- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 217字
- 2021-07-16 17:53:17
Attack Scenario
Coming up with a good attack scenario isn't as necessary as the previous data points, but can be a great method for increasing the bug's severity and boosting your payout.
For this attack, we'll highlight the extent of the damage beyond just the Gruyere app. If an attacker could execute arbitrary JavaScript from a stored XSS bug, they could exfiltrate sensitive cookies, such as those for authenticating financial apps (banks, brokers, and crypto traders) or social networks (Twitter, Facebook, Instagram), which could in turn be used for identity theft, credit card fraud, and other cyber crimes.
Here's how our report will look:
CATEGORY: Persistent / Stored XSS
TIME: 1:12 AM (1:12) UTC
URL: https://google-gruyere.appspot.com/09809809887686765654654/newsnippet.gtl
PAYLOAD: <a onmouseover="alert(document.cookie)">xxs link</a>
METHODOLOGY: XSS payload submitted manually
INSTRUCTIONS TO REPRODUCE:
1. Navigate to "New Snippet" submission page
2. Enter the XSS payload into the "New Snippet" form.
3. Click "Submit" and create a new snippet.
4. The malicious XSS contained in the payload is executed whenever someone hovers over the snippet with that link.
ATTACK SCENARIO:
With a persistent XSS vulnerability to exploit, a malicious actor could exfiltrate sensitive cookies to steal the identity of Gruyere's users, impersonating them both in the app and in whatever other accounts they are logged into at the time of the XSS script's execution.
推薦閱讀
- 黑客大曝光:無線網絡安全(原書第3版)
- 數字身份與元宇宙信任治理
- Kali Linux CTF Blueprints
- 腦洞大開:滲透測試另類實戰攻略
- 零信任網絡:在不可信網絡中構建安全系統
- 深入淺出隱私計算:技術解析與應用實踐
- Learning Veeam? Backup & Replication for VMware vSphere
- 從0到1:CTFer成長之路
- 信息安全案例教程:技術與應用(第2版)
- Instant Java Password and Authentication Security
- 人工智能安全(精裝版)
- End to End GUI Development with Qt5
- 信息技術基礎:提高篇·實驗與習題
- 數據安全架構設計與實戰
- 黑客攻擊與防范實戰從入門到精通