Skip to content
Snippets Groups Projects
Commit af717f87 authored by Vakama's avatar Vakama
Browse files

update the vagrant multi-machine

parent 23133d1c
No related branches found
No related tags found
No related merge requests found
Showing
with 800 additions and 0 deletions
\relax
\@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {II}Background}{1}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces percentage of different vulnerabilities been found in 2019}}{1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {III}XSS attack and possible consequence}{1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {IV}Type of XSS attack}{1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}persistent XSS attack}{1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}non-persistent XSS attack}{2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}DOM-based XSS attack}{2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {V}Different approaches to protect the system from XSS attack }{2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-A}}Pattern filtering for user input}{2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-B}}client side pattern matching technique}{2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-C}}server side approach}{3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-D}}static analysis method}{3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-E}}static analysis combined with dynamic analysis}{3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {VI}Conclusion}{3}\protected@file@percent }
\bibcite{reference 1}{1}
\bibcite{reference 2}{2}
\bibcite{reference 3}{3}
\bibcite{reference 4}{4}
\bibcite{reference 5}{5}
\bibcite{reference 6}{6}
\bibcite{reference 7}{7}
\bibcite{reference 8}{8}
\bibcite{reference 9}{9}
\bibcite{reference 10}{10}
\bibcite{reference 11}{11}
\bibcite{reference 12}{12}
\@writefile{toc}{\contentsline {section}{References}{4}\protected@file@percent }
This diff is collapsed.
No preview for this file type
File added
......@@ -38,6 +38,7 @@
\begin{abstract}
Cross-site scripting (XSS) attack is one of the most common used method to attack a digital system. It can hide itself in HTML, JavaScript and many other programming languages, with the ability to do anything from gaining information of the victim, to getting full control to the system been attacked. In oder to deal with this problem, many developer have figure out different way to protect a system from XSS attack. This paper listed several different approach to counter XSS attack and discuss their strengths and weaknesses.
......
1.5:ab478d36-ada0-43a1-9b7e-190c74fec3a6
\ No newline at end of file
1596370155
\ No newline at end of file
{"name":"ubuntu/trusty64","version":"0","provider":"virtualbox","directory":"boxes/ubuntu-VAGRANTSLASH-trusty64/0/virtualbox"}
\ No newline at end of file
0
\ No newline at end of file
ab478d36-ada0-43a1-9b7e-190c74fec3a6
\ No newline at end of file
720d8909c19d485aa9a888feebfd1d28
\ No newline at end of file
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
{"virtualbox":{"/vagrant":{"guestpath":"/vagrant","hostpath":"D:/Vakama个人/SOTON/Semester 2/MScProject@git.soton.ac.uk/A detection method for cross-site scripting/code/Vagrant","disabled":false,"__vagrantfile":true}}}
\ No newline at end of file
D:/Vakama/SOTON/Semester 2/MScProject@git.soton.ac.uk/A detection method for cross-site scripting/code/Vagrant
\ No newline at end of file
1.5:79c8d7d4-3030-44c3-b1b5-9cdaf83f7672
\ No newline at end of file
1596370114
\ No newline at end of file
{"name":"generic/ubuntu2004","version":"3.0.12","provider":"virtualbox","directory":"boxes/generic-VAGRANTSLASH-ubuntu2004/3.0.12/virtualbox"}
\ No newline at end of file
0
\ No newline at end of file
79c8d7d4-3030-44c3-b1b5-9cdaf83f7672
\ No newline at end of file
9c6d1ec02adb404485ff882d3acfeedb
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment