真正的利用和漏洞是两码事了,大部分非持久型XSS配合WS的技巧还是能造成很大危害的。

在08-7-15,xiao yin <[EMAIL PROTECTED]> 写道:
>
> 想问一下,这种XSS真正能利用起来的又有多少,问题是截取用户名和密码,真正用起来的还是少之又少。
>
> 2008/7/15 heyi <[EMAIL PROTECTED]>:
>
>> http://msg.baidu.com/ms?ct=21&cm=1&tn=bmSendMessage&un=<iframe src=
>> http://www.baidu.com width=700 height=500/>
>>
>>
>> ------------------ 原始邮件 ------------------
>>  *发件人:* "大风"<[EMAIL PROTECTED]>;
>> *发送时间:* 2008年7月15日(星期二) 中午01:12
>> *收件人:* "ph4nt0m"<[email protected]>;
>> *主题:* [Ph4nt0m] 答复: [Ph4nt0m] Re: [WoBB]The Week of Baidu Bugs
>>
>>
>>
>>
>> 今天的更新:
>>
>>
>>
>> The Week of Baidu Bugs - Day 05: 
>> 百度空间多处XSS漏洞<http://hi.baidu.com/aullik5/blog/item/8d3684952508831bd21b70be.html>
>>
>>
>>
>> 其中Baidu 搜藏那个XSS漏洞还有点意思
>>
>>
>>
>>
>>
>> *[Ph4nt0m] <http://www.ph4nt0m.org/> *
>>
>> *[Ph4nt0m Security Team]*
>>
>>               *   [EMAIL PROTECTED] <http://blog.ph4nt0m.org/>*
>>
>> *         Email:  [EMAIL PROTECTED]
>>
>> *         PingMe:
>> <http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wuhq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724>
>> *
>>
>> *         **=== V3ry G00d, V3ry Str0ng ===***
>>
>> *         === Ultim4te H4cking ===*
>>
>> *         === XPLOITZ ! ===*
>>
>> *         === #_# ===*
>>
>> *#If you brave,there is nothing you cannot achieve.#*
>>
>>
>>  ------------------------------
>>
>> *发件人:* [email protected] [mailto:[EMAIL PROTECTED] *代表 *
>> raystyle
>> *发送时间:* 2008年7月14日 16:35
>> *收件人:* [email protected]
>> *主题:* [Ph4nt0m] Re: [WoBB]The Week of Baidu Bugs
>>
>>
>>
>> 期待啊 期待 太强大了
>>
>> 在08-7-14,*大风* <[EMAIL PROTECTED]> 写道:
>>
>>
>>
>> 最近在blog上发布了一些baidu漏洞,希望能和更多的朋友一起探讨。
>>
>>
>>
>> The Week of Baidu Bugs - Day 01: 
>> 任意URL跳转漏洞<http://hi.baidu.com/aullik5/blog/item/1399f502b3cf5d723912bb37.html>
>>
>>
>>
>> The Week of Baidu Bugs - Day 02: 
>> 多处CSRF漏洞<http://hi.baidu.com/aullik5/blog/item/5b0178f5d0eb9adcf2d3852f.html>
>>
>>
>>
>> The Week of Baidu Bugs - Day 03: 
>> 百度空间XSIO漏洞<http://hi.baidu.com/aullik5/blog/item/e031985175a02c6785352416.html>
>>
>>
>>
>> The Week of Baidu Bugs - Day 04: 百度空间多处DOM 
>> XSS漏洞(上)<http://hi.baidu.com/aullik5/blog/item/646456fa5b34b8136d22eb84.html>
>>
>>
>>
>> The Week of Baidu Bugs - Day 04: 百度空间多处DOM 
>> XSS漏洞(下)<http://hi.baidu.com/aullik5/blog/item/be1893ee482a5ceace1b3e98.html>
>>
>>
>>
>>
>>
>> 已经发了四天了,还会继续发下去,每天都会发一点。
>>
>>
>>
>>
>>
>>
>>
>> *[Ph4nt0m] <http://www.ph4nt0m.org/>** *
>>
>> *[Ph4nt0m Security Team]*
>>
>>               *   [EMAIL PROTECTED] <http://blog.ph4nt0m.org/>*
>>
>> *         Email:  [EMAIL PROTECTED]
>>
>> *         PingMe:
>> <http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wuhq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724>
>> *
>>
>> *         **=== V3ry G00d, V3ry Str0ng ===*
>>
>> *          === Ultim4te H4cking ===*
>>
>> *          === XPLOITZ ! ===*
>>
>> *          === #_# ===*
>>
>> *#If you brave,there is nothing you cannot achieve.#*
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> >>
>>
>>
>

--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

回复