So let’s try to find out the major loopholes and learn how the attackers inject arbitrary HTML codes into vulnerable web pages in order to modify the hosted content. I guess you are now clear with “what HTML is and its major use” and “how can we implement this all”.
![winject packet injection winject packet injection](https://present5.com/presentation/1e12e9755687c5530d4e390766460d33/image-24.jpg)
![winject packet injection winject packet injection](https://www.researchgate.net/profile/Saoudi-Lalia/publication/286668699/figure/fig5/AS:371421860646916@1465565280336/Global-algorithm-of-detection-of-the-LS-model_Q320.jpg)
These files are nothing but are the simple plain-text files with a “. Here the “href” is the “attribute name” and “ is the “attribute value”.Īs we’re now aware of the basic HTML terminologies, let’s check out the “HTML elements flowchart” and then will further try to implement them all to create up a simple web page.Įvery web page over the internet is somewhere or the other an HTML file. In order to provide some extra information to the elements, we use attributes, they reside inside the start tag and comes in “name/value” pairs, such that the attribute name follows up with an “equal-to sign” and the attribute value is enclosed with the “quotation marks”. Browsers do not display these HTML tags but utilize them to grab up the content of the webpage. They are the element names surrounded by angle brackets and are of two types – the “start tag” also known as opening tag and the “end tag” referred to as the closing one. it contains the opening and closing tag with the text content in between.”Īn HTML tag label pieces of content, such as “heading”, “paragraph”, “form”, and so on. “An element is everything to an HTML page i.e. HTML is used to design websites that consist the “HyperText” in order to include “text inside a text” as a hyperlink and a combination of elements that wrap up the data items to display in the browser.
![winject packet injection winject packet injection](https://www.researchgate.net/profile/Saoudi-Lalia/publication/286668699/figure/fig3/AS:371421860646914@1465565280288/Triangular-representation-of-secure-and-non-secure-page-E-RA-expectation-between-the.png)
HTML is an abbreviation to “Hyper Text Markup Langauge ”, is the basic building block of the web, which determine the formation of the web pages over a web-application. So have you ever wondered, if this anatomy got ruined up with some simple scripts? Or this structure itself becomes responsible for the defacements of the web-applications? Today, in this article, we’ll learn how such misconfigured HTML codes, open the gates for the attackers to manipulate the designed webpages and grabs up the sensitive data from the users. “HTML” is considered as the skeleton for every web-application, as it defines up the structure and the complete posture of the hosted content.