Bug bounty research: hot or not - 13 Jul 2016
Scornhub - 26 May 2016
The meaning of life tastes like chicken - 24 Feb 2016
fucking astrology man - 09 Dec 2015
Freelance Consulting - 23 Nov 2015
The Wassenaar Effect - 09 Jun 2015
Scantastic! - 11 Feb 2015
It's all fucked - 05 Jan 2015
The tortured poet - 28 Dec 2014
Gone in 660 Seconds - 25 Nov 2014
College Graduation - 20 Nov 2014
Yahoo for the craic! - 21 Sep 2014
IRC what you did there... - 02 Aug 2014
Let me Bug you!? - 19 Jun 2014
Plesk 10 & 11 SSO XXE/XSS - 09 May 2014
Final Year Woes - 24 Apr 2014
SWMing in privilege, or drowning? - 10 Apr 2014
Lucid Surrealist Dreams and techno-lust. - 23 Mar 2014
New Raspberry piToy - 05 Feb 2014
Happy 2014! - 15 Jan 2014
Helpdesk Pilot Xss/CSRF Add an Admin - 30 Nov 2013
Squidoo.com $1,100 bug bounty - 02 Nov 2013
Yahoo Xss bug bounty - 01 Oct 2013
Moodle 2.0 Account Takeover - 04 Sep 2013
Xss Challenge Accepted - 17 Aug 2013
rpliy - rpi python web player - 25 Jul 2013
Busy times - 10 Jul 2013
Source Conference - 27 May 2013
Coinbase.com bug bounty - 04 May 2013
Xssive, Moodle and CSRF - 11 Apr 2013

Yahoo Pipes is Great! - 05 Mar 2013
Science Hack-day Dublin - 03 Mar 2013
Simple port scan - 26 Feb 2013
4chan-tool.py - 19 Feb 2013
Wix.com Xss - 11 Feb 2013
Crawl.py Url Crawling - 09 Feb 2013
Xssive Demo tool - 12 Jan 2013
Cyberbullying? - 27 Dec 2012
Merry XssMas - 24 Dec 2012
Watching BBC Streams - 10 Dec 2012
SWF Disassembly - 26 Nov 2012
C <3 - 16 Nov 2012
Greasemonkey XSS 2 - 21 Oct 2012
Work Logging App - 20 Oct 2012
Greasemonkey XSS - 30 Sep 2012
Guestbook XSS - 18 Sep 2012
OWASP Vicnum Project - 05 Sep 2012
August... - 05 Sep 2012
XSS Scenarios. - 30 Jul 2012
Imageroll - 06 Jul 2012
The Dangers of XSS - 14 Jun 2012

US Threat Gauge - 30 May 2012
Is this art? - 28 May 2012
Rss2Irc - 25 May 2012
Blackboard Xss Jungle - 14 May 2012
Url Info Scraper - 10 May 2012
pythonchallenge.com - 27 Apr 2012
Prime Generator - 15 Apr 2012
Sockso 1.51 Xss - 07 Apr 2012


Ubuntu 10.10 Hardening - 18 Mar 2012
2nd Year Revisited - 17 Mar 2012

The Dangers of XSS

Hello mo chairde, This blog post has potential to get me in trouble. It's naughty, but I feel it's essential people are made aware of how widespread and common Cross site scripting vulnerabilities are. They have the potential to be malicious and this is why people need to learn how to spot them. Not everyone is as web savvy as they should be yet most of us spend a significant amount of time online. I will do my best to explain in simple terms how to spot these common attacks. I will also provide some tips to developers how to mitigate them.

Cross site scripting (XSS) is easily the most common web based vulnerability. For certain types of xss, The dangers are quite significant. The two main types are reflective xss and persistant xss. In this post I will only be discussing reflective, the less dangerous and more focused attack. A reflective xss attack normally involves an attacker sending or posting a malicious url to the victim. When the user visits this crafted url, something malicious can occur.

How can you recognise these malicious urls or links?

The easiest thing you may first recognize is html tags in a url. (Ex.http://blah.com/?s=) My only suggestion is to at least be familiar with the format <*something*> In a malicious link this allows an attacker to execute malicious javascript code as your browser. The attacker could steal your session cookies and be logged in as you, make a fake login box, maybe over the current one, change the layout of your page... The list is endless. These of course can be hidden using url encoding so they can be quite hard to spot. The above url example encoded could look like (http://blah.com/?s=%3C%73%63%72%69%70%74%20%73%72%63%3D%2E%2E%2E%3E)

Firefox has a lot of great plugins and is a great web browser, sadly it doesn't have as good protection as chrome. There are some methods to bypass this on chrome though. If you aren't web savvy I'd suggest using chrome as it has methods of mitigating these attacks.

Just how common are these attacks?

I'd like to say they aren't everywhere but after some investigation it seems they are. I wrote a short script that inserts "">