Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
Q and A on cross site request forgeries and breaking into sessions. It's one of the attacks that XSS enables and the attack of the future. For Session, fixations, hijacking, lockout, replay, session riding etc.... 

Current Page: 1 of 1
Results 1 - 15 of 15
1 year ago
acemutha
Hi Albino, thank you for your email, but can you be more detailed about what techniques allow you to do what you said apart from intercepting traffic a la MitM? Thanks
Forum: XSS Info
1 year ago
acemutha
Hi guys, is it possible to exploit a XSS reflected in cookies? Thanks
Forum: XSS Info
3 years ago
acemutha
Skyphire Wrote: -------------------------------------------------------> > WIFI networks. > If they don't clone MAC's, they leave their MAC > address behind in the router/access-point logs. > It's pretty hard to replace a network card inside > a laptop, one has to clone macs continuously. In > theory, MAC's can be traced back to a the store > where the laptop was p
Forum: OMG Ponies
4 years ago
acemutha
Thanks for the answer but I slightly modified it to suit my needs to test it avoiding auto-submit like this: <form type="text/plain" method="post" action="http://victim.it/jsonrpc"> <input name='{x:"'value='",id:8,method:"contentBridge.setComponentValue",params:["7.92998","name", "Welcome", "", {
Forum: XSS Info
4 years ago
acemutha
Hi all I know very little about json and I'd like you to ask if it's possible to replay a json post request like: {id:8,method:"contentBridge.setComponentValue",params:["7.92998", "name", "Welcome", "", {"javaClass": "java.util.HashMap", "map": {"en": false, "es": false, "de": false, &q
Forum: XSS Info
4 years ago
acemutha
@PaPPy Yeah sorry It was a typo I meant phishing, and It was included in the title because it's a phishing attack. @lightos Thank you a lot for your answer. It's not exactly what I meant in fact when you click on the link you are directed to milw0rm. I was wondering if it was possible in this example overlap the address bar reporting www milw0rm com with a flash reporting www google com.
Forum: XSS Info
4 years ago
acemutha
There is no need of being rude if don't know the answer just ignore my post and don't make me waste my time reading yours. And by the way when someone came up with clickjacking, he wasn't accused of being a phisher. Secondly I was only asking if it was feasible, not how to do it. And lastly I'm concerned since I'm a penetration tester.
Forum: XSS Info
4 years ago
acemutha
Hi all I was wondering if It was possible to obscure the address bar with an image containing another a trusted url. I don't think It's possible with JS or HTML using z-index, but maybe using flash... Thanks in advance
Forum: XSS Info
4 years ago
acemutha
Thanks a lot for your infos.
Forum: CSRF and Session Info
4 years ago
acemutha
What can you use right now to spoof Referer header, a part from proxy. Flash no longer allows it, I believe. Maybe java applet? Thanks.
Forum: CSRF and Session Info
4 years ago
acemutha
LOL you are right..... Thanks a lot
Forum: CSRF and Session Info
4 years ago
acemutha
Hi as per title, I was wondering if it's possible to send a request to a remote site using 127.0.0.1 as referer header. The question is related to the fact that the only control the application does to prevent you from changing the admin password is checking if the string 127.0.0.1 is in the referer field. Here's the php code. if ( eregi ( "127.0.0.1", $_SERVER['HTTP_REFERER'] ) )
Forum: CSRF and Session Info
5 years ago
acemutha
Hi all gurus, the scenario is I'm logged into a secure bank account, so connection is only https. Then I see that a https link can also be loaded using http, so downgrading the protocol. Doing so the server responds "301 moved permanently" and then loads the correct https page without logging me off. The question is..Is it correct from a security point of view or It'd be better a 404 not
Forum: SQL and Code Injection
5 years ago
acemutha
Hi all, I have a question about the mechanism that rules the communication between flash player and a file crossdomain.xml. I've read from http://www.freedom-to-tinker.com/sites/default/files/csrf.pdf in Appendix B that if a flash on evil.com is trying to send a request to trusted.com and evil.com is not in the crossdomain.xml file, then after loading the xml file the Flash would be blocked. Now
Forum: Projects
6 years ago
acemutha
Hi I'd like to ask if it is still possible to exploit XST attack via some vectors, like xmldom/xmlhttp, action scripts or others... The browsers I'm referring to are the latest Firefox 2.x and IE 7.x Thx in advance.
Forum: CSRF and Session Info
Current Page: 1 of 1