Scornhub - 26 May 2016
The meaning of life tastes like chicken - 24 Feb 2016
fucking astrology man - 09 Dec 2015
Freelance Consulting - 23 Nov 2015
The Wassenaar Effect - 09 Jun 2015
Scantastic! - 11 Feb 2015
It's all fucked - 05 Jan 2015
The tortured poet - 28 Dec 2014
Gone in 660 Seconds - 25 Nov 2014
College Graduation - 20 Nov 2014
Yahoo for the craic! - 21 Sep 2014
IRC what you did there... - 02 Aug 2014
Let me Bug you!? - 19 Jun 2014
Plesk 10 & 11 SSO XXE/XSS - 09 May 2014
Final Year Woes - 24 Apr 2014
SWMing in privilege, or drowning? - 10 Apr 2014
Lucid Surrealist Dreams and techno-lust. - 23 Mar 2014
New Raspberry piToy - 05 Feb 2014
Happy 2014! - 15 Jan 2014
Helpdesk Pilot Xss/CSRF Add an Admin - 30 Nov 2013
Squidoo.com $1,100 bug bounty - 02 Nov 2013
Yahoo Xss bug bounty - 01 Oct 2013
Moodle 2.0 Account Takeover - 04 Sep 2013
Xss Challenge Accepted - 17 Aug 2013
rpliy - rpi python web player - 25 Jul 2013
Busy times - 10 Jul 2013
Source Conference - 27 May 2013
Coinbase.com bug bounty - 04 May 2013
Xssive, Moodle and CSRF - 11 Apr 2013

Yahoo Pipes is Great! - 05 Mar 2013
Science Hack-day Dublin - 03 Mar 2013
Simple port scan - 26 Feb 2013
4chan-tool.py - 19 Feb 2013
Wix.com Xss - 11 Feb 2013
Crawl.py Url Crawling - 09 Feb 2013
Xssive Demo tool - 12 Jan 2013
Cyberbullying? - 27 Dec 2012
Merry XssMas - 24 Dec 2012
Watching BBC Streams - 10 Dec 2012
SWF Disassembly - 26 Nov 2012
C <3 - 16 Nov 2012
Greasemonkey XSS 2 - 21 Oct 2012
Work Logging App - 20 Oct 2012
Greasemonkey XSS - 30 Sep 2012
Guestbook XSS - 18 Sep 2012
OWASP Vicnum Project - 05 Sep 2012
August... - 05 Sep 2012
XSS Scenarios. - 30 Jul 2012
Imageroll - 06 Jul 2012
The Dangers of XSS - 14 Jun 2012

US Threat Gauge - 30 May 2012
Is this art? - 28 May 2012
Rss2Irc - 25 May 2012
Blackboard Xss Jungle - 14 May 2012
Url Info Scraper - 10 May 2012
pythonchallenge.com - 27 Apr 2012
Prime Generator - 15 Apr 2012
Sockso 1.51 Xss - 07 Apr 2012


Ubuntu 10.10 Hardening - 18 Mar 2012
2nd Year Revisited - 17 Mar 2012

XSS Scenarios.

I Haven't posted in a while, I hope you like the slight design changes! In this post I will just give examples of a few simple potential cross site scripting scenarios. The idea is to give people a better understanding of how they work, so they can prevent themselves from being affected in future. Awareness is key! It's also useful to learn how these attacks may be hidden or obfuscated.

As XSS is very common, not too difficult to find (hopefully my past posts prove this) and, you don't need to know a whole lot more than simple javascript or html to potentially exploit them. I feel this is a good place to start exploring if you are interested in web application security.

Here are a few simple ideas and attack scenarios I have thought of and explored. I recently joined twitter. I'm not sure what drove me to but... WOW, I'm surprised at what I've found. It's a malicious attackers dream come true. Thanks to #trending topics it's very easy to expose a mass number of people through the simplest of social engineering attacks ("#OMG LATEST UPDATE! "). The higher the crest of these trending waves the more people potentially affected.

Everyone should be aware of the risks involved in social media at this stage. Mass exposure to vulnerabilities and scams in an extremely short time period. Bringing people closer together online makes larger groups easier to target. It also means an xss vulnerability on a well known site (something like youtube or facebook) could have catastrophic results. Phishing is rampant and we hear about massive botnets being exposed all of the time. Imagine how many there are we don't know of. The problem with xss is that it's stealthy and in a lot of scenarios it's possible to get code execution without the victim being any wiser.

Since you can call javascript from a remote location, it is possible to abuse anywhere you can host raw text. This could provide a layer of obfuscation for the attacker. Using the raw format of web apps such as Pastebin.com or . It is also possible to make these delete themselves after a time interval.

There are many tools out there to assist attackers with mass xss also, such as beef and xssShell, creating armies of zombie browsers at the attackers fingertips. Using these there are hundreds of easy to use methods of further compromising your browser/information/computer at the attackers whim. Quick example of xssShell/Beef:

No web browser is safe from attack either, despite what people may think of chrome's xss mitigation features. An attack string in the url of will work in both firefox and chrome. (If this string isn't effected by application logic). Another thing I found that commonly happens is one attack vector resulting in multiple popups. This means if the attacker uses */alert(1);