Sitemap
CryptoGen Nepal

CryptoGen Nepal consists of professional team members who are devoted to providing professional-grade cyber security solutions such as IS audit, VAPT, End-Point Threat Analysis, Forensics & Malware Analysis, Incident Response, Server Assessment, and Hardening.

XSS Is Love ❤ !

1 min readDec 26, 2019

--

Sometime back I was testing a private site where I was able to execute an XSS. By using the previous XSS I managed to steal CSRF token to bypass CSRF and made an XHR request which leads to another XSS in a different endpoint. After chaining both XSSes It allowed me to execute javascript remotely from the attacker’s control panel(Mine). I used nodejs to deliver my malicious commands from the control panel to the target’s browser. I could even steal credentials, any keystrokes, change whole security questions, passphrase and what not of the target. So, that target won’t be able to get their account back but to execute this all there was one dependency, the first XSS was self XSS. To make it workable, the attacker must have to trick target to copy-paste my payload for which I used pastejacking.

I can’t show you real proof of concept. So, To simulate the attack I made a replica of that site which is not functionally as same as a real system but the attack flow was similar as shown in the video.

Cheers!!!

--

--

CryptoGen Nepal
CryptoGen Nepal

Published in CryptoGen Nepal

CryptoGen Nepal consists of professional team members who are devoted to providing professional-grade cyber security solutions such as IS audit, VAPT, End-Point Threat Analysis, Forensics & Malware Analysis, Incident Response, Server Assessment, and Hardening.

Nirmal Dahal - #Nittam
Nirmal Dahal - #Nittam

Written by Nirmal Dahal - #Nittam

ISO27001:2022 | C|EH Master | CNSS | NSE | CCNA Cyber Ops | CPISI | CSFPC

No responses yet