XSS Hacking Tutorial .:Hacktivism Blackbook 1.0
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A the Hacker
A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. -
Cross Site Scripting Attacks Xss Exploits and Defense.Pdf
436_XSS_FM.qxd 4/20/07 1:18 PM Page ii 436_XSS_FM.qxd 4/20/07 1:18 PM Page i Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and deliv- ering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase via additional mate- rials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you may find an assortment of value- added features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations. -
Flash E Software Libero Stefano Sabatini
Flash e software libero Stefano Sabatini GULCh Cagliari, 2009-10-24 GULCh - Gruppo Utenti Linux Cagliari - www.gulch.it Stefano Sabatini, Flash e software libero 1 La tecnologia alla base di Flash ● Un file flash / SWF (Small Web Format / ShockWave Format) è interpretato da una macchina virtuale Flash ● I file SWF possono essere interpretati sia da un interprete standalone sia da un plugin inserito all'interno del browser. ● Il linguaggio della VM è orientato alla renderizzazione di animazioni ● Motore di rendering basato su grafica scalare ● Il linguaggio solitamente utilizzato per la programmazione degli SWF è un file Action Script (2 / 3), gli ambiente di sviluppo visuale generano automaticamente il codice (programmazione “visuale”). ● Esistono vari formati del linguaggio della VM (SWF 1– SWF 10). ● L'esecuzione di uno swiff è soggetto a delle restrizioni di sicurezza ● Con la tecnologia AIR (Adobe Integrate Realtime) è possibile utilizzare la stessa teconologia di sviluppo e renderizzazione per applicazioni desktop native (senza le limitazioni di sicurezza di Flash) ● A partire da Flash 10, supporto a un motore 3D Cagliari, 2009-10-24 GULCh - Gruppo Utenti Linux Cagliari - www.gulch.it Stefano Sabatini, Flash e software libero 2 La tecnologia alla base di Flash ● Supporto a stream multimediali: ● Video: On2 VP6 (Flash 8), Sorenson Spark (Flash 6/7), H.264 (Flash 10) ● Audio: MP3, Nellymoser, Speex (Flash 10), ADPCM ● Tecnologia di comunicazione e streaming multimediale (RTMP, RTMPT, RTMPS, RTMPE) Cagliari, 2009-10-24 GULCh - Gruppo Utenti Linux Cagliari - www.gulch.it Stefano Sabatini, Flash e software libero 3 Ambiti di utilizzo di Flash ● Presentazione di elementi multimediali all'interno di pagine web (youtube / vimeo / facebook) ● Inclusione di animazioni all'interno di pagine web (e.g. -
Entwicklung Interaktiver Quizzes Mit Hilfe Von Adobe Flash, MTASC Und XML
Institut für Wissensmedien Studienarbeit Entwicklung interaktiver Quizzes mit Hilfe von Adobe Flash, MTASC und XML Thomas Lempa Koblenz, den 27. Juli 2006 Prüfer: Dr. Ingo Dahn Betreuer: Dipl.-Inf., Dipl.-Ing.(FH) Marc Santos STUDIENARBEIT -THOMAS LEMPA Selbstständigkeitserklärung Hiermit erkläre ich, daß ich die vorliegende Arbeit selbstständig angefertigt, nicht ander- weitig zu Prüfungszwecken vorgelegt und keine anderen als die angegebenen Hilfsmittel verwendet habe. Sämtliche wissentlich verwendete Textausschnitte, Zitate oder Inhalte anderer Verfasser wurden ausdrücklich als solche gekennzeichnet. Ja Nein Mit der Einstellung der Arbeit in die Bibliothek bin ich einverstanden. Der Veröffentlichung dieser Arbeit im Internet stimme ich zu. Koblenz, den 27. Juli 2006 Lempa Thomas 2 2 Abstract Zielsetzung: Für die Feuerwehr- und Katastrophenschutzschule Rheinland - Pfalz (LFKS) sollen auf der Basis von Flash und XML interaktive Quizzes realisiert werden, die im Rahmen des Gruppenführerlehrgangs als Lernerfolgskontrolle dienen sollen. Als Grundlage wird ein selbstentwickeltes MVC Framework und Adobe (ehemals Macro- media) Flash herangezogen. Entwicklung: Bei der Entwicklung der Quizzes wurde sehr viel Wert auf eine sys- temunabhängige, bestmöglich standardisierte Datenhaltung gelegt. Hier war die Verbin- dung von Flash und XML eine optimale Lösung. Technik: Mit der Kombination aus ActionScript2, XML und Flash ist es möglich, in- nerhalb kürzester Zeit unterschiedliche Quizzes zu erstellen. Der Grundgedanke bei die- ser Technik ist es, Daten und ihre Repräsentation zu trennen. Die Flash Entwicklungs- umgebung wird für die Erstellung der Views (Darstellungselemente) verwendet. Die Views werden anhand von dynamischen Textfeldern, interaktiven Animationen und wei- teren Darstellungselementen definiert. Diese Views werden über das MVC-Framework mit Actionscript2 angesprochen und mit Inhalten aus einer externen XML Datei gefüllt. -
