SSP - Web Security
with Adam & Ryan
<;'"}()[]>{ XSSFish says, "Swim wif us"
SSP - Web Security with Adam &amp; Ryan <;'"}()[]>{ - - PowerPoint PPT Presentation
SSP - Web Security with Adam &amp; Ryan <;'"}()[]>{ XSSFish says, "Swim wif us" Todays Topics Sessions Why do we need them? What weaknesses can attackers take advantage of? Cross-site Scripting
with Adam & Ryan
<;'"}()[]>{ XSSFish says, "Swim wif us"
advantage of?
get /control_panel Please login
send /login data from form: user name = john password = money$ Welcome John!
get /control_panel Please login
get /control_panel Please login session id: TH2S234S
send /login data from form: user name = john password = money$ Welcome John! session id: TH2S234S
get /control_panel Hi John. Here’s your control panel session id: TH2S234S
send /login data from form: user name = john password = money$ Welcome John! session id: 3 Victim
session id: 3 Victim
session id: 3 Victim get /control_panel Please login session id: 1 Attacker
session id: 3 Victim get /control_panel Please login session id: 2 Attacker
session id: 3 Victim get /control_panel Hi John. Here’s your control panel session id: 3 Attacker
go here /login?SID=I_KNOW
get /login?SID=I_KNOW go here /login?SID=I_KNOW
get /login?SID=I_KNOW
Please login
session id:
I_KNOW
go here /login?SID=I_KNOW
session id:
I_KNOW
session id:
I_KNOW
send /login data from form: user name = john password = money$
session id:
I_KNOW
send /login data from form: user name = john password = money$
Welcome John!
session id:
I_KNOW
session id:
I_KNOW
session id:
I_KNOW get /control_panel Hi John. Here’s your control panel
attacker sends to it
JavaScript
action on the website
the visitor)
/submit_comment is vulnerable to XSS
/submit_comment is vulnerable to XSS XSS Payload submit /submit_comment
/submit_comment is vulnerable to XSS XSS Payload submit /submit_comment Thank you for your comment
/view_comments contains XSS Payload
/view_comments contains XSS Payload session id: TH2S234S
/view_comments contains XSS Payload get /view_comments session id: TH2S234S
/view_comments contains XSS Payload get /view_comments Here are the comments session id: TH2S234S
/view_comments contains XSS Payload session id: TH2S234S session id: TH2S234S
attacker knows victim’s session id session id: TH2S234S get /control_panel
attacker knows victim’s session id session id: TH2S234S get /control_panel Hi John. Here’s your control panel