XSA

In computer science, XSA (better known as Cross-Server Attack) is a networking security intrusion method which allows for a malicious client to compromise security over a website or service on a server by using implemented services on the server that may not be secure.

In general, XSA is demonstrated against websites, yet sometimes it is used in conjunction with other services located on the same server.

Basics

XSA is a method that allows for a malicious client to use services that a remote server implements in order to attack another service on the same server or network.

Most website hosting companies that offer hosting for large or even little amounts of separate websites are vulnerable to this method of attack, because of the amount of access services such as PHP and the webserver itself give to a client that allows the client to access other website configurations, files, passwords and the like.

History

The term 'XSA' was first coined by DeadlyData, a prominent Computer hacker during the early 2000s, over the voice communications software TeamSpeak. While he had not invented or pioneered this method of intrusion, he coined it as a shortened term to describe the act of performing Cross-Server Attacks (XSAs).

It was then used further in the community and now supports for most of the methods and subsets of the method that give both Computer hacker and malicious individuals the terminology to attack websites using software that is located on the same server.

gollark: There is actually research into artificial rainbow generation at small scales.
gollark: The modern economy is more efficient than that!
gollark: You think the gold at the end of rainbows is just left unused *sitting* there?
gollark: Actually, with modern satellite imaging and good cameras, prospecting companies are frequently able to track down the ends of rainbows and extract the gold within 10 minutes of materialization.
gollark: Well, the point is more that you just can't see into it.

See also

  • SQL Injection (SQLi)
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Buffer Overflow
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.