ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

DOM Vulnerabilities - Exploiting DOM Clobbering to Enable XSS

Автор: z3nsh3ll

Загружено: 2024-02-20

Просмотров: 3167

Описание: Support This Channel
======================

Please like and subscribe, it means a lot!

Please buy me a coffee so I can continue to make content.
https://buymeacoffee.com/zenshell

Join our Discord
  / discord  


The video provides a detailed walkthrough of exploiting DOM Clobbering to enable cross-site scripting (XSS) in an expert-level lab. We being by explaining the concept of clobbering, which involves overwriting memory locations either unintentionally, like a developer overwriting new code with an outdated version, or intentionally by a hacker to alter code execution. The lab focuses on a simple HTML document with two anchor tags having the same ID, which is usually against HTML practices. This setup leads to non-standard browser behavior where properties are added to the window object based on element IDs, but this behavior is not consistent across browsers.

The lab demonstrates how, in Chrome, accessing a window property with the ID of these elements returns an HTML collection, which can be manipulated. The presenter shows how exploiting this behavior can lead to an XSS vulnerability by manipulating the value of a variable that a function depends on, without directly injecting into the function itself.

The lab further delves into the prerequisites for the attack, the setup of the HTML document, and the non-standard behavior of browsers regarding window properties. The video highlights the importance of unique IDs in HTML and how browsers may implement this functionality differently, which developers should not rely on.

The attack is carried out in a blog post comment section, where the presenter demonstrates how to manipulate the default avatar image source by injecting HTML through the comment. The video explains the process in detail, including the challenges faced due to browser differences and the mechanisms in place like DOM Purify that attempt to sanitize input to prevent such vulnerabilities. Despite these mechanisms, the lab shows how a carefully crafted payload can bypass sanitization by exploiting the non-standard behavior and the nuances of HTML and URL encoding.

In the end, the lab succeeds in enabling an XSS attack vector through DOM clobbering, emphasizing the complexity and counterintuitive aspects of this vulnerability, the importance of understanding browser behavior, encoding techniques, and the limitations of sanitization libraries like DOM Purify in preventing such attacks.

00:00 Intro
00:22 What is Clobbering?
01:32 Clobbering Window Properties
04:51 What is a HTMLElement Anyway?
05:57 Exploring the Lab
07:06 Exploring the JavaScript
09:53 Initial Payload with Simple Injection
13:13 Understanding Concatenation of DOM Nodes
15:12 2nd Payload with Breakout Attempt
18:34 Introducing CID Directive
21:51 Third Payload with CID Directive
23:07 Eliminating Trailing Double Quote
24:11 Solving the Lab
25:23 Bypassing DOMPurify
31:11 SUMMARY of Key Concepts

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
DOM Vulnerabilities - Exploiting DOM Clobbering to Enable XSS

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DOM Vulnerabilities - Clobbering DOM Attributes to Bypass HTML Filtering

DOM Vulnerabilities - Clobbering DOM Attributes to Bypass HTML Filtering

Отражённая XSS-атака, защищённая очень строгой CSP с атакой на висячую разметку

Отражённая XSS-атака, защищённая очень строгой CSP с атакой на висячую разметку

Chapter-6 Dictionaries and Sets (Part - 1) | Ultimate Python Course | Aura Coder

Chapter-6 Dictionaries and Sets (Part - 1) | Ultimate Python Course | Aura Coder

Reflected XSS with AngularJS Sandbox Escape Without Strings

Reflected XSS with AngularJS Sandbox Escape Without Strings

ВСЕ защищено бэкдором. По умолчанию.

ВСЕ защищено бэкдором. По умолчанию.

Удаленное выполнение кода за 40 000 долларов (пошаговое руководство)

Удаленное выполнение кода за 40 000 долларов (пошаговое руководство)

RuhrSec 2023 // Everything You Wanted to Know About DOM Clobbering (But Were... , Soheil Khodayari

RuhrSec 2023 // Everything You Wanted to Know About DOM Clobbering (But Were... , Soheil Khodayari

DOM Vulnerabilities - DOM XSS Using Web Messages

DOM Vulnerabilities - DOM XSS Using Web Messages

AI ruined bug bounties

AI ruined bug bounties

Software simplicity is an illusion...

Software simplicity is an illusion...

СКАМЕРЫ ПОЛУЧИЛИ ПО ЗАСЛУГАМ: как хакеры уничтожают кол-центры в прямом эфире

СКАМЕРЫ ПОЛУЧИЛИ ПО ЗАСЛУГАМ: как хакеры уничтожают кол-центры в прямом эфире

DOM Vulnerabilities - DOM-based Cookie Manipulation

DOM Vulnerabilities - DOM-based Cookie Manipulation

Reflected XSS in a JavaScript URL with some characters blocked - Explaining the Payload

Reflected XSS in a JavaScript URL with some characters blocked - Explaining the Payload

Failed DOM Clobbering Research - All The Little Things 1/2 (web) Google CTF 2020

Failed DOM Clobbering Research - All The Little Things 1/2 (web) Google CTF 2020

A word about DOMPurify bypasses a.k.a why DOM parsing is crazy | Sekurak.tv

A word about DOMPurify bypasses a.k.a why DOM parsing is crazy | Sekurak.tv

Как использовать DOM Invader в 2023 году

Как использовать DOM Invader в 2023 году

DOM Vulnerabilities - DOM-based Open Redirect

DOM Vulnerabilities - DOM-based Open Redirect

Как хакеры взламывают Google 2FA

Как хакеры взламывают Google 2FA

Web Security Academy | DOM | 6 - Exploiting DOM Clobbering to Enable XSS

Web Security Academy | DOM | 6 - Exploiting DOM Clobbering to Enable XSS

Объяснение межсайтового скриптинга на основе DOM (DOM XSS)

Объяснение межсайтового скриптинга на основе DOM (DOM XSS)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]