大风,你把那个dns投毒啥的,有图的url给我吧 之前这里看见过,现在又找不到了
On 10月8日, 下午8时56分, Atomic <[EMAIL PROTECTED]> wrote: > Interesting. But this kind of GUI trick attack has been performed > before in practice, and in my opinion they are somewhat easier to > exploit if the user is stupid enough. > > Well.. that's almost always the case ;) > > On 10月8日, 上午2时58分, 大风 <[EMAIL PROTECTED]> wrote: > > > > > Today is the day we can finally start talking about clickjacking. This is > > just meant to be a quick post that you can use as a reference sheet. It is > > not a thorough advisory of every site/vendor/plugin that is vulnerable - > > there are far too many to count. Jeremiah and I got the final word today > > that it was fine to start talking about this due to the > > <http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickja...> > > click jacking PoC against Flash that was released today (watch the video > > > for a good demonstration) that essentially spilled the beans regarding > > several of the findings that were most concerning. Thankfully, Adobe has > > been working on this since we let them know, so despite the careless > > disclosure, much of the work to mitigate this on their end is already > > complete. > > > First of all let me start by saying there are multiple variants of > > clickjacking. Some of it requires cross domain access, some doesn't. Some > > overlays entire pages over a page, some uses iframes to get you to click on > > one spot. Some requires JavaScript, some doesn't. Some variants use CSRF to > > pre-load data in forms, some don't. Clickjacking does not cover any one of > > these use cases, but rather all of them. That's why we had to come up with > > a new term for it - like the term or not. As CSRF didn't fit the > > requirements for clickjacking, we had to come up with a new term to avoid > > confusion. If you like Michael > > <http://lists.whatwg.org/pipermail/whatwg-whatwg.org/2008-September/01... > > tml> Zalewski's term "UI redress attack" better use that one, it's just > > not CSRF and shouldn't be mistaken for any other attack, since it really is > > different. Here is the technical detail: > > > Issue #1 STATUS: Unresolved. Clickjacking allows attackers to subvert clicks > > and send the victim's clicks to web-pages that allow themselves to be > > framed with or without JavaScript. One-click submission buttons or links are > > the most vulnerable. It has been known since at least 2002 > > <https://bugzilla.mozilla.org/show_bug.cgi?id=154957#c6> and has seen at > > least three different PoC exploits (Google Desktop MITM attack, Google > > Gadgets auto-add and click fraud). All major browsers appear to be affected. > > > Issue #1a STATUS: Unresolved. JavaScript is not required to initiate the > > attack as CSS can place invisible iframes over any known target (EG: the > > only link on the red herring page). Turning off JavaScript also neuters one > > of the only practical web based defenses against the attack which is the use > > of frame busting code. > > > Issue #2 STATUS: Unresolved. ActiveX controls are potentially susceptible to > > clickjacking if they don't use traditional modal dialogs, but rather rely > > on on-page prompting. This requires no cross domain access, necessarily, > > which means iframes/frames are not a prerequisite on an attacker controlled > > page. > > > Issue #2a STATUS: To be fixed in Flash 10 release. All prior versions of > > Flash on Firefox on MacOS are particularly vulnerable to camera and video > > monitoring due to security issues allowing the object to be turned opaque or > > covered up. This fix relies on all users upgrading, and since Flash users > > are notoriously slow at upgrading, this exploit is expected to persist. > > Turning off microphone access in the bios and unplugging/removing controls > > to the camera are an alternative. Here is the information directly > > <http://www.adobe.com/support/security/advisories/apsa08-08.html> from > > Adobe. > > > Issue #2b STATUS: Resolved. Flash security settings manager is also > > particularly vulnerable, allowing the attacker to turn off the security of > > Flash completely. This includes camera/microphone access as well as cross > > domain access. Resolved using frame busting code, bug #4 below > > notwithstanding. > > > Issue #2c STATUS: To be fixed in Flash 10 release. All versions of Flash on > > IE7.0 and IE8.0 can be overlayed by opaque div tags. Using an onmousedown > > event handler the object click registers as long as the divs are removed by > > the onmousdown event handler function. Demo here > > <http://ha.ckers.org/weird/cjdivtest.html> of stealing access to the > > microphone. > > > Issue #3 STATUS: To be fixed in the final release candidate. Flash on IE8.0 > > Beta is persistent across domains (think "ghost in the browser"). This > > would be a much worse vulnerability except for the fact that