SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
1 XSS Defeating Concept Part2 ‘Bug As A Service’


                                             WHITEPAPER

                         XSS Defeating Concept Part2
       An Approach Eradicating Effect of JavaScript Events in
           User Input Being A Part of Web2.0 Facilities
                                                               By, ABK [AbhishekKr]
                                                         abhikumar163 @ gmail.com
                                                     http://www.twitter.com/abionic
   Objective: “Let Security Be Served By Web Server", don't push it on Web Developer.

   Part.1 Link: http://hackersmag.blogspot.com/2010/09/xss-defeating-poc-if-have-any-time-for.html


   WHAT WE FACE:
   The way XSS attack could affect a page is by execution of javascript on it. Now, there are
   two main ways (as known to me) in which javascript can get executed on the Page

   #1. any javascript code placed inside "<script/>" ellement on html page
   #2. any javascript event being called in html page




   Background Information:
   The XSS-Defeating PoC Part#1, deals with the issue#1 that is in the earlier part of the PoC
   it was shown how an unwanted "<script/>" element can be subverted.

   This allows only website level placed JavaScripts to get loaded in Client-Side Browsers and
   kill execution capability of anything else.

   It was attained by conscious injection of a DOM-level bug in the HTML Content generated at
   Web Server. Hence using 'Bug As A Service'.




   WHAT WE HAVE:
   Now, to complete the XSS-Defeating Suite we need to subvert the execution of unwanted
   Javascript Events also. It could be part of any kind of malicious user content stored and
   then viewed as facilitation of basic Web2.0 services.

   Currently it's traditionally being 'escaped' for any kind of unwanted js-event... again the
   approach which I refuse. The reason is not just of being offensive instead of defensive.




                                                            -by ABK [http://www.twitter.com/abionic]
2 XSS Defeating Concept Part2 ‘Bug As A Service’


   But the main reason is when this approach is implemented in full scale (that's when it is
   actually helpful), it tends to have major false negative results.

   So, when you go defensive... you also let several innocent user-input suffer the strictness.




                           http://www.ablog.com/post?p=
     attacker+pic+%3Cimg+onMouseOver%3D%E2%80%9Dmake_me_victim(my_d
                    etails)%3B%E2%80%9D%3E&user=test&…




                                         …<BODY >…
                             <div class=”blog”>attacker pic <img
                         onMouseOver=”make_me_victim(my_details);”>
                                         …</BODY>…




                         http://www.ablog.com/post?p=
      user+pic+%3Cimg+src%3D%E2%80%9Ddefault.jpeg%3B%E2%80%9D%3E&
                                  user=test&…




                                             …<BODY >…
                                      <div class=”blog”>user pic
                                             …</BODY>…




                                                           -by ABK [http://www.twitter.com/abionic]
3 XSS Defeating Concept Part2 ‘Bug As A Service’




   Working Mechanism:
   I propose a web-server-side analysis of all user-inputs (that would have stuff like GET-
   Request URL-String, POST-Request Body) and placing a bug at every possibility of JS-Event.
   This bug is placed in a manner that if it's don't have any effect on content display misjudged
   as JS-event, but also leaves any actual JS-event in a faulty state reduced to error-prone
   non-executable JS-Content.




                         http://www.ablog.com/post?p=
   attacker+pic+%3Cimg+onMouseOver%3D%E2%80%9Dmake_me_victim(my_d
                  etails)%3B%E2%80%9D%3E&user=test&…

                                    …<BODY >…
                        <div class=”blog”>attacker pic <img
               onMouseOver<bugMe/>=”make_me_victim(my_details);”>
                                    …</BODY>…




                      http://www.ablog.com/post?p=
  user+pic+%3Cimg+src%3D%E2%80%9Ddefault.jpeg%3B%E2%80%9D%3E&u
                               ser=test&…

                                      …<BODY >…
                   <div class=”blog”>user pic <img src=”default.jpg”>
                                      …</BODY>…




                                                          -by ABK [http://www.twitter.com/abionic]
4 XSS Defeating Concept Part2 ‘Bug As A Service’




   CONCLUSION
   So, inclusive of XSS Defeating Concept Part1 and Part2, we can remove any chance of
   “<script/>” execution or “JS-Events” invocation on Web-Content provided by users of the
   Web Service.

