Well as fashionable walk all that is
XSS, and the amount of
sites vulnerable to them, I will show one of its many uses deception. First is Phishing is the how to deceive the victim
believe that making a site
confidence when in fact one evil, in order to steal data (name, username, passwords, credit card
, etc.).
There is a difference with the common
through XSS. Example: suppose we are a customer of a bancoX
, and their income is http://bancoX.com/login.php page, an attacker could encourage the victim
through some form of engineering
enter your social site made by evil, has
telling him to believe that in the original, where the site is http://sitiomaligno/bancoX/login.php evil.
So one way to always verify that this is a phishing
direction is to look at our
browser and make sure we are where we wanted
enter. The with
XSS Phishing
is much more efficient, because the attacker exploits the trust that the customer has with that domain, and by injection HTML
can fool the person requesting the data, and the user can
Watch
address your browser
and effective
mind will
positioned in the right
site you trust. For better understanding, I will show a realto this article.
site, which is the site of
Luis A.
square. This company is by far the most prestigious sales
computer inputs
of Corrientes and Resistencia Chaco Capital, but does not seem to care much about the safety of their customers.
What caught my attention
was this link,
http://www.luiscuadrado.com/login.php
, and that's when I decided
Being user of products we buy and where they can be sent to the address.
CHECKING THE FAILURE Well the fault lies in a variable, $
_id products, which it does is take a number to a query to its database, and then brings of the product information concerned. Now if the number passed $
products _id = 1249, also of this article with id = 1249, the value is printed on the screen without passing through any filter :).
First Example: http://www.luiscuadrado.com/product_info.php?products_id=1249% 20% 3 Cscript% 3Ealert% 28123% 29% 3C/script% 3E opps ! XSS !.
now see something more beautiful, and more detail what you did was create a script in php with a form asking Email and Password, and that data is saved to a text file, the injection is through an iframe . Second Example: http://www.luiscuadrado.c om / product_info.php? Products_id = 1249% 20% 3Ciframe% 20src = http://www.google.com% 20height =% 22300% 2 2%
20 width =% 22800% 22% 3E% 3C / iframe % 3E Google
square on the page! je .. Now there is something better, which is NDRI do what we were talking insert a form asking for email and password ..
See form logging , quietly you can fool people asking for your keys and then get into the system. (Currently not the link and I'll upload the php
to create a server friend to see it PC from browser ). The data is stored in a txt file
.
The
scenario is ready, it only
that would
is to use the imagination to deceive their customers. And perhaps have some input of computing more! XD
Prevention:
All variables shown the screen should be passed by filter
, not to have this kind of problem,
obviously it depends on the quality of the programmer, since not only faced with XSS but also or CRSF XSRF where that gets hurt is the end user. recommend using aggregates as
Noscript for firefox , and always be aware of possible mail, sms , messages for msn , we send a site where we ask our users and data X any reason, be sure that where we are is who they claim to be.! More
Documentation
http://itfreekzone.blogspot.com/2009/12/cruzando-informacion-cross-site.html http://itfreekzone.blogspot. com/2009/12/rompiendo-lo-grande-xss-avanzado.html
Greetings!
0 comments:
Post a Comment