Re: Exploiting XSS



Hi Adnan,

If you are comfortable with Javascripting, you can create an exploit
that would deface the website. Refer book, "XSS attacks" for more
information on xss exploits.

Good luck
Durga Prasad.

On Thu, Dec 4, 2008 at 1:31 AM, Baykal, Adnan (CSCIC)
<adnan.baykal@xxxxxxxxxxxxxxxxx> wrote:
One thing quick is to use the XSS to steal visitor cookies and
sessionids then do session hijacking. Or use jitko to scan internal
systems. Also grossman described this approach recently.



--------------------------------------------------------

This message may contain confidential information and is intended only for the individual(s) named. If you are not an intended recipient you are not authorized to disseminate, distribute or copy this e-mail. Please notify the sender immediately if you have received this e-mail by mistake and delete this e-mail from your system.
-----Original Message-----

From: listbounce@xxxxxxxxxxxxxxxxx [mailto:listbounce@xxxxxxxxxxxxxxxxx]
On Behalf Of Whitehat
Sent: Wednesday, December 03, 2008 12:09 AM
To: pen-test
Subject: Exploiting XSS

Dear List,

I'm doing a WAPT for a website and found many XSS issues (both Stored
and Reflected).
I wanted to do more and show to the customer, apart from normal script
injection and getting it popped up.

Consider that u found an XSS issue in a field and your script is
running,

1. Now what are the further steps for exploiting XSS completely????
2. How an attacker can really make use of it?
3. How to Compromise ??
4. What are the real world scenarios can be used

Looking for few good inputs/imlementations/expolits/BooKs ..............

Thanks in advance,

Cheers,
White hat


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Security Trends Report from Cenzic
Stay Ahead of the Hacker Curve!
Get the latest Q2 2008 Trends Report now

www.cenzic.com/landing/trends-report
------------------------------------------------------------------------


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Security Trends Report from Cenzic
Stay Ahead of the Hacker Curve!
Get the latest Q2 2008 Trends Report now

www.cenzic.com/landing/trends-report
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Cenzic

Security Trends Report from Cenzic
Stay Ahead of the Hacker Curve!
Get the latest Q2 2008 Trends Report now

www.cenzic.com/landing/trends-report
------------------------------------------------------------------------



Relevant Pages

  • Re: Required Help on Automated Tools
    ... Hi Noxious, you can try ProxyStrike, an active http proxy that will test for XSS and SQL Injection for all the traffic passing through it. ... Security Trends Report from Cenzic ... Stay Ahead of the Hacker Curve! ...
    (Pen-Test)
  • RE: Required Help on Automated Tools
    ... SQL-Injection and XSS can be tested with ServiceTest by HP/Mercury. ... basic overhead is done for you, assuming your webservices have WSDLs defined ... Required Help on Automated Tools ... Security Trends Report from Cenzic ...
    (Pen-Test)
  • Re: Exploiting XSS
    ... In references you can find good stuff, also good stuff to show how ... I wanted to do more and show to the customer, apart from normal script ... Consider that u found an XSS issue in a field and your script is running, ... Security Trends Report from Cenzic ...
    (Pen-Test)
  • Re: XSS frameworks
    ... XSS-Proxy allows you to turn an XSS hole into a proxy to surf from the ... Security Trends Report from Cenzic ... Stay Ahead of the Hacker Curve! ...
    (Pen-Test)
  • Re: [Full-disclosure] XSS vulnerabilities in Google.com
    ... > XSS will always remain part of the Full-Disclosure list if little ... >> legal to just audit a website without ... >> services or to mount a phishing attack. ... >> The server response lacks charset encoding enforcement, ...
    (Full-Disclosure)