   Now, there is no way left for attacker to launch an XSS attack (if web developer doesn’t
   itself let attackers to inject code into HTTP Headers… now, no security mechanism can
   protect such developers).

   Hence, promising Happy Secure Web Development without worrying for the weird
   obfuscated JS-injected user-input.




   WHAT’s NEXT
   Next in the row will be a concept fighting SQL Injection Attacks at Web-Server level, with
   just some guidelines provided by Web Developer.




                                                          -by ABK [http://www.twitter.com/abionic]

Contenu connexe

Tendances

Web Application Security in Rails
Web Application Security in RailsWeb Application Security in Rails
Web Application Security in RailsUri Nativ
 
Clickjacking DevCon2011
Clickjacking DevCon2011Clickjacking DevCon2011
Clickjacking DevCon2011Krishna T
 
Indic threads pune12-improve testing efficiency with selenium webdriver
Indic threads pune12-improve testing efficiency with selenium webdriverIndic threads pune12-improve testing efficiency with selenium webdriver
Indic threads pune12-improve testing efficiency with selenium webdriverIndicThreads
 
CSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVCCSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVCSuvash Shah
 
Django の認証処理実装パターン / Django Authentication Patterns
Django の認証処理実装パターン / Django Authentication PatternsDjango の認証処理実装パターン / Django Authentication Patterns
Django の認証処理実装パターン / Django Authentication PatternsMasashi Shibata
 
Vuejs for Angular developers
Vuejs for Angular developersVuejs for Angular developers
Vuejs for Angular developersMikhail Kuznetcov
 
Stateless Anti-Csrf
Stateless Anti-CsrfStateless Anti-Csrf
Stateless Anti-Csrfjohnwilander
 
Introduction à AngularJS
Introduction à AngularJSIntroduction à AngularJS
Introduction à AngularJSNicolas PENNEC
 
Single Page WebApp Architecture
Single Page WebApp ArchitectureSingle Page WebApp Architecture
Single Page WebApp ArchitectureMorgan Cheng
 
Grey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request ForgeryGrey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request ForgeryChristopher Grayson
 
The Point of Vue - Intro to Vue.js
The Point of Vue - Intro to Vue.jsThe Point of Vue - Intro to Vue.js
The Point of Vue - Intro to Vue.jsHolly Schinsky
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011Samvel Gevorgyan
 
A4 A K S H A Y B H A R D W A J
A4    A K S H A Y  B H A R D W A JA4    A K S H A Y  B H A R D W A J
A4 A K S H A Y B H A R D W A Jbhardwajakshay
 
Cross Site Request Forgery
Cross Site Request ForgeryCross Site Request Forgery
Cross Site Request ForgeryTony Bibbs
 
2009 Barcamp Nashville Web Security 101
2009 Barcamp Nashville   Web Security 1012009 Barcamp Nashville   Web Security 101
2009 Barcamp Nashville Web Security 101brian_dailey
 

Tendances (20)

Web Application Security in Rails
Web Application Security in RailsWeb Application Security in Rails
Web Application Security in Rails
 
Clickjacking DevCon2011
Clickjacking DevCon2011Clickjacking DevCon2011
Clickjacking DevCon2011
 
Indic threads pune12-improve testing efficiency with selenium webdriver
Indic threads pune12-improve testing efficiency with selenium webdriverIndic threads pune12-improve testing efficiency with selenium webdriver
Indic threads pune12-improve testing efficiency with selenium webdriver
 
CSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVCCSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVC
 
Django の認証処理実装パターン / Django Authentication Patterns
Django の認証処理実装パターン / Django Authentication PatternsDjango の認証処理実装パターン / Django Authentication Patterns
Django の認証処理実装パターン / Django Authentication Patterns
 
