More often than not, when people think of a hacker, they think of someone technologically infiltrating a network and stealing mass amounts of sensitive information sitting behind it. In actuality, hackers tend to employ methods that take advantage of individual users, often in tandem with some form of social engineering.
Tag: Cross-Site Scripting
In the world of websites, hackers have a variety of tools to intrude on people’s domains. These hacks, which take advantage of vulnerabilities in a site’s code, are categorized by projects like the OWASP Top Ten.
According to the OWASP assessment, the top three most common attacks are:
- Weak Authentication and Session Management
- Cross-Site Scripting (XSS)
As new vulnerabilities are discovered, we still can see that a large portion of these vulnerabilities are XSS-related vectors.