary mx), later with AD integration if exchange won&#039;t be used. Andris&lt;br /&gt;
* ca.momcorp.eu - Java servlet container, EJBCA installation for certificate management. ???&lt;br /&gt;
* nas.momcorp.eu - Samba fileserver. Hindrek&lt;br /&gt;
* log.momcorp.eu - Graylog or similar for central logging. Masaki&lt;br /&gt;
* vpn.momcorp.eu - OpenVPN gateway. Moira&lt;br /&gt;
&lt;br /&gt;
Additionally for each physical box listed under Hardware we could set up:&lt;br /&gt;
&lt;br /&gt;
* Person responsible for the hypervisor on that box&lt;br /&gt;
* Virtual machine with router OS - Mikrotik RouterOS, Vyatta, pfsense or just vanilla Debian with shell scripts&lt;br /&gt;
&lt;br /&gt;
Other topics:&lt;br /&gt;
&lt;br /&gt;
* Mikus - Remote management: Puppet master, DSC, postfix with kerberos (and AD?)&lt;br /&gt;
* Christopher - Teamspeak or game server (quake3? openarena? doom, quake, openttd), if relevant later AD integration&lt;br /&gt;
* Strongswan gateway&lt;br /&gt;
* OpenVPN gateway, later AD integration&lt;br /&gt;
* Exchange&lt;br /&gt;
* failover/high availability (heartbeat)&lt;br /&gt;
* db clusters/shards/replication (mysql/mariadb)&lt;br /&gt;
* clustered filesystems/servers (clvm, corosync, fenced, gfs)&lt;br /&gt;
* web caches (varnish, squid, nginx)&lt;br /&gt;
* load balancing (haproxy, nginx, simple roundrobin)&lt;br /&gt;
&lt;br /&gt;
==Lectures==&lt;br /&gt;
&lt;br /&gt;
Following lectures are planned:&lt;br /&gt;
&lt;br /&gt;
7. sept - Intro, virtualization, containers etc. Relevant story [https://lauri.xn--vsandi-pxa.com/lan/virtualization.html here]&lt;br /&gt;
14. sept - Network topology&lt;br /&gt;
&lt;br /&gt;
Order to be determined:&lt;br /&gt;
&lt;br /&gt;
* iptables, ebtables, route&lt;br /&gt;
* X.509 certificates, TLS, symmetric, asymmetric, keyexchange, relevant slides [https://docs.google.com/presentation/d/1kqTyhhUu5CfwODmOTIC7odhlYfeEeJALTd4RX7XhPLE/edit?usp=sharing here]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Cross-Site_Scripting_(XSS)_attacks&amp;diff=120419</id>
		<title>Cross-Site Scripting (XSS) attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Cross-Site_Scripting_(XSS)_attacks&amp;diff=120419"/>
		<updated>2017-04-24T11:33:33Z</updated>

		<summary type="html">&lt;p&gt;Mihara: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;br /&gt;
&lt;br /&gt;
== Prevention ==&lt;br /&gt;
Although it is said that preventing XSS attacks for 100% sure is not feasible as there is always weird ways to bypass otherwise override security implementations, basic input &amp;amp; output filtering should prevent the majority of attack attempts. Since the most common XSS attacks works on the security holes in HTTP query parameters or HTML form submission, it is necessary to properly filter out unexpected user data input &amp;amp; output by whitelisting the data types. The sanitation should not overlook encoded format of HTML as well. Encoding input and output is also effectively helps to prevent XSS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Details =&lt;br /&gt;
Author: Masaki Ihara &amp;lt;br/&amp;gt;&lt;br /&gt;
Curriculum: Cyber Security Engineering &amp;lt;br/&amp;gt;&lt;br /&gt;
Group: C11 &amp;lt;br/&amp;gt;&lt;br /&gt;
Date created: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
Last modification: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
&lt;br /&gt;
[https://doc.lagout.org/security/Cross%20Site%20Scripting%20Attacks%20Xss%20Exploits%20and%20Defense.pdf Cross Site Scripting Attacks Xss Exploits and Defense]&lt;br /&gt;
&lt;br /&gt;
[https://www.acunetix.com/websitesecurity/cross-site-scripting/ acunetix: cross-site-scripting]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) Cross-site Scripting (XSS) - OWASP]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Cross-Site_Scripting_(XSS)_attacks&amp;diff=120418</id>
		<title>Cross-Site Scripting (XSS) attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Cross-Site_Scripting_(XSS)_attacks&amp;diff=120418"/>
		<updated>2017-04-24T11:31:36Z</updated>

