Menú

Mostrar Mensajes

Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.

Mostrar Mensajes Menú

Mensajes - Shell Root

#2631
jajajaja WTF is this shit!?
#2632
PHP / Re: Bloquear pagina con php
20 Agosto 2010, 01:09 AM
y con firmas, te refieres a...?
#2633
Nivel Web / x5s - XSS security testing assistant
19 Agosto 2010, 23:42 PM
x5s
XSS security testing assistant

by Casaba Security, contact us through CodePlex, or email us at casabasecurity .com.

x5s is a Fiddler addon which aims to assist penetration testers in finding cross-site scripting vulnerabilities. This is not a point and shoot tool, it requires some understanding of how encoding issues lead to XSS, and it requires manual driving. See the Quickstart Tutorial to jump right in but be ready to do a little work. It's main goal is to help you identify the hotspots where XSS might occur by:


  • Detecting where safe encodings were not applied to emitted user-inputs
  • Detecting where Unicode character transformations might bypass security filters
  • Detecting where non-shortest UTF-8 encodings might bypass security filters

It injects ASCII to find traditional encoding issues, and it injects special Unicode characters and encodings to help an analyst identify where XSS filters might be bypassed. The approach to finding these hotspots involves injecting single-character probes separately into each input field of each request, and detecting how they were later emitted. The focus is on reflected XSS issues however persisted issues can also be detected. The idea of injecting special Unicode characters and non-shortest form encodings was to identify where transformations occur which could be used to bypass security filters. This also has the interesting side effect of illuminating how all of the fields in a Web-app handle Unicode. For example, in a single page with many inputs, you may end up seeing the same test case get returned in a variety of ways – URL encoded, NCR encoded, ill-encoded, raw, replaced, dropped, etc. In some cases where we've had Watcher running in conjunction, we've been able to detect ill-formed UTF-8 byte sequences which is indicative of 'other' problems.

x5s acts as an assistant to the security tester by speeding up the process of parameter manipulation and aggregating the results for quick viewing. It automates some of the preliminary XSS testing work by enumerating and injecting canaries into all input fields/parameters sent to an application and analyzing how those canaries were later emitted. E.g. Was the emitted output encoded safely or not? Did an injected character transform to something else?

x5s does not inject XSS payloads - it does not attempt to exploit or confirm an XSS vulnerability. It's designed to draw your attention to the fields and parameters which seem likely candidates for vulnerability. A security-tester would review the results to find issues where special characters were dangerously transformed or emitted without a safe encoding. This can be done by quickly scanning the results, which have been designed with the intention of providing quick visual inspection. Results filters are also included so the tester could simply click show hotspots to see only the potential problem areas. After identifying a hotspot it's the tester's job to perform further validation and XSS testing.

The types of test cases that x5s includes:

  • Traditional test cases - characters typically used to test for XSS injection such as <, >, ",and ' which are used to control HTML, CSS, or javascript;
  • Transformable test cases - characters that might uppercase, lowercase, Normalize, best-fit map, or other wise transform to completely different characters, E.g. the Turkish 'İ' which will lower-case to 'i' in culture-aware software.
  • Overlong UTF-8 test cases - non-shortest UTF-8 encodings of the 'traditional' test cases noted above. E.g. the ASCII < is 0x3C normally and 0xC0 0xBC in non-shortest form UTF-8.

Download: :http://xss.codeplex.com/releases/view/43170
Fuente: dragonjar.org
#2634
Cita de: tomeu00 en 18 Agosto 2010, 19:14 PM... editar añadir o quitar archivos de un archivo.
wtf?
#2635
Foro Libre / Re: tonteas con tu ordenador?
19 Agosto 2010, 22:40 PM
jajajaja y despues te lo tienen que amputar. vease (http://es.wikipedia.org/wiki/Amputaci%C3%B3n)
#2636
Desarrollo Web / Re: Link en swf
19 Agosto 2010, 22:32 PM
@Mr. Crowley, jajajaja hasta con un simple a href se podia.
#2637
@Mr. Crowley, se podría reemplazar con lo siguiente, verdad?
Código (javascript) [Seleccionar]
function fClick_Previously(sHREF){
  alert('Now it will open the page: ' + sHREF);
}

PoC:
Código (html4strict) [Seleccionar]
<a href='index.php' onclick="fClick_Previously(this)">
  Click...
</a>
#2638
PHP / Re: If en un formulario
19 Agosto 2010, 20:11 PM
Mirad lo siguiente:
Código (html4strict) [Seleccionar]
<form id="form1"
     name="buscador"
     method="post"
     action="buscador.php">

  <label for="textfield"></label>
  <br>
  <input type="text" name="palabra" id="textfield" />
  <input type="submit" name="button" id="button" value="Buscar" />
  <br>
  <label>
     <input name="RadioGroup1" type="radio" id="RadioGroup1_0" value="Películas" checked="checked" />Películas
  </label>
  <label>
     <input type="radio" name="RadioGroup1" value="Revistas" id="RadioGroup1_1" />Revistas
  </label>
  <label for="radio"></label>
  <label for="radio2"></label>
</form>


Código (php,15) [Seleccionar]
<?php
   $link 
= @mysql_connect("localhost""root""pass"); 
   
mysql_select_db("db"$link); 
 
   
$limit 25
   
$pag = (int) $_GET["pag"];
 
   if(
$pag 1){ 
      
$pag 1;
   } 
   
$offset = ($pag-1) * $limit
 
   
$var $_POST['palabra'];
 
   
$srType $_POST['RadioGroup1']; # Aquí el valor del radio seleccionado
 
   if(
$srType == 'pelicula'){
      
$sql "SELECT SQL_CALC_FOUND_ROWS img, nombre, id FROM peliculas WHERE nombre like '%".$buscar."%' order by id desc LIMIT ".$offset.", ".$limit;
   }else if(
$srType == 'revistas'){
      
$sql "SELECT SQL_CALC_FOUND_ROWS img, nombre, id FROM revistas WHERE nombre like '%".$buscar."%' order by id desc LIMIT ".$offset.", ".$limit;
   }else{
      
$sql "SELECT -1 As 'ERROR'";
   }
   
$sqlTotal "SELECT FOUND_ROWS() as total"
 
   
$rs mysql_query($sql); 
   
$rsTotal mysql_query($sqlTotal); 
 
   
$rowTotal mysql_fetch_assoc($rsTotal); 
   
$total $rowTotal["total"];
?>
#2639
PHP / Re: problema $_GET['id'];
19 Agosto 2010, 19:56 PM
Si funciona el código correctamente, deberías de verificar el error, en el otro archivo (/home2/x/public_html/x/x.php). Además para estar más seguros, trata de ponerle excepciones. Así:
Código (php) [Seleccionar]
<?
   include ("config.php");
   $id = $_GET['id'];
   $sql = "select * from peliculas where id=".$id;

   $squery = mysql_query($sql);
   if (!$squery ) {
      die('Invalid query: ' . mysql_error());
   }

   while($row = mysql_fetch_array($squery)){
      echo "<b>".$row['des']."</b>";
   }
?>
#2640
PHP / Re: Bloquear pagina con php
19 Agosto 2010, 04:23 AM
Cita de: neopuerta360 en 19 Agosto 2010, 04:17 AMLo siento pero sera que me lo pueden explicar mejor como hice yo, pues que me lo hagan de nuevo.
Ehh?