SeanRobertsThesis
SeanRobertsThesisSeanRobertsThesis
SeanRobertsThesis
 
Vuejs for Angular developers
Vuejs for Angular developersVuejs for Angular developers
Vuejs for Angular developers
 
Stateless Anti-Csrf
Stateless Anti-CsrfStateless Anti-Csrf
Stateless Anti-Csrf
 
Introduction à AngularJS
Introduction à AngularJSIntroduction à AngularJS
Introduction à AngularJS
 
Single Page WebApp Architecture
Single Page WebApp ArchitectureSingle Page WebApp Architecture
Single Page WebApp Architecture
 
Grey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request ForgeryGrey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request Forgery
 
Xss
XssXss
Xss
 
The Point of Vue - Intro to Vue.js
The Point of Vue - Intro to Vue.jsThe Point of Vue - Intro to Vue.js
The Point of Vue - Intro to Vue.js
 
CSRF Basics
CSRF BasicsCSRF Basics
CSRF Basics
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 
Blind XSS & Click Jacking
Blind XSS & Click JackingBlind XSS & Click Jacking
Blind XSS & Click Jacking
 
Jquery Cheatsheet
Jquery CheatsheetJquery Cheatsheet
Jquery Cheatsheet
 
A4 A K S H A Y B H A R D W A J
A4    A K S H A Y  B H A R D W A JA4    A K S H A Y  B H A R D W A J
A4 A K S H A Y B H A R D W A J
 
Cross Site Request Forgery
Cross Site Request ForgeryCross Site Request Forgery
Cross Site Request Forgery
 
2009 Barcamp Nashville Web Security 101
2009 Barcamp Nashville   Web Security 1012009 Barcamp Nashville   Web Security 101
2009 Barcamp Nashville Web Security 101
 

En vedette

xRM4Legal for Case Management
xRM4Legal for Case ManagementxRM4Legal for Case Management
xRM4Legal for Case ManagementDavid Blumentals
 
Xxx acordo ortográfico_generalidades
Xxx acordo ortográfico_generalidadesXxx acordo ortográfico_generalidades
Xxx acordo ortográfico_generalidadesRenan2011
 
XXIV Maratón del Retorno - Resultados Oficiales 2015
XXIV Maratón del Retorno  - Resultados Oficiales 2015XXIV Maratón del Retorno  - Resultados Oficiales 2015
XXIV Maratón del Retorno - Resultados Oficiales 2015Cristian Ricardo Rubio
 
Xzu by ramy gmj xzu (23) copy - copy - copy - copy - copy - copy - copy - copy
Xzu by ramy gmj xzu (23)   copy - copy - copy - copy - copy - copy - copy - copyXzu by ramy gmj xzu (23)   copy - copy - copy - copy - copy - copy - copy - copy
Xzu by ramy gmj xzu (23) copy - copy - copy - copy - copy - copy - copy - copyramy.georges@live.co morcos
 

En vedette (6)

xRM4Legal for Case Management
xRM4Legal for Case ManagementxRM4Legal for Case Management
xRM4Legal for Case Management
 
Xxx acordo ortográfico_generalidades
Xxx acordo ortográfico_generalidadesXxx acordo ortográfico_generalidades
Xxx acordo ortográfico_generalidades
 
XXIV Maratón del Retorno - Resultados Oficiales 2015
XXIV Maratón del Retorno  - Resultados Oficiales 2015XXIV Maratón del Retorno  - Resultados Oficiales 2015
XXIV Maratón del Retorno - Resultados Oficiales 2015
 
Xuantunich - Ancient Mayan Ruin
Xuantunich - Ancient Mayan RuinXuantunich - Ancient Mayan Ruin
Xuantunich - Ancient Mayan Ruin
 