		<summary type="html">&lt;p&gt;Mihara: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;br /&gt;
&lt;br /&gt;
== Prevention ==&lt;br /&gt;
Although it is said that preventing XSS attacks for 100% sure is not feasible as there is always weird ways to bypass otherwise override security implementations, basic input &amp;amp; output filtering should prevent the majority of attack attempts. Since the most common XSS attacks works on the security holes in HTTP query parameters or HTML form submission, it is necessary to properly filter out unexpected user data input &amp;amp; output by whitelisting the data types. The sanitation should not overlook encoded format of HTML as well. Encoding input and output is also effectively helps to prevent XSS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Details =&lt;br /&gt;
Author: Masaki Ihara &amp;lt;br/&amp;gt;&lt;br /&gt;
Curriculum: Cyber Security Engineering &amp;lt;br/&amp;gt;&lt;br /&gt;
Group: C11 &amp;lt;br/&amp;gt;&lt;br /&gt;
Date created: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
Last modification: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
&lt;br /&gt;
[https://doc.lagout.org/security/Cross%20Site%20Scripting%20Attacks%20Xss%20Exploits%20and%20Defense.pdf Cross Site Scripting Attacks Xss Exploits and Defense]&lt;br /&gt;
&lt;br /&gt;
[https://www.acunetix.com/websitesecurity/cross-site-scripting/ acunetix: cross-site-scripting]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=120417</id>
		<title>OSadmin wiki article</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=120417"/>
		<updated>2017-04-24T11:30:32Z</updated>

