SlideShare a Scribd company logo
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
•
•
•
•
START
Xenotix HTTP Web Shell
Proxy
Web Server
ATTACKER
VICTIM
GET http://facebook.com
Serve the
JavaScript
File
Facebook.com HTML page contents
FB’s
Server
SO....
Never Under Estimate
the Power of XSS
ajinabrahamofficial
ajinabrahamofficial
ajinabraham
ajinabraham
ajin.abraham@owasp.org

More Related Content

PPT
Website Research
PDF
Node JS reverse shell
PDF
How to find Zero day vulnerabilities
DOCX
Zero-Day Vulnerability and Heuristic Analysis
PDF
Xenotix XSS Exploit Framework: Clubhack 2012
PDF
Null Singapore 2015 accomplishments
PDF
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
PPTX
A2 - broken authentication and session management(OWASP thailand chapter Apri...
Website Research
Node JS reverse shell
How to find Zero day vulnerabilities
Zero-Day Vulnerability and Heuristic Analysis
Xenotix XSS Exploit Framework: Clubhack 2012
Null Singapore 2015 accomplishments
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
A2 - broken authentication and session management(OWASP thailand chapter Apri...

More from Ajin Abraham (20)

PDF
AppSec PNW: Android and iOS Application Security with MobSF
PDF
Injecting Security into Web apps at Runtime Whitepaper
PDF
Injecting Security into vulnerable web apps at Runtime
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
PDF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
PPTX
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
PDF
Hacking Tizen: The OS of everything - Whitepaper
PPTX
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
PPTX
Abusing Exploiting and Pwning with Firefox Addons
PPTX
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
PPTX
Abusing Google Apps and Data API: Google is My Command and Control Center
PPTX
Exploit Research and Development Megaprimer: Win32 Egghunter
PPTX
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
PPTX
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
PPTX
Exploit Research and Development Megaprimer: Buffer overflow for beginners
PDF
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...
PDF
Abusing, Exploiting and Pwning with Firefox Add-ons
PDF
Wi-Fi Security with Wi-Fi P+
AppSec PNW: Android and iOS Application Security with MobSF
Injecting Security into Web apps at Runtime Whitepaper
Injecting Security into vulnerable web apps at Runtime
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Abusing Exploiting and Pwning with Firefox Addons
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Abusing Google Apps and Data API: Google is My Command and Control Center
Exploit Research and Development Megaprimer: Win32 Egghunter
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Exploit Research and Development Megaprimer: Buffer overflow for beginners
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...
Abusing, Exploiting and Pwning with Firefox Add-ons
Wi-Fi Security with Wi-Fi P+
Ad

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
sap open course for s4hana steps from ECC to s4
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Ad

Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013