Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

challenge in xss


ghost's Avatar
0 0

The other day i read a tut about xss and how to bypass some securities.i was wondering what if the input was filtered and the text containing the word script , both in upper and lower , would be added with a [] ,that would lead to <[script]> or double pair , that would lead to <[[script]]> .. what can be done about it ?


K3174N 420's Avatar
Satan > God
0 0

Probably not much… Try adding escape chars.


ghost's Avatar
0 0

K3174N 420 wrote: Probably not much… Try adding escape chars. … Goofy.

Not all XSS requires it to be wrapped in script tags… depending on where the content is rendered on the page, some XSS can operate merely by escaping an HTML attribute in an existing element. Go to phpsec.org.


ghost's Avatar
0 0

BlaX wrote: …would be added with a [] ,that would lead to <[script]> or double pair , that would lead to <[[script]]> .. what can be done about it ?

markup&lt;[script]&gt;alert(/xss/)&lt;/[script]&gt; and markup&lt;[script]&gt;alert(/xss/)&lt;[/script]&gt; both don't work. Apparently the browser doesn't recognize the script command because of the extra brackets. Neither do markup&lt;[]script[]&gt;alert(/xss/)&lt;[]/script[]&gt; and markup&lt;[]script[]&gt;alert(/xss/)&lt;/[]script[]&gt;.

If you're thinking about escaping tags then just find out what tag you need to escape and figure out what to use to escape it, it's pretty simple. :)


ghost's Avatar
0 0

thank u guys for the replies

oh well i i've been messing xss for a while now, and am surprised at just how many sites are vulnerable. most of them seem change the < > to < and >. is there some way to get around this thing ?

i searched a lot about this but didnt come up with much result.hope u can find some way


fashizzlepop's Avatar
Member
0 0

Have yo0u heard of the FF add-on XSS-me? That uses a bunch of common XSS tests to see if a site is vulnerable. It is a good way to see how many different types of attacks there are.

Also, you might already know this, in order to really understand how input is sanitized, you have to read the source before and after. That way you can see what you changed and what you might want to try and change.


ghost's Avatar
0 0

about that xss-me i think ive seen it in bt3's browser. and yeah i know about checking the code to see whats going on with ur script.thats why i asked if there was a way to bypass the filters that change < to & alte