Google Chrome is the most common web browser on the planet. It's small and has a straightforward user interface. This is the primary reason for its widespread popularity. It also has a number of other features that make web browsing easier and faster. Chrome, like Firefox, allows you to install add-ons, known as plugins in Chrome. Extensions help to improve the features of Google Chrome.
There are thousands of google chrome plugins that add useful resources to the browser and eliminate the need to install separate tools for specific tasks. In previous articles, we discussed firefox add-ons that turn Firefox into a security testing tool. We can transform google chrome into a security tool, similar to Firefox, with the help of some nice security plugins.
I've compiled a list of all the extensions that help us with penetration testing in this article. Both of these plugins are free to download from Google Chrome's Web store. Only a few extensions are available unofficially. As a result, you'll have to get your hands on a copy from their official website.
You can get live, expert advice wherever you go.
Cross-site scripting (XSS) attacks are injection attacks in which malicious scripts are inserted into otherwise trustworthy and innocuous websites. When an attacker uses a web application to send malicious code to a specific end-user, usually in the form of a browser-side script, an XSS attack occurs. These flaws are common and can be found anywhere a web application uses user input in its output without validating or encoding it.
An attacker can use XSS to deliver a malicious script to an unwitting recipient. The end user's browser has no way of knowing that the script should not be trusted and will continue to run it regardless. Because it believes the script came from a trusted source, the malicious script will access any cookies, session tokens, or other sensitive information stored by the browser and used for that site. These scripts can also rewrite the text of an HTML page. For more information on the various types of XSS flaws, see Types of Cross-Site Scripting.
Typically, data is entered into a Web application from an untrustworthy source, such as a web request.
The data is used in dynamic content that is sent to a web user without being malware-checked.
Malicious content is frequently delivered to web browsers in the form of a JavaScript segment, but it can also take the form of HTML, Flash, or another type of code that the browser can execute. The list of xss attacks is nearly infinite, but they typically involve sending private data to the attacker, such as cookies or other session information, redirecting the victim to the attacker-controlled web material, or performing other malicious operations on the user's computer while posing as the vulnerable site.
XSS attacks are typically classified as either stored or mirrored. The dom based xss attack is a third, much less well-known type of XSS attack that is covered separately here.
XSS Attacks That Were Preserved
Stored attacks are those in which the injected script is kept indefinitely on the target servers, such as in a database, a message board, a visitor log, a comment area, and so on. The malicious script is downloaded when the victim requests information from the server. Type-I or Persistent XSS are abbreviations for stored XSS.
reflected XSS attainments
The inserted script is reflected off the webserver, for example, in an error message, a search result, or some other response that includes some or all of the feedback sent to the server as part of the request. reflected attacks are delivered to victims through a different channel, such as an e-mail or a different website. When a user is tricked into clicking on a malicious link, completing a specially designed form, or simply browsing to a malicious site, the inserted code travels to the compromised web site, representing the attack back to the user's browser. The browser executes the code because it came from a "trusted" server. Reflected XSS is referred to as non-persistent or type ii XSS.
Other Types of XSS Vulnerabilities
In addition to Stored and Reflected XSS, amit klein defined another type of XSS, DOM Based XSS, in 2005. The owasp article: Types of Cross-site scripting recommends using the xss categorization defined in the OWASP Article: Types of Cross-Site Scripting, which organises all of these XSS terms into a matrix of Stored vs. Reflected XSS and Server vs. Client XSS, with DOM Based XSS being a subset of Client XSS.
An XSS attack has the same result whether it is stored or mirrored (or DOM Based). The distinction is in how the payload is delivered to the server. Do not be fooled into thinking that a "read-only" or "brochureware" platform is immune to extreme reflected xss attacks. end-users can experience a wide range of problems as a result of XSS, ranging from minor annoyance to complete account compromise. The most severe xss attacks expose a user's session cookie, allowing an attacker to hijack the user's session and take over the account. Other harmful attacks include exposing end-user data, installing trojan horse programmes, redirecting the user to another page or location, and changing the presentation of content. An XSS flaw that allows an attacker to change the content of a press release or news item may cause a company's stock price to fall or consumer trust to deteriorate. An XSS flaw on a pharmaceutical website could allow an attacker to change dosage information, potentially leading to an overdose. For more information on these types of attacks, see content spoofing.
Finding and fixing xss bugs in a web application can be difficult. The simplest way to find bugs is to perform a security audit on the code and look for any places where http request input could potentially end up in the HTML output. It's worth noting that malicious javascript can be delivered via a variety of HTML tags. Some available tools, such as Nessus and Nikto, can aid in the search for these flaws on a website, but they only scratch the surface. If one aspect of a website is insecure, there is a good chance that it will have other issues as well.
How to Protect Yourself
The owasp xss prevention cheat sheet describes the key anti-XSS safeguards.
It's also critical to turn off http trace support on all web servers. An attacker can steal cookie data using javascript even if the document. cookie is disabled or not protected by the client. When a user posts a malicious script to a forum, an asynchronous http trace call is initiated, which collects the user's cookie information from the server and sends it to another malicious server, from which the attacker can launch a session hijacking attack. disabling http trace support on all web servers effectively mitigates this.
The owasp esapi project has developed a set of reusable security components written in a variety of languages, including parameter validation and escaping routines to prevent parameter tampering and XSS injection. The owasp webgoat project training application also covers cross-site scripting and data encoding.
CSP Evaluator is a small tool that allows developers and security experts to check if a Content Security Policy (CSP) serves
wooyun原地址:http://zone.wooyun.org/content/7678,我只是大自然搬运工小雷锋~ 版本权所有 wooyun wiluilu~ 感谢分享,希望继续完善~ 在线版使用说明: 1. 常用XSS转码 2. 盲打代码自动输入(f4) 3. 可以在插件页,点击【盲打】设置,要使用的外js连接 第一次写插件,请大家,多多提建议。 XSS辅助工具本地版:http://dl.vmall.com/c05li5yuok 本地版插件的使用方法如下: 1. 打开chrome转到chrome://extensions/页,把codex.crx拖进去,即可安装 2. 按f4可以在选定的文本输入框(input、textarea)输入默认的盲打代码 3. 在插件页可以点击【盲打】按钮,输入盲打时要用到的外部js链接对盲打
A chrome extension tool that can inject custom scripts into the current web page. For example, loading Jquery into the page to
Discover and test inputs passed into sinks that could lead to DOM XSS vulnerabilities. A sink is a code pattern that could
This extension should be installed by Trialfire users whos website or web-app makes use of X-Frame-Options or Content-Security-Policy (CSP) headers. Trialfire embeds