		<summary type="html">&lt;p&gt;Mihara: /* Chosen topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Intro=&lt;br /&gt;
*Choose a topic from personal experience related with the subject or from topics found on the wiki page&lt;br /&gt;
*[[#Chosen_topics|Write the topic here]].&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
*Inform the [[Operating_systems#Lecturer|lecturer]] when the article is finished&lt;br /&gt;
*Receive feedback for corrections&lt;br /&gt;
&lt;br /&gt;
=Requirements for the wiki article=&lt;br /&gt;
Author: name, group and date when the article is written&lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Covers points what will be discussed in the article, what are the requirements for the article reader; what are the operating system’s requirements. &lt;br /&gt;
&lt;br /&gt;
==Contents==&lt;br /&gt;
All commands should be easily separable from the overall text. &lt;br /&gt;
Users should be able to copy the commands directly (additional info like prompt and user distinction symbols should be left out from the command description area)&lt;br /&gt;
The text should determine what user permissions are needed to perform these tasks. &lt;br /&gt;
The reader of your article is your fellow students, so try to avoid irrelevant information and stay on topic (don’t explain the meaning of IP address or how to install Ubuntu, when your topic is actually about htop)&lt;br /&gt;
All the content should be referenced. &lt;br /&gt;
Do not use slang and try to be grammatically correct.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bear in mind that this is an open environment, so everything you write in your wiki article, will be public. &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Referencing==&lt;br /&gt;
Best practises of wiki referencing should be used. &lt;br /&gt;
Terms are but between square brackets to reference other articles in the system.&lt;br /&gt;
All drawing and images have to be referenced below the picture and in the text. (for example “System architecture can be viewed on image x, y and z.”)&lt;br /&gt;
Author’s own ideas have to be clearly presentable. Everything used from the sources have to be referenced. &lt;br /&gt;
&lt;br /&gt;
==Fellow student review==&lt;br /&gt;
Please find a fellow student who will review your article and give a feedback on the discussion tab of the article using [http://enos.itcollege.ee/~edmund/materials/viki-artikkel/Assessment-model-for-the-wiki-article.html the following assessment model].&lt;br /&gt;
&lt;br /&gt;
==Summary==&lt;br /&gt;
Besides a short overview, what was discussed in this article, it should also include the author&#039;s own opinion about the topic. &lt;br /&gt;
&lt;br /&gt;
==Category==&lt;br /&gt;
Add the following category to the end of the article (last row):&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=Chosen topics=&lt;br /&gt;
Please write here your topic and name, group:&lt;br /&gt;
* &#039;&#039;&#039;Fedora OS&#039;&#039;&#039;; Anamul Hoque Shihab; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Basic Automation with Python&#039;&#039;&#039;; Ardi Vaba; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;SSH Encryption&#039;&#039;&#039;; Frank Korving; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Translation of OSadmin wiki help page to English [[https://wiki.itcollege.ee/index.php/Osadmin_spikker]]&#039;&#039;&#039;; Peep Kuulme; CSE-11&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Cross-Site_Scripting_(XSS)_attacks &#039;&#039;&#039;Cross-Site Scripting&#039;&#039;&#039;]; Masaki Ihara; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/Auditd &#039;&#039;&#039;Auditd - Linux system monitoring with audit daemon&#039;&#039;&#039;], Nika Ptskialadze, CSE-11&lt;br /&gt;
* &#039;&#039;&#039;GNU Privacy Guard (GnuPG)&#039;&#039;&#039;; Patricia Bruno Barbosa; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;BackBox OS&#039;&#039;&#039;; Ats Tootsi; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/creating_malware_lab &#039;&#039;&#039;How to create your own malware analysis lab&#039;&#039;&#039;], Mikus, CSE-11&lt;br /&gt;
*&#039;&#039;&#039;&#039;Arch Linux&#039;&#039;&#039;&#039;;Farhan Nayeem Islam;CSE-C11&lt;br /&gt;
* &#039;&#039;&#039;&#039;VPN basics&#039;&#039;&#039;&#039;, Christian Cataldo, CSE-C11; [https://wiki.itcollege.ee/index.php/VPN_(English_version)]&lt;br /&gt;
* &#039;&#039;Translation of DDoS Wiki page[[https://wiki.itcollege.ee/index.php/DDoS_Eng]]&#039;&#039;&#039;; Andris Männik; CSE-11&lt;br /&gt;
*&#039;&#039;&#039;Translation of Ps Wiki page[[https://wiki.itcollege.ee/index.php/Ps]]&#039;&#039;&#039;&#039;&#039;; Christopher Carr; CSE-11&lt;br /&gt;
*&#039;&#039;&#039;Translation of Bash_Shell wiki page[[https://wiki.itcollege.ee/index.php/BASH_shell]]&#039;&#039;&#039;; Steven Rugam; CSE-11&lt;br /&gt;
*&#039;&#039;&#039;Pass: The Standard Unix Password Manager&#039;&#039;&#039;; Oliver Rahula; CSE-11&lt;br /&gt;
==Ideas==&lt;br /&gt;
* UNIX CLI password manager https://www.passwordstore.org and its GUI http://qtpass.org/&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Osadmin_referaadi_teemad counterpart article in Estonian]&lt;br /&gt;
* http://manpage.io&lt;br /&gt;
* https://linuxjourney.com/&lt;br /&gt;
* [https://linux.die.net/man/ Linux man-pages]&lt;br /&gt;
* [https://linux.die.net Linux docs]&lt;br /&gt;
* http://www.tecmint.com/60-commands-of-linux-a-guide-from-newbies-to-system-administrator/&lt;br /&gt;
* http://www.tecmint.com/useful-linux-commands-for-system-administrators/&lt;br /&gt;
* http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html&lt;br /&gt;
* http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120416</id>
		<title>User:Mihara</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120416"/>
		<updated>2017-04-24T11:27:02Z</updated>

		<summary type="html">&lt;p&gt;Mihara: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=XSS_Attack_Vectors&amp;diff=120415</id>
		<title>XSS Attack Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=XSS_Attack_Vectors&amp;diff=120415"/>
		<updated>2017-04-24T11:26:19Z</updated>