A Look at Flash Tools for the Linux Environment FLASHFLASH ININ LINUXLINUX Sasan Saidi
COVER STORY Linux Flash Options A Look at Flash tools for the Linux environment FLASHFLASH ININ LINUXLINUX Sasan saidi, www.sasan.tv saidi, Sasan Flash is today’s tool of choice for animated, interactive web content. But Flash and Linux are worlds colliding. We'll show you the current crop of Open Source Flash authoring solutions. BY JENS FRANKE lash began in 1995, when Future- still the tool that can’t do anything apart And IBM chose Flash as the output Wave presented a forerunner from create annoying intros and flashing format for displaying the content of so- Fknown as FutureSplashAnimator. banners, but that’s a pity, because Flash called Rich Internet Applications on its One year later, Macromedia acquired has come of age. Major IT players are OpenLaszlo open source platform. FutureWave, publishing the first version implementing tools for creating Flash- You may be wondering about some of of Flash in 1997. based user interfaces, such as such as the problems associated with Flash, as Most Flash movies are created in the SAP’s next version of NetWeaver [2]. enumerated by usability guru Jakob Macromedia Flash authoring environ- ment. The file format used with Flash Flash Teething Trouble movies is known as Small Web Format Giving the back button its usual Search engine friendly Flash pages: (SWF). The Macromedia Flash Player [1] function back: http:// codeazur. com. br/ stuff/ fugsp/ has a virtual monopoly on playing SWF http:// www. actionscripts. org/ tutorials/ Flash accessibility support heading in files; according to Macromedia, the fig- intermediate/ Enabling_a_back_button_ the right direction: http:// www. -
Copyrighted Material
31136bindex.qxd 5/22/07 8:30 PM Page 349 Index Note to the Reader: Throughout this index bold- dissolves, 258–265 faced page numbers indicate primary discussions filters, 215–220 of a topic. Italicized page numbers indicate FotoBooth application, 270–277 illustrations. masks, 199–206, 207 Media Player, 152–154 metadata A reading, 160, 161 video duration, 163–164 abstract objects, 58 progressive delivery, 48–49, 50 access control lists (ACLs), 308 streaming delivery, 51–52 access control to streams and recording, 308–309 transitions, 225–230 Accordion components, 132 video snapshots, 239–245 ACLs (access control lists), 308 videoconferencing application, 300–305 Action Message Format (AMF), 187 ActionScript Virtual Machine (AVM2), 65 349 ActionScript 2 (AS2) versions addASCuePoint method, 166–167 ■ vs. AS3, 64–66 addEventListener method INDEX bandwidth checking, 111–114 Component, 332 cue points VideoPlayer, 254 captions, 173, 174, 175 Administration Console, 296 chapter links, 178–180, 178 Adobe DevCenter, 313 dynamic, 171 Align property, 79 reading, 168–169 alpha channels dissolves filters with, 207–208, 208 bitmaps for, 246–254 vs. masks, 193 transitions class, 254–257 transparency, 19–20, 193 filters, 210–215 video settings, 34–35 FotoBooth application, 266–270, 267 alternatives in proposals, 12–13 masks, 193–198, 198–199 AMF (Action Message Format), 187 Media Player Animation Codec setting, 20 structure, 94–98 animHandler method, 195, 205 XML playlist in, 149–151 AnimMask.as file, 200 metadata App.as file reading, 160, 161 AS2, 248–250 video duration, 162–163 AS3, 258–260 progressive delivery, 46–47, 47–48 Application class, 291 streaming delivery, 50–51 applyFilter method, 233 transitions, 221–225 archiving, 127 video snapshots, 235–239, COPYRIGHTED235 arrays MATERIAL videoconferencing application, 298–300 cue points, 165 ActionScript 3 (AS3) versions in ListBoxes, 137–138, 138 vs. -
Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-Site Scripting Martin Johns
Dissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting Martin Johns Eingereicht an der Fakult¨atf¨urInformatik und Mathematik der Universit¨atPassau Gutachter: Prof. Dr. Joachim Posegga Prof. Dr. Dieter Gollmann Submitted April 14th 2009, defended July 22nd 2009 2 Abstract The majority of all security problems in today’s Web applications is caused by string- based code injection, with Cross-site Scripting (XSS) being the dominant representative of this vulnerability class. This thesis discusses XSS and suggests defense mechanisms. We do so in three stages: First, we conduct a thorough analysis of JavaScript’s capabilities and explain how these capabilities are utilized in XSS attacks. We subsequently design a systematic, hierarchical classification of XSS payloads. In addition, we present a comprehensive sur- vey of publicly documented XSS payloads which is structured according to our proposed classification scheme. Secondly, we explore defensive mechanisms which dynamically prevent the execution of some payload types without eliminating the actual vulnerability. More specifically, we discuss the design and implementation of countermeasures against the XSS payloads “Session Hijacking”, “Cross-site Request Forgery”, and attacks that target intranet re- sources. We build upon this and introduce a general methodology for developing such countermeasures: We determine a necessary set of basic capabilities an adversary needs for successfully executing an attack through an analysis of the targeted payload type. The resulting countermeasure relies on revoking one of these capabilities, which in turn renders the payload infeasible. Finally, we present two language-based approaches that prevent XSS and related vul- nerabilities: We identify the implicit mixing of data and code during string-based syn- tax assembly as the root cause of string-based code injection attacks. -
Testing and Exploiting Flash Applications
Testing and exploiting Flash applications fukami @ Chaos Communication Camp, Finowfurt, 2007 Agenda • Introduction • Definitions • Flash and ActionScript Basics • Flash exploitation • Exploits and attacks using Flash • Security on AIR The speaker • works for SektionEins as security consultant and researcher. • deals with web security since 1998 (with interrupts). • recently started FlashSec, a project for documenting and developing methodologies for Flash security auditing. Motivation for this talk • Flash is widely used, the plugin is often activated • Flash has some very funny vectors in sense of security • Interesting bugs and design flaws in player and media servers :) • Start of a Flash security project - www.flashsec.org • Note: Many slides are taken from Stefano di Paolas excellent OWASP talk Some definitions • SWF: Small Web Format / ShockWave Flash • FLA: Proprietary Flash source files used by Adobe Flash IDE • FLV: Flash Video • AS: ActionScript AIR: Adobe Integrated Runtime, Flash/Flex/HTML Desktop • Client • Flex: Flash 9/ActionScript 3 IDE with interface libraries • MXML: XML Interface Markup Language • FDS/LiveCycle: J2EE Services for Flash Remoting • RTMP / RTMPT: Real Time Messaging Protocol (Tunneled) • ABC: ActionScript Byte Code Public Research • Eye On Security (Aug 02) The Flash! Attack Flash Movie with ActionScript function: getURL('javascript: evilcode; ') • Scan Security Wire (Apr 03) Misuse of Macromedia Flash Ads clickTAG getURL (clickTag,'_self'); • Amit Klein (Jul 06) Forging HTTP Request Headers with Flash ActionScript • Stefan Esser (Okt 06) Poking new holes with Flash Crossdomain Policy Files Public Research • Martin Johns, Kanatoko Anvil (Jan 07) Anti-DNS Pinning with AS3 Flash-based scanner (DNS rebinding) • Stefano di Paolo (Mai 07) Talk: Testing Flash Applications bei der OWASP Konferenz in Mailand • There are also quite some advisories regarding Flash Player, JRun, ColdFusion etc. -
