Skip to main content

Tấn công và Phòng thủ trong XSS

Chapter 1 Cross-site Scripting Fundamentals
1-Introduction
2-Web Application Security
3-XML and AJAX Introduction
4-Summary
5-Solutions Fast Track
6-Frequently Asked Questions

Chapter 2 The XSS Discovery Toolkit
1-Introduction
2-Burp
3-Debugging DHTML With Firefox Extensions
4-DOM Inspector
5-Web Developer Firefox Extension
6-Insert Edit HTML Picture
7-XSS Example in Web Developer Web Site
8-FireBug
9-Analyzing HTTP Traffic with Firefox Extensions
10-LiveHTTPHeaders
11-ModifyHeaders
12-TamperData
13-GreaseMonkey
14-GreaseMonkey Internals
15-Creating and Installing User Scripts
16-PostInterpreter
17-XSS Assistant
18-Active Exploitation with GreaseMonkey
19-Hacking with Bookmarklets
20-Using Technika
21-Summary
22-Solutions Fast Track
23Frequently Asked Questions

Chapter 3 XSS Theory
1-Introduction
2-Getting XSS’ed
3-Non-persistent
4-DOM-based
5-Persistent
6-DOM-based XSS In Detail
7-Identifying DOM-based XSS Vulnerabilities
8-Exploiting Non-persistent
9-DOM-based XSS Vulnerabilities
10-Exploiting Persistent DOM-based XSS Vulnerabilities
11-Preventing DOM-based XSS Vulnerabilities
12-Redirection
13-Redirection Services
14-Referring URLs
15-CSRF
16Flash, QuickTime, PDF, Oh My
17-Backdooring Image Files
19-HTTP Response Injection
20-Source vs. DHTML Reality
21-Bypassing XSS Length Limitations
22-XSS Filter Evasion
23-When Script Gets Blocked
24-Browser Peculiarities
25-CSS Filter Evasion
26-XML Vectors
27-Attacking Obscure Filters
28-Encoding Issues
29-Summary
30-Solutions Fast Track
31-Frequently Asked Questions
32-Playing with Flash Fire
33-Hidden PDF Features
34-QuickTime Hacks for Fun and Profit
35-Backdooring Image Files
36HTTP Response Injection

Chapter 4 XSS Attack Methods
1-Introduction
2-History Stealing
3-JavaScript/CSS API “getComputedStyle”
4-Code for Firefox/Mozilla. May
5-Work In Other Browsers
6-Stealing Search Engine Queries
7-JavaScript Console Error Login Checker
8-Intranet Hacking
9-Exploit Procedures
10-Persistent Control
11-Obtaining NAT’ed IP Addresses
12-Port Scanning
13-Blind Web Server Fingerprinting
14-Attacking the Intranet
15-XSS Defacements
16-Summary
17-Solutions Fast Track
18-Frequently Asked Questions
19-References

Chapter 5 Advanced XSS Attack Vectors
1-Introduction
2-DNS Pinning
3-Anti-DNS Pinning
4-Anti-Anti-DNS Pinning
5-Anti-anti-anti-DNS Pinning
6-AKA Circumventing Anti-anti-DNS Pinning
7-Additional Applications of Anti-DNS Pinning
8-IMAP3
9-MHTML
10-Expect Vulnerability
11-Hacking JSON
12-Summary
13-Frequently Asked Questions

Chapter 6 XSS Exploited
1-Introduction
2-XSS vs. Firefox Password Manager
3-SeXXS Offenders
4-Equifraked
5-Finding the Bug
6-Building the Exploit Code
7-Owning the Cingular Xpress Mail User
8-The Xpress Mail Personal Edition Solution
9-The Ackid (AKA Custom Session ID)
10-The Inbox
11-The Document Folder
12-E-mail Cross-linkage
13-CSFR Proof of Concepts
14-Cookie Grab
15-Xpressmail Snarfer
16-Owning the Documents
17-Alternate XSS: Outside the BoXXS
18-Owning the Owner
19-The SILICA and CANVAS
20-Building the Scripted Share
21-Owning the Owner
22-Lessons Learned and Free Advertising
23-Airpwned with XSS
24-XSS Injection: XSSing Protected Systems
25-The Decompiled Flash Method
26-Application Memory Massaging –XSS via an Executable
27-XSS Old School - Windows Mobile PIE 4.2
28-Cross-frame Scripting Illustrated
29-XSSing Firefox Extensions
30-GreaseMonkey Backdoors
31-GreaseMonkey Bugs
32-XSS the Backend: Snoopwned
33-XSS Anonymous Script Storage - TinyURL 0day
34-XSS Exploitation: Point-Click-Own with EZPhotoSales
35-Summary
36-Solutions Fast Track
37-Frequently Asked Questions

Chapter 7 Exploit Frameworks
1-Introduction
2-AttackAPI
3-Enumerating the Client
4-Attacking Networks
5-Hijacking the Browser
6-Controlling Zombies
7-BeEF
8-Installing and Configuring BeEF
9-Controlling Zombies
10-BeEF Modules
11-Standard Browser Exploits
12-Port Scanning with BeEF
13-Inter-protocol Exploitation and Communication with BeEF
14-CAL9000
15-XSS Attacks, Cheat Sheets, and Checklists
16-Encoder, Decoders, and Miscellaneous Tools
17-HTTP Requests/Responses and Automatic Testing
18-Overview of XSS-Proxy
19-XSS-Proxy Hijacking Explained
20-Browser Hijacking Details
21-Attacker Control Interface
22-Using XSS-Proxy: Examples
23-Setting Up XSS-Proxy
24-Setting Up XSS-Proxy
25-Injection and Initialization Vectors For XSS-Proxy
26-Handoff and CSRF With Hijacks
27-Sage and File:// Hijack With Malicious RSS Feed
28-Summary
29-Solutions Fast Track
30-Frequently Asked Questions

Chapter 8 XSS Worms
1-Introduction
2-Exponential XSS
3-XSS Warhol Worm
4-Linear XSS Worm
5-Samy Is My Hero
6-Summary
7-Solutions Fast Track
8-Frequently Asked Questions

Chapter 9 Preventing XSS Attacks
1-Introduction
2-Filtering
3-Input Encoding
4-Output Encoding
5-Web Browser’s Security
6-Browser Selection
7-Add More Security To Your Web Browser
8-Disabling Features
9-Use a Virtual Machine
10-Don’t Click On Links in E-mail, Almost Ever
11-Defend your Web Mail
12-Beware of Overly Long URL’s
13-URL Shorteners
14-Secrets Questions and Lost Answers
15-Summary
16-Solutions Fast Track
17-Frequently Asked Questions

Download
http://www.mediafire.com/?5ktpvb68dvq1xvi

Share this with your friends
Loading...