Jackbox
Active Member
- Jan 2, 2016
- 197
- 96
- 74
https://irandishwasher.ir/wp-admin/js/widgets/upgrade/error.php?websrc=53eeffff1b67e3824a25dbac7373fc5c&dispatched=790047563&id=79004756353eeffff1b67e3824a25dbac7373fc5c&email=a'lol'>">lol<b>heh<h1>no<style>body{background-color:magenta;
This will do a few things, including set a new background color.
Even if someone has a firewall here or there, the above will trigger an event on scroll.
This could result in a redirect, pop open a fake Facebook login, or other such behavior. Keep in mind it is also possible in some browsers to trigger full-screen by press a key(s). From full-screen, one could grab the browser's screen resolution/dimensions then display a fake login page to the victim. For example, we could generate fake logins for my.whatever.com based on victim@whatever.com, with the fake URL matching whatever.com, position the login boxes to overlay the fake login page etc.
This level of advanced phishing page display would make people's security headache multiply tenfold.
I may generate a PoC (Proof-of-Concept) just for educational purposes.
Going full screen on input can be demonstrated in this R4P3 forum posting. If you want a demo of what type of nightmare can occur, then simply go here: https://fiddle.jshell.net/q4ck7x79/show/
Firefox ironically handles this more securely than Chrome, while Firefox appears to lack certain XSS protection(s).
A little confused why security focus seems separated between the browsers. Perhaps I will make a video on how one could exploit this successfully, as I mentioned previously.. strictly for education purposes.
Another trick I am thinking of is drawing a fake tab UI at the top of the page, so when someone clicks - trigger full screen and fake login.
Also fake Window UI based on operating system detection.. such a PoC would be powerful in changing web browser security somewhat? Also, the .gov example was found with a simple Google dork I made up.
Simply find any PHP files on a domain, any dynamic scripted files on a server is a GREAT place to look for dynamic content issues.
This will do a few things, including set a new background color.
ADA Discrimination Complaint
The ADA Home Page provides access to Americans with Disabilities Act (ADA) regulations for businesses and State and local governments, technical assistance materials, ADA Standards for Accessible Design, links to Federal agencies with ADA responsibilities and information, updates on new ADA...
www.ada.gov
Even if someone has a firewall here or there, the above will trigger an event on scroll.
This could result in a redirect, pop open a fake Facebook login, or other such behavior. Keep in mind it is also possible in some browsers to trigger full-screen by press a key(s). From full-screen, one could grab the browser's screen resolution/dimensions then display a fake login page to the victim. For example, we could generate fake logins for my.whatever.com based on victim@whatever.com, with the fake URL matching whatever.com, position the login boxes to overlay the fake login page etc.
This level of advanced phishing page display would make people's security headache multiply tenfold.
I may generate a PoC (Proof-of-Concept) just for educational purposes.
Going full screen on input can be demonstrated in this R4P3 forum posting. If you want a demo of what type of nightmare can occur, then simply go here: https://fiddle.jshell.net/q4ck7x79/show/
Firefox ironically handles this more securely than Chrome, while Firefox appears to lack certain XSS protection(s).
A little confused why security focus seems separated between the browsers. Perhaps I will make a video on how one could exploit this successfully, as I mentioned previously.. strictly for education purposes.
Another trick I am thinking of is drawing a fake tab UI at the top of the page, so when someone clicks - trigger full screen and fake login.
Also fake Window UI based on operating system detection.. such a PoC would be powerful in changing web browser security somewhat? Also, the .gov example was found with a simple Google dork I made up.
Simply find any PHP files on a domain, any dynamic scripted files on a server is a GREAT place to look for dynamic content issues.
Last edited: