XSS technique without parentheses Tuesday, 1 May 2012 This is a very old technique I discovered years ago which I used to bypass a filter and itâs pretty awesome. It might come in handy to bypass a WAF or filter since itâs not public until now. First you need to understand (which you probably do) that the window object is the default object in JavaScript and every time you execute code itâs like y
ã¯ããã« Writeup Case 01: Simple XSS 1 解ç Case 02: Simple XSS 2 解ç Case 03: With htmlspecialchars() 解ç Case 04-1: Without any backquotes and HTML tags 解ç Case 04-2: Without any backquotes, HTML tags and [ux] 解ç Case 05: Without any alphabets 解ç Case 06-1: Without any paretheses 解ç Case 06-2: Without any parentheses and [oO][nN] 解ç Case 06-3: Without any paretheses and .[oO].[nN].* 解ç Case 06-4: Withou
XXE#Valid use case#This is a non-malicious example of how external entities are used: <?xml version="1.0" standalone="no" ?> <!DOCTYPE copyright [ <!ELEMENT copyright (#PCDATA)> <!ENTITY c SYSTEM "http://www.xmlwriter.net/copyright.xml"> ]> <copyright>&c;</copyright> Resource: https://xmlwriter.net/xml_guide/entity_declaration.shtml Testing methodology#Once youâve intercepted the POST to the vulne
Introduction ãã㯠ã»ãã¥ãªãã£ã»ãããã£ã³ã in 岡山 2018 ã§æ¼ç¿ã³ã³ãã³ãã¨ãã¦ä½¿ç¨ããã, *åå¦è åã* ã® XSS Challenge ã§ãã alert('XSS') 㨠alert(document.domain) ã® 2 ã¤ã, åãã¼ã¸ã§å®è¡ãã¦ãã ããããã ã document.domain == xss.shift-js.info ã¨ãªãããã«ãã¾ããããç¹æ®µã®æ示ããªãéã, å¤ãã®åé¡ã§ã¯, ã¦ã¼ã¶ã¼æä½ãå¿ è¦ã¨ãããã®(e.g. onclick)ã§ãæ§ãã¾ããã CTF ã¨éã, ç¹ã« alert ãçãã¦ã FLAG ã表示ãããããã¾ããã, alert('XSS') 㨠alert(document.domain) ãæ£ããå®è¡ãããã¨, "You win! :-)" ã¨ã ã表示ããã¾ããalert ãåºãã¦æ¥½ãã¿ã¾ããããã¾ã pu
ããã«ã¡ã¯ãã»ãã¥ãªãã£ã¨ã³ã¸ãã¢ã®koboã§ãããã¯ã·ãã§ã¯2016å¹´ããèå¼±æ§å ±å¥¨éå¶åº¦ãéç¨ãã¦ãã¾ããã2018年度ã«å ¥ã£ã¦ããå ±å¥¨éã®å¢é¡ãæ°ãããã©ãããã©ã¼ã ã¸ã®åå ¥ãªã©ãããã¾ã§ã«å¢ãã¦æ³¨åãã¦ãã¾ããæ¬è¨äºã§ã¯ãæè¿ã®ãã¯ã·ãã®èå¼±æ§å ±å¥¨éå¶åº¦ã®ååã¨å®éã«å ±åãããèå¼±æ§ã®ä¾ãç´¹ä»ãã¦ããã¾ãã pixiv Bug Bounty Programã®æ¦è¦ æé: 2016/04ã æ¯æãæ¸ã¿å ±å¥¨éç·é¡: 300ä¸åç¨åº¦ å ±åç·æ°: 294件 ãã¯ã·ãã§ã¯2å¹´åã»ã©ã«æ¸¡ã£ã¦èå¼±æ§å ±å¥¨éå¶åº¦ãå®æ½ãã¦ãã¾ãããã2018å¹´ã«å ¥ã£ã¦ããèå¼±æ§å ±åã®ä»¶æ°ãã¯ãªãªãã£åä¸ã®çºã«2ã¤ã®éè¦ãªå¤æ´ãè¡ãã¾ããã å ±å¥¨éã®å¢é¡ èå¼±æ§ãå ±åããããã«ã¼ã«å¯¾ãã¦ããã¾ã§ãããé«ãã¤ã³ã»ã³ãã£ããæä¾ãããã¨ã§å ±åãä¿ããã HackerOneã¸ã®åå ¥ ä¸çæ大ã®ãã°ãã¦ã³ãã£ãã©ãããã©ã¼ã
Chrome 61ãã使ããããã«ãªã£ãWebUSB APIã使ã£ã¦USBããã¤ã¹ã¨ä¼è©±ããæ¹æ³ã解説ãã¾ãã ããã¯2017å¹´12æ13æ¥ã«è¡ããã Shibuya.XSS techtalk #10 ã®çºè¡¨è³æã§ãã ããã¯2017å¹´9æ23æ¥ã«è¡ããã 第3å ã«ã¼ãã«ï¼VMæ¢æ¤é@åé¸ã§ã®çºâ¦
