I wonder how many web security nerds even know how to do anything with XSS vulns aside from useless shit like alert boxes lol
``it's a proof of concept, use your imagination to figure out the possibilities for post-exploitation''
translation: how do i sploit xss? i dunno lol
Name:
Anonymous2018-05-31 20:50
You should only use cgis written in C.
Name:
Anonymous2018-05-31 21:59
>>3 Why would you mention C in a thread about security? U MENA RUST? muh memory safety
That being said, C and cgi are ancient as fuck. It's all about Node now, gramps.
I don't even know what security issues cgi/C stuff has, but it's so old that it's no longer relevant. Regardless of what you think about the current state of modern web development, the fact of the matter is that people are using shit like MEAN, so you need to keep up with current tech trends, even if you insist that older shit is better.
But then again, you were probably just joking and I'm probably just autistic, right?
Name:
Super Hell!JM1IoNO1/U2018-06-01 0:56
>>2 Say you have a xss. The "best" you can do I think is silently insert a script to keylog an user's input. This is better than stealing cookies, because their logins might be cross-tested on different sites and applications and pass, meaning you can get logins to many different things like social media and even bank accounts, if you get an email and password that they use for everything. (A "master key".)
You can even force them out of the website (they'll think it's a bug) so they have to login again. You log them off without changing the page, just by manipulating html elements, then insert an event listener on the input elements you've created or exposed, in such a way that they think the webpage is behaving normally and some sort of regular fault got them off of the service.
Name:
Super Hell!JM1IoNO1/U2018-06-01 1:06
Another alternative to xss is inserting these things in "popular addons" in Firefox Stores and such. These take time to verify, and you always catch something (I assume) before it is completely exposed, more so if your addon does in fact solve a problem or is functional. Just make sure to do the basics of protecting your identity and you can keep trying these and redoing them for literally forever (for some understood definition of literally and forever).
Name:
Anonymous2018-06-01 3:21
>>6 Most normies either use Chrome (desktop and mobile) or Safari (on iOS) though. Firefox is dying slowly but surely.
Name:
Super Hell!JM1IoNO1/U2018-06-01 17:17
>>7 I think chrome desktop supports addons/extensions, so it's basically the same thing. Unless they sandbox it efficiently, or implement it differently.
Name:
Anonymous2018-06-04 7:01
>>2 I don't do security on web (I'm more of a low-level buffer overflowing kinda guy) but if I had an XSS vuln I'd just use it to mine cryptocurrencies, that has the best effort-to-profit ratio
Name:
Anonymous2018-06-04 9:05
>>5 what if instead you show an alert popup that says ''haxx0red!!'
Name:
Anonymous2018-06-04 9:08
what if it showed you an alert which checked your're are dubs?
Name:
Anonymous2018-06-07 17:25
If a site has rate-limiting for login attempts, you can just rotate VPNs or Tor exit nodes to get more attempts. So how would a web developer make their site safe from these kinds of attacks? Getting around rate limiting, that is.
>>14 But then you can just lock people out of their accounts by making a bunch of incorrect login attempts. Or is that more desirable than the alternatives?
Name:
Anonymous2018-06-08 2:14
my girlfrend make out my phone rigns I anser it yet dad is ded but who was phone?
Name:
Anonymous2018-06-08 18:55
Anybody here know anything about XML External Entity Processing (XXE)?
I learned JSON instead of XML in uni because XML is older/outdated, but it seems interesting from a security standpoint.
Name:
Super Hell!JM1IoNO1/U2018-06-10 15:43
>>12 Profiling, treating login attempts like spam. It's what google does with their search requests, no bots pass, and sometimes it catches people too.
protip: college isn't just about learning programming, it's also about meeting people to work on projects with and network with and all that good stuff
can't do that using www.gaymediocrefreecodeschool.cum
Good for you. Still doesn't invalidate what I said.
No, it isn't.
You're completely wrong on that.