Flash Security Basics
Flash Security Basics fukami @ GPN6, Karlsruhe Agenda • Motivation • Begriffsdefinitionen • Public Research • Was ist Flash? • SWF Interpreter • ActionScript • Shared Objects • Embedding Flash • Variablen Handling • Security Model • Client Side Attacks • Flash Testing • asfunction - Pseudo Protokoll • PNDF • Metadata Injection • Backdooring Flash • Flash und Sockets Motivation • Flash ist weit verbreitet, Plugin im Browser ist oft aktiv und somit ein interessanter Angriffsvektor • Relativ wenig Security Research bisher • Einige sehr interessante Parser-Bugs in Player und Media Server :) • “Flash is evil” kennt jeder - aber was steckt wirklich dahinter • Spielereien mit Sockets und AS3 • Vorneweg: Dieser Vortrag ist weitgehend mit Stefano di Paolas (Wisec) exzellentem OWASP- Vortrag identisch Begriffsdefinitionen • SWF: Small Web Format / ShockWave Flash • FLA: Flash Quelldateien • FLV: Flash Video • AS: ActionScript Source • Flex: IDE bzw. Eclipse Plugin • MXML: Macromedia XML Interface Markup Language • FDS: Flex Data Services (J2EE App für Flex-based RIAs) • RTMP / RTMPT: Real Time Messaging Protocol (Tunneled) Public Research • Eye On Security (Aug 02) The Flash! Attack Flash Movie mit ActionScript Funktion: getURL('javascript: evilcode; ') • Scan Security Wire (Apr 03) Misuse of Macromedia Flash Ads clickTAG getURL (clickTag,'_self'); • PDP Architect (Sep 06) Backdooring Flash Objects Existierenden Flash Film in ein malicious SWF laden Public Research • Stefan Esser (Okt 06) - Poking new holes with Flash Crossdomain Policy Files • Martin -
A Study of Malware Propagation Via Online Social Networking
A Study of Malware Propagation via Online Social Networking Mohammad Reza Faghani and Uyen Trang Nguyen Abstract The popularity of online social networks (OSNs) have attracted malware creators who would use OSNs as a platform to propagate automated worms from one user’s computer to another’s. On the other hand, the topic of malware propaga- tion in OSNs has only been investigated recently. In this chapter, we discuss recent advances on the topic of malware propagation by way of online social networking. In particular, we present three malware propagation techniques in OSNs, namely cross site scripting (XSS), Trojan and clickjacking types, and their characteristics via analytical models and simulations. 1 Introduction Online social networks (OSNs) such as Facebook, Twitter and MySpace have pro- vided hundreds of millions of people worldwide with a means to connect and com- municate with their friends, family and colleagues geographically distributed all around the world. The popularity and wide spread usage of OSNs have also attracted attackers and hackers who would use OSNs as a platform to propagate automated worms from one user’s computer to another’s. The population of potential victims of web-based malware is much larger than that of other types of worms due to the popularity of the world wide web. In ad- dition, web-based worms are not banned through web proxies and network address translation (NAT) processes. Research has shown that web-based malware can prop- agate much faster than traditional malware [13]. As a matter of fact, the first OSN Mohammad Reza Faghani York University, Department of Computer Science and Engineering, Toronto, ON, Canada, M3J 1P3 e-mail: [email protected] Uyen Trang Nguyen York University, Department of Computer Science and Engineering, Toronto, ON, Canada, M3J 1P3 e-mail: [email protected] 1 2 Mohammad Reza Faghani and Uyen Trang Nguyen worm that hit MySpace in 2005 by exploiting a cross site scripting vulnerability in a MySpace web application infected about one million victims within 24 hours [13]. -
A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks Mohammad Reza Faghani, Student Member, IEEE, and Uyen Trang Nguyen,Member,IEEE
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 11, NOVEMBER 2013 1815 A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks Mohammad Reza Faghani, Student Member, IEEE, and Uyen Trang Nguyen,Member,IEEE Abstract—We present analytical models and simulationresults creator embeds the malicious code into his/her (usually fake) that characterize the impacts of the following factors on the profile or wall. In the second step, any person who subsequently propagation of cross-site scripting (XSS) worms in online social visits the infected profile will inadvertently execute the em- networks (OSNs): 1) user behaviors, namely, the probability of visiting a friend’s profile versus a stranger’s; 2) the highly bedded malicious code. An XSS flaw (such as the one exploited clustered structure of communities; and 3) community sizes. Our by Samy) will help the worm to execute the malicious code in analyses and simulation results show that the clustered structure the visitor’s browser while an AJAX (Asynchronous JavaScript of a community and users’ tendency to visit their friends more and XML) technology unintentionally enables the code to often than strangers help slow down the propagation of XSS embed itself into the visitor’s profile. The visitor’s profile then worms in OSNs. We then present a study of selective monitoring schemes that are more resource efficient than the exhaustive becomes infected, which allows the worm to propagate further checking approach used by the Facebook detection system which in the OSN [1]. monitors every possible read and write operation of every user There has not been any in-depth research on XSS worms and in the network. -
Instrucciones Para La Preparación De Ponencias Para Informática
CAZABE: HERRAMIENTA DE AUTOR LIBRE PARA FLASH CAZABE: FREE AUTHORING TOOL FOR FLASH Darien Alonso Camacho Joven Club de Computación y Electrónica, Cuba, [email protected], Colón #222A Sagua la Grande, Villa Clara RESUMEN Cazabe could be useful to designers, cartoons El presente documento refleja un estudio makers and software developers. It might avoid realizado acerca de las opciones para la creación paying for licence of proprietary software. de animaciones y software multimedia usando tecnología flash sobre plataformas GNU/Linux. KeyWords: Flash, free software, linux, open Dada la ausencia de un entorno de desarrollo source integrado para flash en este sistema operativo, se comenzó un proyecto práctico e investigativo que permita suplir esta carencia. Se concibió un 1. INTRODUCCIÓN desarrollo colaborativo, de software libre y código Cuando en el año 2009 fueron creados los abierto, con resultados satisfactorios en la Grupos de Desarrollo de Software en los Joven implementación de la herramienta debido a que Club de Computación y Electrónica (JCCE) de se obtuvo una versión preliminar pero funcional de Cuba, se informó por parte de la dirección que el la misma. perfil de trabajo de los mismos sería el desarrollo Cazabe puede ser útil para diseñadores, de software multimedia y juegos. La plataforma animadores y desarrolladores de software en flash es ampliamente usada en entornos Microsoft general y además evitará el pago de licencias de Windows para la creación de este tipo de programas propietarios de este tipo. programas, sin embargo, al intentar usar únicamente software de código abierto para este Palabras Clave: Flash, software libre, linux, propósito, se llegó a la conclusión de que no código abierto existe una herramienta, distribuida bajo alguna licencia de software libre, que sea lo suficientemente usable para cumplir en tiempo ABSTRACT con un proyecto de envergadura.