æ¬è¨äºã¯ImageMagické¢é£ã®è¨äºã®3æ¬ç®ã§ããImageMagickã®æ¢ç¥ã®èå¼±æ§ãã·ã¹ãã æ å ±ã®æ¼æ´©ãªã©ã®åé¡ãæ±ã£ã1ã¤ç®ã®è¨äºãDoSãæ±ã£ã2ã¤ç®ã®è¨äºãåç §ãã ããã æçµã¨ãªã3åç®ã®ä»åã¯ãXSSã¨ã¢ã¯ã»ã¹å¶å¾¡ãåãä¸ãã¾ããåæã¨ããç°å¢ãªã©ã¯ååã»åã åã¨åãã§ãã â» è¨äºä¸ã§ã¯å³ã®ç¥èªã使ã£ã¦ãã¾ãã IM = ImageMagickãCW = CarrierWave ã¢ã¯ã»ã¹å¶å¾¡ã®ä¸å ååã®è¨äºã§è¿°ã¹ãããã«ãããã©ã«ãã®ç¶æ ã®CWã¯å ¬éãã£ã¬ã¯ããªã«ã¢ãããã¼ãããããã¡ã¤ã«ãç½®ãã¾ãããã¡ã¤ã«ã®æçµçãªä¿ååã«ä¸æçã«ä½æããããã£ãã·ã¥ãåæ§ã§ãã ãããã®ãã¡ã¤ã«ã¯URLãæ¨æ¸¬ã§ããã°èª°ã§ãåç §å¯è½ã§ãã
ä¸ç¹å®ã®ã¦ã¼ã¶ã¼ãå ¥åããMarkdownããã©ã¦ã¶ä¸ã§JavaScriptã使ã£ã¦HTMLã«å¤æããã¨ããå ´é¢ã«ããã¦ã¯ãJavaScriptã§å¤æãã¦HTMLãçæããã¨ããå¦çã®é½åä¸ã©ããã¦ãDOM-based XSSã®çºçãèããªãããã«ã¯ãããªãããã¨ãã£ã¦ãMarkdownããã¼ã¹ãHTMLãçæããã¨ããå¦çãã¹ã¦ãXSSãåå¨ããªãããã«æ³¨æããªããèªåã§æ¸ãã®ã大å¤ã ããmarkedãmarkdown-jsãªã©ã®æ¢åã®å¤æç¨ã®JSãæã£ã¦ãã¦ãããããXSSããªããã確èªããã®ã¯çµæ§å¤§å¤ã ã£ããããã ãããã£ãå ´åã«ã¯ãMarkdownããçæãããHTMLãRickDOMãéããã¨ã§ãä¸ãä¸HTMLå ã«JavaScriptãå«ã¾ãã¦ããã¨ãã¦ãããããé¤å¤ãã許å¯ãããè¦ç´ ã許å¯ãããå±æ§ã ãã§æ§ç¯ãããå®å ¨ãªHTMLã«åæ§ç¯ãããã¨ãã§ãããããã«ããããã£ã¦çæ
ã¯ããã« ã¯ããã¾ãã¦ãç¦å²¡ãªãã£ã¹ã§åãã¦ããåå¹³ã§ãã ã»ãã¥ã¢ã¹ã«ã¤ã»ãã¯ããã¸ã¼ã§ã¯ããã§ã«ããã¤ãã®ã«ãã´ãªã®ããã°ãçºä¿¡ãã¦ãã¾ãããæè¡ãæ°è»½ã«çºä¿¡ããããã¨ã³ã¸ãã¢ãæ®æ®µã®æ¥åã§ã©ã®ãããªæè¡ã«è§¦ãã¦ããã®ããç´¹ä»ããããããã¨ãç®çã¨ãã¦ãæ°ãããã¨ã³ã¸ãã¢ããã°ããç«ã¡ä¸ããã¾ããã æ¬è¨äºã§ã¯ãæè¿ã«ãªã£ã¦ãããã (æ±) æ¤è¨¼ãã Vue.js ã§ã®ã¯ãã¹ãµã¤ãã»ã¹ã¯ãªããã£ã³ã° (XSS) ã«ã¤ãã¦ç´¹ä»ãã¾ãã ãªããæ¬è¨äºã®å 容ã¯ç§è¦ã«åºã¥ããã®ã§ãããæå±çµç¹ã代表ãããã®ã§ã¯ããã¾ããã åæ æ¬è¨äºã§ã¯ Vue.js ã使ã£ã¦ XSS ã®èå¼±æ§ãä½ã£ã¦ãã¾ããããªã±ã¼ã¹ã説æãã¾ããããã®ä»ã® JavaScript ã®ã©ã¤ãã©ãª/ãã¬ã¼ã ã¯ã¼ã¯ã使ã£ãå ´åã§ãåæ§ã®ãªã¹ã¯ãããå¯è½æ§ãããã¾ãã æ¤è¨¼ã§å©ç¨ãããã¼ã¸ã§ã³ Vue.js v2.5.16 (ãµ
A few months ago, I used Google Maps. Or maybe Google Street View, I love Street View, itâs like a retrofuturistic way to teleport. Routinely, I looked at the address bar. Since sometime in 2014, parameters are not the mere query string they used to be. Instead, itâs a weird mash of alphanumeric characters separated by exclamation points. Itâs abstruse, it has no public documentation whatsoever, i
English version is here: https://mksben.l0.cm/2018/05/cve-2018-5175-firefox-csp-strict-dynamic-bypass.html Firefox 60ã§ä¿®æ£ãããContent Security Policy(CSP)ã®strict-dynamicããã¤ãã¹ã§ããèå¼±æ§ã«ã¤ãã¦æ¸ãã¾ãã https://www.mozilla.org/en-US/security/advisories/mfsa2018-11/#CVE-2018-5175 A mechanism to bypass Content Security Policy (CSP) protections on sites that have a script-src policy of 'strict-dynamic'. If a target
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}