A cross site scripting attack works in the following manner:

* The attacker identifies a web site that has one or more XSS bugs for example, a web site that echoes the contents of a querystring.
* The attacker crafts a special URL that includes a malformed and malicious querystring containing HTML and scripts such as JavaScript.
* The attacker finds a victim and gets the victim to click on a link that includes the malformed querystring. This could simply be a link to another web page, or a link in an HTML e-mail.
* Once the victim clicks the link, the victim’s browser makes a GET request to the vulnerable server, bypassing the malicious querystring.
* The vulnerable server echoes the malicious querystring back to the victim’s browser, and the browser executes the JavaScript embedded in the response.

Explore More

brb’s uninstaller 2009, Freeware

When brb’s Uninstaller is started, its main window fills with installed applications. Change View type From the uninstaller toolbar you can change the way that the list of applications may

Torrent Poisoning

=== Introduction === The BitTorrent protocol identifies peers using a tracker. Each peer announces itself to the tracker via HTTP. Certain parameters in the announce request itself can be altered

Critical SQL Injection in The Venerable Mahasi Sayadaw’s Website

PlanetCreator has reported another critical SQL Injection (vulnerability) on The Venerable Mahasi Sayadaw’s Website http://www.mahasi.org.mm SQL injection is a code injection technique that exploits a security vulnerability occurring in the