		<summary type="html">&lt;p&gt;Mihara: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Cross-Site_Scripting_(XSS)_attacks&amp;diff=120414</id>
		<title>Cross-Site Scripting (XSS) attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Cross-Site_Scripting_(XSS)_attacks&amp;diff=120414"/>
		<updated>2017-04-24T11:20:14Z</updated>

		<summary type="html">&lt;p&gt;Mihara: Created page with &amp;quot;Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web appli...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;br /&gt;
&lt;br /&gt;
== Prevention ==&lt;br /&gt;
Although it is said that preventing XSS attacks for 100% sure is not feasible as there is always weird ways to bypass otherwise override security implementations, basic input &amp;amp; output filtering should prevent the majority of attack attempts. Since the most common XSS attacks works on the security holes in HTTP query parameters or HTML form submission, it is necessary to properly filter out unexpected user data input &amp;amp; output by whitelisting the data types. The sanitation should not overlook encoded format of HTML as well. Encoding input and output is also effectively helps to prevent XSS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Details =&lt;br /&gt;
Author: Masaki Ihara &amp;lt;br/&amp;gt;&lt;br /&gt;
Curriculum: Cyber Security Engineering &amp;lt;br/&amp;gt;&lt;br /&gt;
Group: C11 &amp;lt;br/&amp;gt;&lt;br /&gt;
Date created: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
Last modification: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
&lt;br /&gt;
[https://doc.lagout.org/security/Cross%20Site%20Scripting%20Attacks%20Xss%20Exploits%20and%20Defense.pdf Cross Site Scripting Attacks Xss Exploits and Defense]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Auditd acunetix:cross-site-scripting]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=XSS_Attack_Vectors&amp;diff=120413</id>
		<title>XSS Attack Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=XSS_Attack_Vectors&amp;diff=120413"/>
		<updated>2017-04-24T11:18:35Z</updated>

		<summary type="html">&lt;p&gt;Mihara: Created page with &amp;quot; = Cross-Site Scripting (XSS) attacks =  Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attack...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Cross-Site Scripting (XSS) attacks =&lt;br /&gt;
&lt;br /&gt;
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;br /&gt;
&lt;br /&gt;
== Prevention ==&lt;br /&gt;
Although it is said that preventing XSS attacks for 100% sure is not feasible as there is always weird ways to bypass otherwise override security implementations, basic input &amp;amp; output filtering should prevent the majority of attack attempts. Since the most common XSS attacks works on the security holes in HTTP query parameters or HTML form submission, it is necessary to properly filter out unexpected user data input &amp;amp; output by whitelisting the data types. The sanitation should not overlook encoded format of HTML as well. Encoding input and output is also effectively helps to prevent XSS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Details =&lt;br /&gt;
Author: Masaki Ihara &amp;lt;br/&amp;gt;&lt;br /&gt;
Curriculum: Cyber Security Engineering &amp;lt;br/&amp;gt;&lt;br /&gt;
Group: C11 &amp;lt;br/&amp;gt;&lt;br /&gt;
Date created: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
Last modification: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
&lt;br /&gt;
[https://doc.lagout.org/security/Cross%20Site%20Scripting%20Attacks%20Xss%20Exploits%20and%20Defense.pdf Cross Site Scripting Attacks Xss Exploits and Defense]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Auditd acunetix:cross-site-scripting]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120395</id>
		<title>User:Mihara</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120395"/>
		<updated>2017-04-23T21:12:25Z</updated>