it beta and > > almost no one is using it. > > > Issue #4 STATUS: Unresolved. Framebusting code does not appear to work well > > on some sites on IE8.0 Beta. Instead it is marked as a popup which is > > blocked by the browser - disallowing the frame busting code from executing. > > > Issue #5 STATUS: Unresolved. State of clicks on other domains can be > > monitored with JavaScript (works best in Internet Explorer but other > > browsers are vulnerable too) which is cross domain leakage and can allow for > > more complex multi-click attacks. For example a page that has a check box > > and a submit button could be subverted upon two successful clickjacks. > > Additionally, this can make the attack completely seemless to a user by > > surrendering control of the mouse back to the user once the attack has > > completed. > > > Issue #6 STATUS: Unresolved. "Unlikely" XSS vulnerabilities that require > > onmouseover or onmousedown events on other parts of pages on other domains > > are suddenly more likely. For example if a webpage has a XSS vulnerability > > where the only successful attacks are things like onmouseover or > > onmousedown, etc... on unlikely parts of the page, an attacker can promote > > those exploits by framing them and placing the mouse cursor directly above > > the target XSS area. Therefore, otherwise typically uninteresting or > > unlikely XSS exploits can be made more dangerous. > > > Issue #7 STATUS: Fixed in current releases post 1.8.1.9. Firefox's Noscript > > plugin's functionality to forbid iframe's can be subverted by iframing a > > page that contains a cross domain frame or as Ronald found > > <http://www.0x000000.com/index.php?i=316> by using object tags. Giorgio > > Maone <http://noscript.net/changelog> validated the issues and issued > > patches in future releases of the code as well as other potential > > clickjacking mitigation. 1.8.1.6, 1.8.1.7, 1.8.1.8, 1.8.1.9, 1.8.2 and > > 1.8.2.1 all contain anti-clickjacking code. All prior versions to 1.8.1.9 > > were vulnerable to cross domain clickjacking. > > > Issue #8 STATUS: Unresolved. Attempts to protect against CSRF using nonces > > can often be overcome by clickjacking as long as the URL of the page that > > contains the link that includes the nonce is known. Eg: Google Gadgets > > exploit discussed in Blackhat "Xploiting Google Gadgets" speech. The only > > semi-decent defenses against this are to omit the nonces in JavaScript space > > and also include the frame busting code in the same JavaScript. This will > > break for users who do not use JavaScript though, so it is not an ideal > > solution. > > > From an attacker's perspective the most important thing is that a) they > > know where to click and b) they know the URL of the page they want you to > > click, in the case of cross domain access. So if either one of these two > > requirements aren't met, the attack falls down. Frame busting code is the > > best defense if you run web-servers, if it works (and in our tests it > > doesn't always work). I should note some people have mentioned > > security=restricted as a way to break frame busting code, and that is true, > > although it also fails to send cookies, which might break any significant > > attacks against most sites that check credentials. > > > Thanks to Adobe, Microsoft, Firefox, Apple and the various other vendors and > > people who have been helpful/supportive and care to fix the issue. Also > > thanks to the researchers who found these issues independently after > > Jeremiah and I were unable to do our speech, but kept it to themselves > > (Arshan Dabirsiaghi, Jerry Hoff, Eduardo Vela, Matthew Matracci, and Liu Die > > Yu). I will release a whitepaper to the informer > > <http://informer.ihackstuff.com/> via hackers for charity > > <http://www.hackersforcharity.org/> sometime today or tomorrow. I'll also > > make that whitepaper available publicly sometime next week and information > > forthcoming when I have some time to put it up. Source to generic > > clickjacking code available here <http://ha.ckers.org/weird/cj.cgi.gz> . I > > will keep this post up to date with additional issues and updates as I am > > aware of them. > > > [Ph4nt0m] <http://www.ph4nt0m.org/> > > > [Ph4nt0m Security Team] > > > <http://blog.ph4nt0m.org/> [EMAIL PROTECTED] > > > Email: [EMAIL PROTECTED] > > > PingMe: > > <http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=han... > > hq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724> > > > === V3ry G00d, V3ry Str0ng === > > > === Ultim4te H4cking === > > > === XPLOITZ ! === > > > === #_# === > > > #If you brave,there is nothing you cannot achieve.# > > > image001.gif > > 5K查看下载- 隐藏被引用文字 - > > - 显示引用的文字 - --~--~---------~--~----~------------~-------~--~----~ 要向邮件组发送邮件,请发到 [email protected] 要退订此邮件,请发邮件至 [EMAIL PROTECTED] -~----------~----~----~----~------~----~------~--~---

