Monday, February 1, 2010

Luggage Combination Reset

ie_aurora via XSS (POC Luis A. Square) Denial of Service elhacker.net

Well as fashionable walk all that is


XSS, and the amount of
  sites vulnerable to them, I will show one of its many uses deception. First is    Phishing is the how to deceive the victim 

believe that making a site

confidence when in fact one evil, in order to steal data (name, username, passwords, credit card

, etc.).
There is a difference with the common

phishing what is the Phishing


through XSS. Example: suppose we are a customer of a bancoX , and their income is http://bancoX.com/login.php page, an attacker could

encourage the victim

through some form of engineering

enter your social site made by evil, has
 


telling him to believe that in the original, where the site is http://sitiomaligno/bancoX/login.php evil.
So one way to always verify that this is a phishing


direction is to look at our


browser and make sure we are where we wanted

enter. The with
XSS Phishing
is much more efficient, because the attacker exploits the trust that the customer has with that domain, and by injection HTML
can fool the person requesting the data, and the user can
Watch


address your browser

and effective

mind will



positioned in the right
 site you trust.   For better understanding, I will show a real 

site, which is the site of
Luis A.
square. This company is by far the most prestigious sales
computer inputs
of Corrientes and Resistencia Chaco Capital, but does not seem to care much about the safety of their customers.
What caught my attention

was this link,
http://www.luiscuadrado.com/login.php
, and that's when I decided
to this article.





Being user of products we buy and where they can be sent to the address.

CHECKING THE FAILURE Well the fault lies in a variable, $

_id products, which it does is take a number to a query to its database, and then brings of the product information concerned. Now if the number passed $

products _id = 1249, also of this article with id = 1249, the value is printed on the screen without passing through any filter :).
First Example: http://www.luiscuadrado.com/product_info.php?products_id=1249% 20% 3 Cscript% 3Ealert% 28123% 29% 3C/script% 3E opps ! XSS !.
now see something more beautiful, and more detail what you did was create a script in php with a form asking Email and Password, and that data is saved to a text file, the injection is through an iframe . Second Example: http://www.luiscuadrado.c om / product_info.php? Products_id = 1249% 20% 3Ciframe% 20src = http://www.google.com% 20height =% 22300% 2 2%
20 width =% 22800% 22% 3E% 3C / iframe % 3E Google
square on the page! je .. Now there is something better, which is NDRI do what we were talking insert a form asking for email and password ..

See form logging , quietly you can fool people asking for your keys and then get into the system. (Currently not the link and I'll upload the php
to create a server friend to see it PC from browser ). The data is stored in a txt file

.




The
scenario is ready, it only
that would
is to use the imagination to deceive their customers. And perhaps have some input of computing more! XD

Prevention:

All variables shown the screen should be passed by filter
, not to have this kind of problem,
obviously it depends on the quality of the programmer, since not only faced with XSS but also or CRSF XSRF where that gets hurt is the end user. recommend using aggregates as

Noscript for firefox , and always be aware of possible mail, sms , messages for msn , we send a site where we ask our users and data X any reason, be sure that where we are is who they claim to be.! More
Documentation


http://itfreekzone.blogspot.com/2009/12/cruzando-informacion-cross-site.html http://itfreekzone.blogspot. com/2009/12/rompiendo-lo-grande-xss-avanzado.html


Greetings!



0 comments:

Post a Comment