Androsh7

Globe
$ cat docs/dos-attacks.md

1. Reflected Cross-Site Scripting (XSS) DoS Attacks

Reflected XSS occurs when unvalidated user input (e.g., from an upload form or a rich-text editor) is immediately reflected back to the user’s browser without sanitization. Beyond stealing cookies or hijacking sessions, attackers can inject resource-exhausting payloads such as infinite loops, heavy DOM manipulations, or memory leaks that cause the browser or even the host system to crash.

Defense:

2. IFrame Attacks

Attackers can abuse the <iframe> element to invisibly redirect victims to malicious websites. These can load phishing login pages, drive-by download sites, or malicious advertising networks. In a DoS context, iframes can recursively load multiple layers of content, consuming bandwidth and system resources until the browser hangs.

Defense:

3. JavaScript Event Bombs

Malicious actors can abuse event listeners such as onmousemove or onmouseover to trigger CPU-intensive operations whenever the victim interacts with the page. Even small actions, like moving the mouse, can cause the browser to lock up.

Defense:

4. Infinite Redirect Loops

Attackers can craft malicious pages that endlessly redirect between multiple URLs. This can consume bandwidth, fill browser history, and effectively prevent the victim from leaving the loop without forcibly closing the browser.

Defense:

5. HTML5 API Misuse (Storage & Web Workers)

Newer browser APIs like Web Workers and localStorage can be abused to consume client resources. Attackers may spawn thousands of background workers or fill up localStorage, causing system slowdown or crashing the browser.

Defense:

← Back to Demos