		<summary type="html">&lt;p&gt;Mihara: /* Other Details */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Cross-Site Scripting (XSS) attacks =&lt;br /&gt;
&lt;br /&gt;
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;br /&gt;
&lt;br /&gt;
== Prevention ==&lt;br /&gt;
Although it is said that preventing XSS attacks for 100% sure is not feasible as there is always weird ways to bypass otherwise override security implementations, basic input &amp;amp; output filtering should prevent the majority of attack attempts. Since the most common XSS attacks works on the security holes in HTTP query parameters or HTML form submission, it is necessary to properly filter out unexpected user data input &amp;amp; output by whitelisting the data types. The sanitation should not overlook encoded format of HTML as well. Encoding input and output is also effectively helps to prevent XSS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Details =&lt;br /&gt;
Author: Masaki Ihara &amp;lt;br/&amp;gt;&lt;br /&gt;
Curriculum: Cyber Security Engineering &amp;lt;br/&amp;gt;&lt;br /&gt;
Group: C11 &amp;lt;br/&amp;gt;&lt;br /&gt;
Date created: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
Last modification: April 24, 2017 &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
&lt;br /&gt;
[https://doc.lagout.org/security/Cross%20Site%20Scripting%20Attacks%20Xss%20Exploits%20and%20Defense.pdf Cross Site Scripting Attacks Xss Exploits and Defense]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Auditd acunetix:cross-site-scripting]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120394</id>
		<title>User:Mihara</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120394"/>
		<updated>2017-04-23T21:11:28Z</updated>

		<summary type="html">&lt;p&gt;Mihara: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Cross-Site Scripting (XSS) attacks =&lt;br /&gt;
&lt;br /&gt;
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;br /&gt;
&lt;br /&gt;
== Prevention ==&lt;br /&gt;
Although it is said that preventing XSS attacks for 100% sure is not feasible as there is always weird ways to bypass otherwise override security implementations, basic input &amp;amp; output filtering should prevent the majority of attack attempts. Since the most common XSS attacks works on the security holes in HTTP query parameters or HTML form submission, it is necessary to properly filter out unexpected user data input &amp;amp; output by whitelisting the data types. The sanitation should not overlook encoded format of HTML as well. Encoding input and output is also effectively helps to prevent XSS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Details =&lt;br /&gt;
Author: Masaki Ihara&lt;br /&gt;
Curriculum: Cyber Security Engineering&lt;br /&gt;
Group: C11&lt;br /&gt;
Date created: April 24, 2017&lt;br /&gt;
Last modification: April 24, 2017&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
&lt;br /&gt;
[https://doc.lagout.org/security/Cross%20Site%20Scripting%20Attacks%20Xss%20Exploits%20and%20Defense.pdf Cross Site Scripting Attacks Xss Exploits and Defense]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Auditd acunetix:cross-site-scripting]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120393</id>
		<title>User:Mihara</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120393"/>
		<updated>2017-04-23T21:07:31Z</updated>

		<summary type="html">&lt;p&gt;Mihara: /* Cross-Site Scripting (XSS) attacks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Cross-Site Scripting (XSS) attacks =&lt;br /&gt;
&lt;br /&gt;
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;br /&gt;
&lt;br /&gt;
== Prevention ==&lt;br /&gt;
Although it is said that preventing XSS attacks for 100% sure is not feasible as there is always weird ways to bypass otherwise override security implementations, basic input &amp;amp; output filtering should prevent the majority of attack attempts. Since the most common XSS attacks works on the security holes in HTTP query parameters or HTML form submission, it is necessary to properly filter out unexpected user data input &amp;amp; output by whitelisting the data types. The sanitation should not overlook encoded format of HTML as well. Encoding input and output is also effectively helps to prevent XSS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Details =&lt;br /&gt;
Author: Masaki Ihara&lt;br /&gt;
Curriculum: Cyber Security Engineering&lt;br /&gt;
Group: C11&lt;br /&gt;
Date created: April 24, 2017&lt;br /&gt;
Last modification: April 24, 2017&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
&lt;br /&gt;
[https://doc.lagout.org/security/Cross%20Site%20Scripting%20Attacks%20Xss%20Exploits%20and%20Defense.pdf XSS Attacks]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120392</id>
		<title>User:Mihara</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120392"/>
		<updated>2017-04-23T21:03:15Z</updated>