Xzu by ramy gmj xzu (23) copy - copy - copy - copy - copy - copy - copy - copy
Xzu by ramy gmj xzu (23)   copy - copy - copy - copy - copy - copy - copy - copyXzu by ramy gmj xzu (23)   copy - copy - copy - copy - copy - copy - copy - copy
Xzu by ramy gmj xzu (23) copy - copy - copy - copy - copy - copy - copy - copy
 
X rates
X ratesX rates
X rates
 

Similaire à XSS Defeating Concept - Part 2

XSS Defeating Trick ~=ABK=~ WhitePaper
XSS Defeating Trick ~=ABK=~ WhitePaperXSS Defeating Trick ~=ABK=~ WhitePaper
XSS Defeating Trick ~=ABK=~ WhitePaperAbhishek Kumar
 
[HEWEBFL] Adaptive Images in Responsive Web Design
[HEWEBFL] Adaptive Images in Responsive Web Design[HEWEBFL] Adaptive Images in Responsive Web Design
[HEWEBFL] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
[wcatx] Adaptive Images in Responsive Web Design
[wcatx] Adaptive Images in Responsive Web Design[wcatx] Adaptive Images in Responsive Web Design
[wcatx] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
[wvbcn] Adaptive Images in Responsive Web Design
[wvbcn] Adaptive Images in Responsive Web Design[wvbcn] Adaptive Images in Responsive Web Design
[wvbcn] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
Christopher Schmitt, "Adaptive Images for Responsive Web Design"
Christopher Schmitt, "Adaptive Images for Responsive Web Design"Christopher Schmitt, "Adaptive Images for Responsive Web Design"
Christopher Schmitt, "Adaptive Images for Responsive Web Design"WebVisions
 
[psuweb] Adaptive Images in Responsive Web Design
[psuweb] Adaptive Images in Responsive Web Design[psuweb] Adaptive Images in Responsive Web Design
[psuweb] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
[refreshpitt] Adaptive Images in Responsive Web Design
[refreshpitt] Adaptive Images in Responsive Web Design[refreshpitt] Adaptive Images in Responsive Web Design
[refreshpitt] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
[peachpit] Adaptive Images in Responsive Web Design
[peachpit] Adaptive Images in Responsive Web Design[peachpit] Adaptive Images in Responsive Web Design
[peachpit] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
[cssdevconf] Adaptive Images in Responsive Web Design
[cssdevconf] Adaptive Images in Responsive Web Design[cssdevconf] Adaptive Images in Responsive Web Design
[cssdevconf] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
[drupalcampatx] Adaptive Images in Responsive Web Design
[drupalcampatx] Adaptive Images in Responsive Web Design[drupalcampatx] Adaptive Images in Responsive Web Design
[drupalcampatx] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
xss-100908063522-phpapp02.pdf
xss-100908063522-phpapp02.pdfxss-100908063522-phpapp02.pdf
xss-100908063522-phpapp02.pdfyashvirsingh48
 
Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Irfad Imtiaz
 
Cross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docx
Cross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docxCross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docx
Cross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docxmydrynan
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSIvan Ortega
 
[rwdsummit] Adaptive Images in Responsive Web Design
[rwdsummit] Adaptive Images in Responsive Web Design[rwdsummit] Adaptive Images in Responsive Web Design
[rwdsummit] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
Story about module management with angular.js
Story about module management with angular.jsStory about module management with angular.js
Story about module management with angular.jsDavid Amend
 
Faster Frontends
Faster FrontendsFaster Frontends
Faster FrontendsAndy Davies
 
[parisweb] Adaptive Images in Responsive Web Design
[parisweb] Adaptive Images in Responsive Web Design[parisweb] Adaptive Images in Responsive Web Design
[parisweb] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionVishal Kumar
 

Similaire à XSS Defeating Concept - Part 2 (20)

XSS Defeating Trick ~=ABK=~ WhitePaper
XSS Defeating Trick ~=ABK=~ WhitePaperXSS Defeating Trick ~=ABK=~ WhitePaper
XSS Defeating Trick ~=ABK=~ WhitePaper
 
[HEWEBFL] Adaptive Images in Responsive Web Design
[HEWEBFL] Adaptive Images in Responsive Web Design[HEWEBFL] Adaptive Images in Responsive Web Design
[HEWEBFL] Adaptive Images in Responsive Web Design
 
[wcatx] Adaptive Images in Responsive Web Design
[wcatx] Adaptive Images in Responsive Web Design[wcatx] Adaptive Images in Responsive Web Design
[wcatx] Adaptive Images in Responsive Web Design
 
[wvbcn] Adaptive Images in Responsive Web Design
[wvbcn] Adaptive Images in Responsive Web Design[wvbcn] Adaptive Images in Responsive Web Design
[wvbcn] Adaptive Images in Responsive Web Design
 
Christopher Schmitt, "Adaptive Images for Responsive Web Design"
Christopher Schmitt, "Adaptive Images for Responsive Web Design"Christopher Schmitt, "Adaptive Images for Responsive Web Design"
Christopher Schmitt, "Adaptive Images for Responsive Web Design"
 
[psuweb] Adaptive Images in Responsive Web Design
[psuweb] Adaptive Images in Responsive Web Design[psuweb] Adaptive Images in Responsive Web Design
[psuweb] Adaptive Images in Responsive Web Design
 
[refreshpitt] Adaptive Images in Responsive Web Design
[refreshpitt] Adaptive Images in Responsive Web Design[refreshpitt] Adaptive Images in Responsive Web Design
[refreshpitt] Adaptive Images in Responsive Web Design
 
[peachpit] Adaptive Images in Responsive Web Design
[peachpit] Adaptive Images in Responsive Web Design[peachpit] Adaptive Images in Responsive Web Design
[peachpit] Adaptive Images in Responsive Web Design
 
[cssdevconf] Adaptive Images in Responsive Web Design
[cssdevconf] Adaptive Images in Responsive Web Design[cssdevconf] Adaptive Images in Responsive Web Design
[cssdevconf] Adaptive Images in Responsive Web Design
 
[drupalcampatx] Adaptive Images in Responsive Web Design
[drupalcampatx] Adaptive Images in Responsive Web Design[drupalcampatx] Adaptive Images in Responsive Web Design
[drupalcampatx] Adaptive Images in Responsive Web Design
 
xss-100908063522-phpapp02.pdf
xss-100908063522-phpapp02.pdfxss-100908063522-phpapp02.pdf
xss-100908063522-phpapp02.pdf
 
Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )
 
Cross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docx
Cross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docxCross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docx
Cross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docx
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
 
[rwdsummit] Adaptive Images in Responsive Web Design
[rwdsummit] Adaptive Images in Responsive Web Design[rwdsummit] Adaptive Images in Responsive Web Design
[rwdsummit] Adaptive Images in Responsive Web Design
 
Story about module management with angular.js
Story about module management with angular.jsStory about module management with angular.js
Story about module management with angular.js
 
Faster Frontends
Faster FrontendsFaster Frontends
Faster Frontends
 
UI Redressing
UI RedressingUI Redressing
UI Redressing
 
[parisweb] Adaptive Images in Responsive Web Design
[parisweb] Adaptive Images in Responsive Web Design[parisweb] Adaptive Images in Responsive Web Design
[parisweb] Adaptive Images in Responsive Web Design
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
 

Plus de Abhishek Kumar

Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Abhishek Kumar
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Abhishek Kumar
 
xml-motor ~ What,Why,How
xml-motor ~ What,Why,Howxml-motor ~ What,Why,How
xml-motor ~ What,Why,HowAbhishek Kumar
 
Syslog Centralization Logging with Windows ~ A techXpress Guide
Syslog Centralization Logging with Windows ~ A techXpress GuideSyslog Centralization Logging with Windows ~ A techXpress Guide
Syslog Centralization Logging with Windows ~ A techXpress GuideAbhishek Kumar
 
Squid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
Squid for Load-Balancing & Cache-Proxy ~ A techXpress GuideSquid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
Squid for Load-Balancing & Cache-Proxy ~ A techXpress GuideAbhishek Kumar
 
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress Guide
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress GuideEthernet Bonding for Multiple NICs on Linux ~ A techXpress Guide
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress GuideAbhishek Kumar
 
Solaris Zones (native & lxbranded) ~ A techXpress Guide
Solaris Zones (native & lxbranded) ~ A techXpress GuideSolaris Zones (native & lxbranded) ~ A techXpress Guide
Solaris Zones (native & lxbranded) ~ A techXpress GuideAbhishek Kumar
 
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidth
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidthAn Express Guide ~ "dummynet" for tweaking network latencies & bandwidth
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidthAbhishek Kumar
 
An Express Guide ~ Zabbix for IT Monitoring
An Express Guide ~ Zabbix for IT Monitoring An Express Guide ~ Zabbix for IT Monitoring
An Express Guide ~ Zabbix for IT Monitoring Abhishek Kumar
 
An Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
An Express Guide ~ Cacti for IT Infrastructure Monitoring & GraphingAn Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
An Express Guide ~ Cacti for IT Infrastructure Monitoring & GraphingAbhishek Kumar
 
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource MonitoringAn Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource MonitoringAbhishek Kumar
 
Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'
Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'
Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'Abhishek Kumar
 
FreeSWITCH on RedHat, Fedora, CentOS
FreeSWITCH on RedHat, Fedora, CentOSFreeSWITCH on RedHat, Fedora, CentOS
FreeSWITCH on RedHat, Fedora, CentOSAbhishek Kumar
 

Plus de Abhishek Kumar (16)

Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
 
DevOps?!@
DevOps?!@DevOps?!@
DevOps?!@
 
xml-motor ~ What,Why,How
xml-motor ~ What,Why,Howxml-motor ~ What,Why,How
xml-motor ~ What,Why,How
 
XML-Motor
XML-MotorXML-Motor
XML-Motor
 
DevOps with Sec-ops
DevOps with Sec-opsDevOps with Sec-ops
DevOps with Sec-ops
 
Syslog Centralization Logging with Windows ~ A techXpress Guide
Syslog Centralization Logging with Windows ~ A techXpress GuideSyslog Centralization Logging with Windows ~ A techXpress Guide
Syslog Centralization Logging with Windows ~ A techXpress Guide
 
Squid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
Squid for Load-Balancing & Cache-Proxy ~ A techXpress GuideSquid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
Squid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
 
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress Guide
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress GuideEthernet Bonding for Multiple NICs on Linux ~ A techXpress Guide
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress Guide
 
Solaris Zones (native & lxbranded) ~ A techXpress Guide
Solaris Zones (native & lxbranded) ~ A techXpress GuideSolaris Zones (native & lxbranded) ~ A techXpress Guide
Solaris Zones (native & lxbranded) ~ A techXpress Guide
 
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidth
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidthAn Express Guide ~ "dummynet" for tweaking network latencies & bandwidth
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidth
 
An Express Guide ~ Zabbix for IT Monitoring
An Express Guide ~ Zabbix for IT Monitoring An Express Guide ~ Zabbix for IT Monitoring
An Express Guide ~ Zabbix for IT Monitoring
 
An Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
An Express Guide ~ Cacti for IT Infrastructure Monitoring & GraphingAn Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
An Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
 
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource MonitoringAn Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
 
Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'
Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'
Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'
 
FreeSWITCH on RedHat, Fedora, CentOS
FreeSWITCH on RedHat, Fedora, CentOSFreeSWITCH on RedHat, Fedora, CentOS
FreeSWITCH on RedHat, Fedora, CentOS
 

XSS Defeating Concept - Part 2

  • 1. 1 XSS Defeating Concept Part2 ‘Bug As A Service’ WHITEPAPER XSS Defeating Concept Part2 An Approach Eradicating Effect of JavaScript Events in User Input Being A Part of Web2.0 Facilities By, ABK [AbhishekKr] abhikumar163 @ gmail.com http://www.twitter.com/abionic Objective: “Let Security Be Served By Web Server", don't push it on Web Developer. Part.1 Link: http://hackersmag.blogspot.com/2010/09/xss-defeating-poc-if-have-any-time-for.html WHAT WE FACE: The way XSS attack could affect a page is by execution of javascript on it. Now, there are two main ways (as known to me) in which javascript can get executed on the Page #1. any javascript code placed inside "<script/>" ellement on html page #2. any javascript event being called in html page Background Information: The XSS-Defeating PoC Part#1, deals with the issue#1 that is in the earlier part of the PoC it was shown how an unwanted "<script/>" element can be subverted. This allows only website level placed JavaScripts to get loaded in Client-Side Browsers and kill execution capability of anything else. It was attained by conscious injection of a DOM-level bug in the HTML Content generated at Web Server. Hence using 'Bug As A Service'. WHAT WE HAVE: Now, to complete the XSS-Defeating Suite we need to subvert the execution of unwanted Javascript Events also. It could be part of any kind of malicious user content stored and then viewed as facilitation of basic Web2.0 services. Currently it's traditionally being 'escaped' for any kind of unwanted js-event... again the approach which I refuse. The reason is not just of being offensive instead of defensive. -by ABK [http://www.twitter.com/abionic]
  • 2. 2 XSS Defeating Concept Part2 ‘Bug As A Service’ But the main reason is when this approach is implemented in full scale (that's when it is actually helpful), it tends to have major false negative results. So, when you go defensive... you also let several innocent user-input suffer the strictness. http://www.ablog.com/post?p= attacker+pic+%3Cimg+onMouseOver%3D%E2%80%9Dmake_me_victim(my_d etails)%3B%E2%80%9D%3E&user=test&… …<BODY >… <div class=”blog”>attacker pic <img onMouseOver=”make_me_victim(my_details);”> …</BODY>… http://www.ablog.com/post?p= user+pic+%3Cimg+src%3D%E2%80%9Ddefault.jpeg%3B%E2%80%9D%3E& user=test&… …<BODY >… <div class=”blog”>user pic …</BODY>… -by ABK [http://www.twitter.com/abionic]
  • 3. 3 XSS Defeating Concept Part2 ‘Bug As A Service’ Working Mechanism: I propose a web-server-side analysis of all user-inputs (that would have stuff like GET- Request URL-String, POST-Request Body) and placing a bug at every possibility of JS-Event. This bug is placed in a manner that if it's don't have any effect on content display misjudged as JS-event, but also leaves any actual JS-event in a faulty state reduced to error-prone non-executable JS-Content. http://www.ablog.com/post?p= attacker+pic+%3Cimg+onMouseOver%3D%E2%80%9Dmake_me_victim(my_d etails)%3B%E2%80%9D%3E&user=test&… …<BODY >… <div class=”blog”>attacker pic <img onMouseOver<bugMe/>=”make_me_victim(my_details);”> …</BODY>… http://www.ablog.com/post?p= user+pic+%3Cimg+src%3D%E2%80%9Ddefault.jpeg%3B%E2%80%9D%3E&u ser=test&… …<BODY >… <div class=”blog”>user pic <img src=”default.jpg”> …</BODY>… -by ABK [http://www.twitter.com/abionic]
  • 4. 4 XSS Defeating Concept Part2 ‘Bug As A Service’ CONCLUSION So, inclusive of XSS Defeating Concept Part1 and Part2, we can remove any chance of “<script/>” execution or “JS-Events” invocation on Web-Content provided by users of the Web Service. Now, there is no way left for attacker to launch an XSS attack (if web developer doesn’t itself let attackers to inject code into HTTP Headers… now, no security mechanism can protect such developers). Hence, promising Happy Secure Web Development without worrying for the weird obfuscated JS-injected user-input. WHAT’s NEXT Next in the row will be a concept fighting SQL Injection Attacks at Web-Server level, with just some guidelines provided by Web Developer. -by ABK [http://www.twitter.com/abionic]