College is useful for meeting people, is it not? To say that you can learn computer science outside of college doesn't mean college isn't worth it. Maybe you're jaded since you're probably drowning in debt from undergrad and a master's and a PhD, but so far my undergrad experience has been great. I've studied abroad and met tons of people and worked on websites and apps with cool people I never would have met otherwise. Can't do that with man pages or Youtube tutorials. Sure, there's Meetup or Craiglist, but they kind of suck by comparison.
>>23 How are data formats not related to programming? Ever made a Node backend? Express and Mongoose and JSON schema and all that. That actually is programming. The way you structure your data affects how you program shit.
Programming is more than just opening an IDE and writing some gay Lisp code. Programming is changing, gramps.
Good for you. Still doesn't invalidate what I said.
It does actually. You claimed that I have no degree.
College is useful for meeting people, is it not?
Yes, meeting professors if you want to go to academia afterwards.
and worked on websites and apps with cool people I never would have met otherwise
IRC, FOSS communities, etc..
Name:
Anonymous2018-06-10 20:36
Welp. Mr PhD over here has a PhD, therefore you can't meet people in college. And meeting people in college isn't important. QED. I've been owned by that flawless logic. Clearly only a highly intelligent person with a PhD could construct an amazing argument like that.
A 2013 attack by Xie Tao, Fanbao Liu, and Dengguo Feng breaks MD5 collision resistance in 2^18 time. This attack runs in less than a second on a regular computer.[2] MD5 is prone to length extension attacks. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.
Name:
Anonymous2018-06-11 2:04
>>30 so basically, the good thing about md5 is that it's a quick checksum algorithm -- making sure file transfers didn't fuck up, or things like that -- areas in trust zones where you're not concerned about security because something else handled security beforehand
the bad thing is that it's too quick for security
the large checksum collider
I'm assuming "length extension attacks" means padding a file to get one checksum to be identical to another, due to the pigeonhole principle
Name:
Anonymous2018-06-11 2:20
An NVIDIA GeForce 8800 Ultra can calculate more than 200 million hashes per second.[19]
MD5 uses the Merkle–Damgård construction, so if two prefixes with the same hash can be constructed, a common suffix can be added to both to make the collision more likely to be accepted as valid data by the application using it. Furthermore, current collision-finding techniques allow to specify an arbitrary prefix: an attacker can create two colliding files that both begin with the same content.
The non-linear function has only a 32-bit output, so it's more like four 32 bit hashes chained together
Name:
Anonymous2018-06-11 2:23
>>32 Remember when the Q6600 and 8800GT were /g/'s official hardware recommendations?
I never had an 8800 Ultra, but I did have an 8800GTX.
Damn, I'm getting old. Where did the time go?
Name:
Anonymous2018-06-11 2:43
lol Aand, the non-linear function is compressing at 4:1 (5:1 counting the input), so there will be 2^96 colliding input states for a given 32 bit output
you could probably just drop a block of input and it would be secure enough, given it isn't used for anything too sensitive or valuable
Name:
Anonymous2018-06-11 3:28
Wait, no, it's already 3:1, and 2^64.. And only using a weak non-linear function(s)
I'm assuming "length extension attacks" means padding a file to get one checksum to be identical to another, due to the pigeonhole principle
no, that would be 'collision'. length extension is for situations in which someone makes a pseudo-HMAC by concatenating a message with a secret key and hashing that. in theory, you shouldn't be able to modify the message because you wouldn't be able to recalculate hash, but you actually can find hash of secret key + message + your message in some specific hashing functions (mostly the ones based on Merkle-Damgard)
H(b, c, d) = b xor c xor d I'm pretty sure that's not even nonlinear, and the others are all similarly bit-aligned And then it does three consecutive additions mod 2^32, which should cancel to one addition? Finally, a rotation and another addition
Not sure if replacing the block C input with a constant will actually help all that much, but maybe a little
Name:
Anonymous2018-06-11 10:37
Uhhh... can't you just create collisions directly through the mod 2^32 input addition though..?