		<summary type="html">&lt;p&gt;Mihara: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Cross-Site Scripting (XSS) attacks =&lt;br /&gt;
&lt;br /&gt;
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;br /&gt;
&lt;br /&gt;
== Prevention ==&lt;br /&gt;
Although it is said that preventing XSS attacks for 100% sure is not feasible as there is always weird ways to bypass otherwise override security implementations, basic input &amp;amp; output filtering should prevent the majority of attack attempts. Since the most common XSS attacks works on the security holes in HTTP query parameters or HTML form submission, it is necessary to properly filter out unexpected user data input &amp;amp; output by whitelisting the data types. The sanitation should not overlook encoded format of HTML as well. Encoding input and output is also effectively helps to prevent XSS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Details ==&lt;br /&gt;
Author: Masaki Ihara&lt;br /&gt;
Curriculum: Cyber Security Engineering&lt;br /&gt;
Group: C11&lt;br /&gt;
Date created: April 24, 2017&lt;br /&gt;
Last modification: April 24, 2017&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120391</id>
		<title>User:Mihara</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120391"/>
		<updated>2017-04-23T20:59:05Z</updated>

		<summary type="html">&lt;p&gt;Mihara: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Cross-Site Scripting (XSS) attacks ==&lt;br /&gt;
&lt;br /&gt;
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;br /&gt;
&lt;br /&gt;
== Prevention ==&lt;br /&gt;
Although it is said that preventing XSS attacks for 100% sure is not feasible as there is always weird ways to bypass otherwise override security implementations, basic input &amp;amp; output filtering should prevent the majority of attack attempts. Since the most common XSS attacks works on the security holes in HTTP query parameters or HTML form submission, it is necessary to properly filter out unexpected user data input &amp;amp; output by whitelisting the data types. The sanitation should not overlook encoded format of HTML as well. Encoding input and output is also effectively helps to prevent XSS attacks.&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120390</id>
		<title>User:Mihara</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=User:Mihara&amp;diff=120390"/>
		<updated>2017-04-23T20:56:00Z</updated>

		<summary type="html">&lt;p&gt;Mihara: XSS Attack Vectors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Cross-Site Scripting (XSS) attacks ==&lt;br /&gt;
&lt;br /&gt;
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Attack Vectors ==&lt;br /&gt;
&lt;br /&gt;
XSS attacks can be categorised into 3 types.&lt;br /&gt;
&lt;br /&gt;
=== Persistent XSS (Stored XSS) ===&lt;br /&gt;
&lt;br /&gt;
The most devastating variant of XSS is Persistent XSS also known as Stored XSS. Persistent XSS attacks involves an attacker injecting a malicious payload that is permanently stored (thus called persistent) on the target application such as within a database. The classic example of stored XSS is a malicious script inserted by an attacker in a comment field on a blog or in a forum post.&lt;br /&gt;
When a victim navigates to the affected web page in a browser, the XSS payload will be served as part of the web page. This means that victims will inadvertently end-up executing the malicious script once the page is viewed in a browser.&lt;br /&gt;
&lt;br /&gt;
=== Non-Persistent XSS (Reflected XSS) ===&lt;br /&gt;
By far most common type is Non-Persistent XSS also know as Reflected XSS. In Reflected XSS, the attacker’s payload script has to be part of the request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request. Using Phishing emails and other social engineering techniques, the attacker lures the victim to inadvertently make a request to the server which contains the XSS payload and ends-up executing the script that gets reflected and executed inside the browser. Since Reflected XSS isn’t a persistent attack, the attacker needs to deliver the payload to each victim – social networks are often conveniently used for the dissemination of Reflected XSS attacks.&lt;br /&gt;
&lt;br /&gt;
=== DOM-Based XSS ===&lt;br /&gt;
DOM-based XSS is an unique and advanced form of XSS attack used very similarly to Non-Persistent XSS. This is made possible when the web application’s client side scripts write user provided data to the Document Object Model (DOM). The data is subsequently read from the DOM by the web application and outputted to the browser. If the data is incorrectly handled, an attacker can inject a payload, which will be stored as part of the DOM and executed when the data is read back from the DOM. Also since the payload is embedded into DOM element, usually users cannot see the payload on the response unless user investigate the DOM element.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XSS vulnerability ==&lt;br /&gt;
&lt;br /&gt;
XSS vulnerabilities are amongst the most widespread web application vulnerabilities on the Internet. The vulnerabilities exist due to several facts from very basic coding errors by web developers to environmental issues such as the browser itself is not secure by design; it was created to merely make requests and process the results. Although there can be many issues which allow XSS attacks to be performed, improper data input &amp;amp; output management is the most likely the biggest issue on the web pages.&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=118478</id>
		<title>OSadmin wiki article</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=118478"/>
		<updated>2017-03-11T17:15:02Z</updated>

