Figure 12-8: A reflected XSS attack injecting Trojan functionality
Because the URLs in these attacks point to the authentic domain name of the
actual application, with a valid SSL certificate where applicable, they are far
more likely to persuade victims to submit sensitive information than pure
phishing web sites that are hosted on a different domain and merely clone the
content of the targeted web site.
C O M M O N M Y T H
“We’re not worried about any XSS bugs in the
unauthenticated part of our site — they can’t be used to hijack sessions.”
This thought is erroneous for two reasons. First, an XSS bug in the
Do'stlaringiz bilan baham: