SlideShare une entreprise Scribd logo
1  sur  11
XSS: Cross-site scripting
Ziv Ginsberg
What are we going to learn today?
• Types of XSS:
• Non-Persistent
(Reflected)
• Persistent (Stored)
• Blind XSS
• DOM
• How it works
• Examples
• How to defend most
#2 most common hacking method
Cross Site Scripting (XSS)
13%
SQL Injection
19%
Daniel of Service
8%
Predictable Resource
Location
4%
Unintentional Information
Disclosure
4%
Unknown
19%
Brute Force
4%
Credential / Session
Prediction
2%
More
27%
Types of XSS: Cross Site Scripting
Non-Persistent
(Reflected)
Reflected immediately on
the page by server-side
CSRF: Cross-Site Request Forgery
Redirect to another site
display text that seems to come
from the site owners. Think
phishing.
Steal secrets that are stored in JS
variables.
display a password input, log
keystrokes, and send the result to a
site of your choosing
Persistent (Stored)
Saved by the server
without the need to individually
target victims
Cookie theft
Data theft
DOM
client (browser) side injection issue
Can do everything
Example 2: Persistent (Stored)
<a href="http://www.mybank.com/transfer?acc=jon&amount=1000&for=attacker">Something</a>
Example 1: Non-Persistent (Reflected)
Samy worm - infected over 1 million MySpace profiles in less than 20 hours.
Example 3: DOM Based XSS
Using a built-in object and manipulate it
Blind XSS: What is it?
1 MonthDay 1 2 Month
Then after some time the
Script get executed (:
Blind XSS is that attacker “blindly” deploys a series of malicious payloads
on web pages that are likely to save them to a persistent state (like in a
database, or in a log file), and waits…
References ADAM BALDWIN: DEFCON 20: Blind XSS
Blind XSS - How is it working?
Preventing Blind XSS Attacks
Xploiting Google Gadgets:
Gmalware and Beyond
XSS hole in gmodules.com
 Gmodules is a platform to test and host your google gadget.
 XSS Vulnerability documented by Rsnake in 2007 found that anyone
can run xss attack on Gmodules.com which is a domain owned by
google.
 Gmodules can also be a platform to host your malware.
 Gmodules is a domain host by google and can be used for phishing
activity.
References Robert Hansen and Tom Stracener: Xploiting Google Gadgets: Gmalware and Beyond
Example of Gadgets Hack
Yosi *******
********
********
Yosi ********
What is xss, blind xss and xploiting google gadgets

Contenu connexe

Tendances

Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
Manish Kumar
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
OWASP Khartoum
 

Tendances (20)

Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
 
Cross Site Scripting - Mozilla Security Learning Center
Cross Site Scripting - Mozilla Security Learning CenterCross Site Scripting - Mozilla Security Learning Center
Cross Site Scripting - Mozilla Security Learning Center
 
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
 
Cross Site Scripting(XSS)
Cross Site Scripting(XSS)Cross Site Scripting(XSS)
Cross Site Scripting(XSS)
 
Reflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site ScriptingReflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site Scripting
 
Xss (cross site scripting)
Xss (cross site scripting)Xss (cross site scripting)
Xss (cross site scripting)
 
Cross Site Scripting Going Beyond the Alert Box
Cross Site Scripting Going Beyond the Alert BoxCross Site Scripting Going Beyond the Alert Box
Cross Site Scripting Going Beyond the Alert Box
 
Cross site scripting attacks and defenses
Cross site scripting attacks and defensesCross site scripting attacks and defenses
Cross site scripting attacks and defenses
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
 
Cross site scripting
Cross site scripting Cross site scripting
Cross site scripting
 
XSS- an application security vulnerability
XSS-   an application security vulnerabilityXSS-   an application security vulnerability
XSS- an application security vulnerability
 
Understanding dom based xss
Understanding dom based xssUnderstanding dom based xss
Understanding dom based xss
 
Xss talk, attack and defense
Xss talk, attack and defenseXss talk, attack and defense
Xss talk, attack and defense
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
 
XSS
XSSXSS
XSS
 
XSS Injection Vulnerabilities
XSS Injection VulnerabilitiesXSS Injection Vulnerabilities
XSS Injection Vulnerabilities
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
 

En vedette

Cross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement TechniquesCross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement Techniques
Ronan Dunne, CEH, SSCP
 
20 medical physics techniques
20 medical physics techniques20 medical physics techniques
20 medical physics techniques
mrrayner
 
Yeats, Study of Selected Poems
Yeats, Study of Selected PoemsYeats, Study of Selected Poems
Yeats, Study of Selected Poems
J Aragonite
 
การตอบสนองต่อสิ่งเร้าของพืช
การตอบสนองต่อสิ่งเร้าของพืชการตอบสนองต่อสิ่งเร้าของพืช
การตอบสนองต่อสิ่งเร้าของพืช
Wanwime Dsk
 
The tunnel powerpoint
The tunnel powerpointThe tunnel powerpoint
The tunnel powerpoint
ishict
 

En vedette (15)

Cross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement TechniquesCross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement Techniques
 
Central Sterile & Supply Department (CSSD)
Central Sterile & Supply Department (CSSD)Central Sterile & Supply Department (CSSD)
Central Sterile & Supply Department (CSSD)
 
caffiene and theine
caffiene and theinecaffiene and theine
caffiene and theine
 
Sunstrike - Douglas Livingstone
Sunstrike - Douglas LivingstoneSunstrike - Douglas Livingstone
Sunstrike - Douglas Livingstone
 
Monumentos griegos
Monumentos griegosMonumentos griegos
Monumentos griegos
 
20 medical physics techniques
20 medical physics techniques20 medical physics techniques
20 medical physics techniques
 
Yeats, Study of Selected Poems
Yeats, Study of Selected PoemsYeats, Study of Selected Poems
Yeats, Study of Selected Poems
 
DSC and DTA
DSC and DTADSC and DTA
DSC and DTA
 
Kinesiology of the Shoulder
Kinesiology of the ShoulderKinesiology of the Shoulder
Kinesiology of the Shoulder
 
การตอบสนองต่อสิ่งเร้าของพืช
การตอบสนองต่อสิ่งเร้าของพืชการตอบสนองต่อสิ่งเร้าของพืช
การตอบสนองต่อสิ่งเร้าของพืช
 
B 5 肺エコー
B 5 肺エコーB 5 肺エコー
B 5 肺エコー
 
NurseReview.Org Thorax & Lungs
NurseReview.Org Thorax & LungsNurseReview.Org Thorax & Lungs
NurseReview.Org Thorax & Lungs
 
Thesis Identifying Activity
Thesis Identifying ActivityThesis Identifying Activity
Thesis Identifying Activity
 
The tunnel powerpoint
The tunnel powerpointThe tunnel powerpoint
The tunnel powerpoint
 
Rate of reaction temperature
Rate of reaction   temperatureRate of reaction   temperature
Rate of reaction temperature
 

Similaire à What is xss, blind xss and xploiting google gadgets

Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
Jeremiah Grossman
 
Xss 101 by-sai-shanthan
Xss 101 by-sai-shanthanXss 101 by-sai-shanthan
Xss 101 by-sai-shanthan
Raghunath G
 
AtlasCamp 2010: Securing your Plugin - Penny Wyatt
AtlasCamp 2010: Securing your Plugin - Penny WyattAtlasCamp 2010: Securing your Plugin - Penny Wyatt
AtlasCamp 2010: Securing your Plugin - Penny Wyatt
Atlassian
 

Similaire à What is xss, blind xss and xploiting google gadgets (20)

XSS.pdf
XSS.pdfXSS.pdf
XSS.pdf
 
XSS.pdf
XSS.pdfXSS.pdf
XSS.pdf
 
Not only a XSS
Not only a XSSNot only a XSS
Not only a XSS
 
Security testing for web developers
Security testing for web developersSecurity testing for web developers
Security testing for web developers
 
Cross Site scripting Attacks - by Adam Nurudini
Cross Site scripting Attacks - by Adam NurudiniCross Site scripting Attacks - by Adam Nurudini
Cross Site scripting Attacks - by Adam Nurudini
 
CROSS SITE SCRIPTING.ppt
CROSS SITE SCRIPTING.pptCROSS SITE SCRIPTING.ppt
CROSS SITE SCRIPTING.ppt
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
BsidesDelhi 2018: DomGoat - the DOM Security Playground
BsidesDelhi 2018: DomGoat - the DOM Security PlaygroundBsidesDelhi 2018: DomGoat - the DOM Security Playground
BsidesDelhi 2018: DomGoat - the DOM Security Playground
 
Web hack & attacks
Web hack & attacksWeb hack & attacks
Web hack & attacks
 
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities.pptx
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities.pptxA Survey of Exploitation and Detection Methods of XSS Vulnerabilities.pptx
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities.pptx
 
Cross Site Scripting: Prevention and Detection(XSS)
Cross Site Scripting: Prevention and Detection(XSS)Cross Site Scripting: Prevention and Detection(XSS)
Cross Site Scripting: Prevention and Detection(XSS)
 
Xss 101 by-sai-shanthan
Xss 101 by-sai-shanthanXss 101 by-sai-shanthan
Xss 101 by-sai-shanthan
 
Xss 101
Xss 101Xss 101
Xss 101
 
Preventing In-Browser Malicious Code Execution
Preventing In-Browser Malicious Code ExecutionPreventing In-Browser Malicious Code Execution
Preventing In-Browser Malicious Code Execution
 
Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )
 
New Insights into Clickjacking
New Insights into ClickjackingNew Insights into Clickjacking
New Insights into Clickjacking
 
Xss ppt
Xss pptXss ppt
Xss ppt
 
4774.projectb.securitysquad
4774.projectb.securitysquad4774.projectb.securitysquad
4774.projectb.securitysquad
 
AtlasCamp 2010: Securing your Plugin - Penny Wyatt
AtlasCamp 2010: Securing your Plugin - Penny WyattAtlasCamp 2010: Securing your Plugin - Penny Wyatt
AtlasCamp 2010: Securing your Plugin - Penny Wyatt
 
bh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdfbh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdf
 

Dernier

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Dernier (20)

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

What is xss, blind xss and xploiting google gadgets

  • 2. What are we going to learn today? • Types of XSS: • Non-Persistent (Reflected) • Persistent (Stored) • Blind XSS • DOM • How it works • Examples • How to defend most
  • 3. #2 most common hacking method Cross Site Scripting (XSS) 13% SQL Injection 19% Daniel of Service 8% Predictable Resource Location 4% Unintentional Information Disclosure 4% Unknown 19% Brute Force 4% Credential / Session Prediction 2% More 27%
  • 4. Types of XSS: Cross Site Scripting Non-Persistent (Reflected) Reflected immediately on the page by server-side CSRF: Cross-Site Request Forgery Redirect to another site display text that seems to come from the site owners. Think phishing. Steal secrets that are stored in JS variables. display a password input, log keystrokes, and send the result to a site of your choosing Persistent (Stored) Saved by the server without the need to individually target victims Cookie theft Data theft DOM client (browser) side injection issue Can do everything
  • 5. Example 2: Persistent (Stored) <a href="http://www.mybank.com/transfer?acc=jon&amount=1000&for=attacker">Something</a> Example 1: Non-Persistent (Reflected) Samy worm - infected over 1 million MySpace profiles in less than 20 hours. Example 3: DOM Based XSS Using a built-in object and manipulate it
  • 6. Blind XSS: What is it? 1 MonthDay 1 2 Month Then after some time the Script get executed (: Blind XSS is that attacker “blindly” deploys a series of malicious payloads on web pages that are likely to save them to a persistent state (like in a database, or in a log file), and waits… References ADAM BALDWIN: DEFCON 20: Blind XSS
  • 7. Blind XSS - How is it working?
  • 9. Xploiting Google Gadgets: Gmalware and Beyond XSS hole in gmodules.com  Gmodules is a platform to test and host your google gadget.  XSS Vulnerability documented by Rsnake in 2007 found that anyone can run xss attack on Gmodules.com which is a domain owned by google.  Gmodules can also be a platform to host your malware.  Gmodules is a domain host by google and can be used for phishing activity. References Robert Hansen and Tom Stracener: Xploiting Google Gadgets: Gmalware and Beyond
  • 10. Example of Gadgets Hack Yosi ******* ******** ******** Yosi ********