		<summary type="html">&lt;p&gt;Mihara: /* Chosen topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Intro=&lt;br /&gt;
*Choose a topic from personal experience related with the subject or from topics found on the wiki page&lt;br /&gt;
*[[#Chosen_topics|Write the topic here]].&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
*Inform the [[Operating_systems#Lecturer|lecturer]] when the article is finished&lt;br /&gt;
*Receive feedback for corrections&lt;br /&gt;
&lt;br /&gt;
=Requirements for the wiki article=&lt;br /&gt;
Author: name, group and date when the article is written&lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Covers points what will be discussed in the article, what are the requirements for the article reader; what are the operating system’s requirements. &lt;br /&gt;
&lt;br /&gt;
==Contents==&lt;br /&gt;
All commands should be easily separable from the overall text. &lt;br /&gt;
Users should be able to copy the commands directly (additional info like prompt and user distinction symbols should be left out from the command description area)&lt;br /&gt;
The text should determine what user permissions are needed to perform these tasks. &lt;br /&gt;
The reader of your article is your fellow students, so try to avoid irrelevant information and stay on topic (don’t explain the meaning of IP address or how to install Ubuntu, when your topic is actually about htop)&lt;br /&gt;
All the content should be referenced. &lt;br /&gt;
Do not use slang and try to be grammatically correct.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bear in mind that this is an open environment, so everything you write in your wiki article, will be public. &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Referencing==&lt;br /&gt;
Best practises of wiki referencing should be used. &lt;br /&gt;
Terms are but between square brackets to reference other articles in the system.&lt;br /&gt;
All drawing and images have to be referenced below the picture and in the text. (for example “System architecture can be viewed on image x, y and z.”)&lt;br /&gt;
Author’s own ideas have to be clearly presentable. Everything used from the sources have to be referenced. &lt;br /&gt;
&lt;br /&gt;
==Fellow student review==&lt;br /&gt;
Please find a fellow student who will review your article and give a feedback on the discussion tab of the article using [http://enos.itcollege.ee/~edmund/materials/viki-artikkel/Assessment-model-for-the-wiki-article.html the following assessment model].&lt;br /&gt;
&lt;br /&gt;
==Summary==&lt;br /&gt;
Besides a short overview, what was discussed in this article, it should also include the author&#039;s own opinion about the topic. &lt;br /&gt;
&lt;br /&gt;
==Category==&lt;br /&gt;
Add the following category to the end of the article (last row):&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=Chosen topics=&lt;br /&gt;
Please write here your topic and name, group:&lt;br /&gt;
* &#039;&#039;&#039;Basic Automation with Python&#039;&#039;&#039;; Ardi Vaba; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;SSH Encryption&#039;&#039;&#039;; Frank Korving; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Translation of OSadmin wiki help page to English [[https://wiki.itcollege.ee/index.php/Osadmin_spikker]]&#039;&#039;&#039;; Peep Kuulme; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;XSS Attack Vectors&#039;&#039;&#039;; Masaki Ihara; CSE-11&lt;br /&gt;
==Ideas==&lt;br /&gt;
* UNIX CLI password manager https://www.passwordstore.org and its GUI http://qtpass.org/&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Osadmin_referaadi_teemad counterpart article in Estonian]&lt;br /&gt;
* http://manpage.io&lt;br /&gt;
* https://linuxjourney.com/&lt;br /&gt;
* [https://linux.die.net/man/ Linux man-pages]&lt;br /&gt;
* [https://linux.die.net Linux docs]&lt;br /&gt;
* http://www.tecmint.com/60-commands-of-linux-a-guide-from-newbies-to-system-administrator/&lt;br /&gt;
* http://www.tecmint.com/useful-linux-commands-for-system-administrators/&lt;br /&gt;
* http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html&lt;br /&gt;
* http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Mihara</name></author>
	</entry>
</feed>