Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
How robots and spiders are causing issues, how to stop them. We can also talk about Completely Automated Public Turing Test To Tell Computers And Humans Apart - their use, their compliance issues, porn proxies, PWNtcha and other ways to defeat them. 

Current Page: 1 of 1
Results 1 - 13 of 13
1 year ago
ethicalhack3r
Thanks for the reply, I think my main concern was relying on the origin header for CSRF protection without the use of tokens (or in my example, bad use of token sharing).
Forum: CSRF and Session Info
1 year ago
ethicalhack3r
Hi, In this scenario the client and server are on different domains. The client uses AJAX to communicate with the server's API with the use of CORS. My initial idea was this: 1. client sends request to server for token (give me a token!) 2. server checks origin (do we trust the client?) 3. replies with token if origin is trusted (yea, ok, send him a token) 4. client sends *real* (user
Forum: CSRF and Session Info
3 years ago
ethicalhack3r
Hi, I've been thinking about how spiders work in the context of black box web application scanners. On a very basic level all the spider does is regex for href attributes which are part of the same domain, enqueues them, visits them and so on and so forth. There becomes a point when there must be a cut off point, and you simply can't follow every href forever. This is partly achieved by s
Forum: Robots/Spiders/CAPTCHAs, oh my
3 years ago
ethicalhack3r
Just came across this old post which seems to discuss this same injection: http://sla.ckers.org/forum/read.php?2,36227
Forum: XSS Info
3 years ago
ethicalhack3r
Ah! Thanks for the info mario! That payload did execute correctly within Opera. I thought that maybe the 'type' element value was stopping the XSS from being executed. I will keep playing with FF4, see if I can come up with something.
Forum: XSS Info
3 years ago
ethicalhack3r
Hi Gareth, That payload doesn't execute in my FF4. <link rel="alternate" type="application/rss+xml" title="" style="xss:expression(alert(1))" x=" Search Results | News Feed" href="feeds/newsfeed.php" /> Thanks for the reply, Ryan
Forum: XSS Info
3 years ago
ethicalhack3r
Hi, I have come across the following XSS which I can't seem to get to execute. The injecting is within the 'title' element of the 'link' tag. After some reading up, rel="alternative" with type="application/rss+xml", will take an action if the user agent is a 'rss+xml' application. So, from my understanding the XSS would only execute if the page was accessed via such an
Forum: XSS Info
4 years ago
ethicalhack3r
Thanks for the reply. As regards to the blog post, do you know why that method is successful? What is he doing differently? I tried some variations of his examples and couldn't get a successful INTO OUTFILE. As regards to the white paper. It states in 'Exceptions' that his method cannot be used when the injection is in an INSERT VALUE. Thanks again!
Forum: SQL and Code Injection
4 years ago
ethicalhack3r
I've been told this is impossible by a few people and so far I have been unsuccessful. Maybe some one on here can shed some light on it. query = "INSERT INTO x VALUES ('y');"; Injection point is in the VALUE y: query = "INSERT INTO x VALUES ('INJECTION HERE');"; So what I am trying to achieve is a web shell from an INSERT sql injection.
Forum: SQL and Code Injection
4 years ago
ethicalhack3r
Maybe this can help; http://www.bonsai-sec.com/blog/index.php/not-the-average-sql-injection/
Forum: SQL and Code Injection
4 years ago
ethicalhack3r
@thornmaker "It's Java and all but the LM hash is done with Bouncy Castle 1.4.5 (http://www.bouncycastle.org/latest_releases.html)." I suppose you just use Bouncy Castle to generate hashes and then compare them to the hash given.
Forum: OMG Ponies
4 years ago
ethicalhack3r
That was damn fast!
Forum: OMG Ponies
4 years ago
ethicalhack3r
1 = OWASP
Forum: OMG Ponies
Current Page: 1 of 1