Scornhub - 26 May 2016
The meaning of life tastes like chicken - 24 Feb 2016
fucking astrology man - 09 Dec 2015
Freelance Consulting - 23 Nov 2015
The Wassenaar Effect - 09 Jun 2015
Scantastic! - 11 Feb 2015
It's all fucked - 05 Jan 2015
The tortured poet - 28 Dec 2014
Gone in 660 Seconds - 25 Nov 2014
College Graduation - 20 Nov 2014
Yahoo for the craic! - 21 Sep 2014
IRC what you did there... - 02 Aug 2014
Let me Bug you!? - 19 Jun 2014
Plesk 10 & 11 SSO XXE/XSS - 09 May 2014
Final Year Woes - 24 Apr 2014
SWMing in privilege, or drowning? - 10 Apr 2014
Lucid Surrealist Dreams and techno-lust. - 23 Mar 2014
New Raspberry piToy - 05 Feb 2014
Happy 2014! - 15 Jan 2014
Helpdesk Pilot Xss/CSRF Add an Admin - 30 Nov 2013
Squidoo.com $1,100 bug bounty - 02 Nov 2013
Yahoo Xss bug bounty - 01 Oct 2013
Moodle 2.0 Account Takeover - 04 Sep 2013
Xss Challenge Accepted - 17 Aug 2013
rpliy - rpi python web player - 25 Jul 2013
Busy times - 10 Jul 2013
Source Conference - 27 May 2013
Coinbase.com bug bounty - 04 May 2013
Xssive, Moodle and CSRF - 11 Apr 2013

Yahoo Pipes is Great! - 05 Mar 2013
Science Hack-day Dublin - 03 Mar 2013
Simple port scan - 26 Feb 2013
4chan-tool.py - 19 Feb 2013
Wix.com Xss - 11 Feb 2013
Crawl.py Url Crawling - 09 Feb 2013
Xssive Demo tool - 12 Jan 2013
Cyberbullying? - 27 Dec 2012
Merry XssMas - 24 Dec 2012
Watching BBC Streams - 10 Dec 2012
SWF Disassembly - 26 Nov 2012
C <3 - 16 Nov 2012
Greasemonkey XSS 2 - 21 Oct 2012
Work Logging App - 20 Oct 2012
Greasemonkey XSS - 30 Sep 2012
Guestbook XSS - 18 Sep 2012
OWASP Vicnum Project - 05 Sep 2012
August... - 05 Sep 2012
XSS Scenarios. - 30 Jul 2012
Imageroll - 06 Jul 2012
The Dangers of XSS - 14 Jun 2012

US Threat Gauge - 30 May 2012
Is this art? - 28 May 2012
Rss2Irc - 25 May 2012
Blackboard Xss Jungle - 14 May 2012
Url Info Scraper - 10 May 2012
pythonchallenge.com - 27 Apr 2012
Prime Generator - 15 Apr 2012
Sockso 1.51 Xss - 07 Apr 2012


Ubuntu 10.10 Hardening - 18 Mar 2012
2nd Year Revisited - 17 Mar 2012

Merry XssMas

Hello and happy Xmas/New year to you all. I recently completed a small Xss challenge at Xssmas Challenge! .I could only find 4! Give it a go!

I've spent an hour or so today investigating my eircom router. It turns out the gateway router model they use (Zyxel P-660HW-T1 v3) is riddled with vulnerabilities! I found plenty of articles explaining this and came across this gem -> Zyxel disputes vulns. There seems to be plenty of papers describing the vulnerabilities present and how they could be abused.

Anyway, I found two very useful papers that go into great detail describing the known vulnerabilities, they also wrote proof of concepts of how they can be abused. In addition to the vast array of vulns you can see in these papers below, I have found two more of my own. One is a persistent Xss and the other is Xss through a post.

Here are the articles! If you have an eircom router I recommend you give them a quick read. Hacking Zyxel Gateways part 1 and . As you can see most of these are web vulnerabilities that transfer to network vulns.


If you can see the eircom image above you are more than likely vulnerable...

Here are my own two additional Xss vulnerabilities. The first one uses a cross site request forgery flaw on the login page to inject an xss string. This could be altered to do it automatically upon visiting a page anywhere on the internet.



            


            


            


            



If you'd like a demo I've included this code in my blog post. Just click the run demo button, this xss string will only execute in firefox but I'm sure the value can be changed to bypass chrome's xss filter. The hash at the start is just the default password eircom uses of broadband1 after it's been hashed by the javascript on the router login page. You can put any value you want here and still get xss execution.

            
            



The second is a persistent vulnerability on the content filter page. If you insert a content filter keyword of You can store this there. This Xss could take advantage of any of the CSRF vulnerabilities described in the papers such as taking down the firewall, changing the DNS server or allowing external access to the gateway router.

I was also recently browsing a few sites with my Dom Xss finder script in an attempt to verify it actually worked and was delighted when it found a few! I reported two of the ones I found on the American Express site and was delighted with the response, they were fixed immediately. I love when a simple idea you've had works! *GLOATS*
HAX BRAH