SlideShare a Scribd company logo
XSSshell

Vandan Joshi
Introduction
• Consultant – Information Security
SecurEyes Techno Services Ltd
• MBA in Networks and IT Infrastructure
• Learner
AGENDA
•   Introduction
•   XSS Types
•   XSSShell
•   Demo
Cross Site Scripting




 Included in OWASP top 10 – 2010
Available at owasp.org
XSS Shell by Vandan Joshi
•   Very easy to exploit
•   Widespread
•   Javascript Exploit
•   Vulnerable to any platform
•   Target – Users’ web browser
•   Considered as a script injection attack
•   Malicious scripts run onto the other browsers
Cross Site Scripting
• Introduction
• Impacts
• Remediation that don’t work
Cross Site Scripting Demo
• Reflective XSS
• Stored XSS
• Demo by Hackersbank vulnerable application
XSS Shell
• XSS Shell Server
• The client Side Javascript
• XSSShell’s Administrative interface
• XSSShell Demo by BeeF and Hackers Bank
  Application

More Related Content

PDF
웹 개발을 위해 꼭 알아야하는 보안 공격
PPTX
Sencha Tech Session
PPTX
Extreme Web Exploitation
PPTX
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
PDF
Virtual Networking Security - Perimeter Security
PPTX
[Mas 500] Web Basics
PPTX
Fatcat Automatic Web SQL Injector by Sandeep Kamble
PPT
Cyber Insurance
웹 개발을 위해 꼭 알아야하는 보안 공격
Sencha Tech Session
Extreme Web Exploitation
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
Virtual Networking Security - Perimeter Security
[Mas 500] Web Basics
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Cyber Insurance

Similar to XSS Shell by Vandan Joshi (20)

PPTX
Cross site scripting (xss)
PDF
XSS.pdf
PDF
XSS.pdf
DOC
HallTumserFinalPaper
PDF
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...
PPTX
Cross site scripting
PPTX
Cross site scripting
PPTX
Identifying XSS Vulnerabilities
PDF
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
PPTX
Xss attack
PDF
Web Vulnerabilities And Exploitation - Compromising The Web
PDF
The Cross Site Scripting Guide
PPTX
Cross Site Scripting
PDF
Cross-Site Scripting course made by Cristian Alexandrescu
PDF
Complete xss walkthrough
PPTX
Cross Site Scripting (XSS)
PPTX
XSeyeyeyeyeyeyeyeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeS.pptx
Cross site scripting (xss)
XSS.pdf
XSS.pdf
HallTumserFinalPaper
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...
Cross site scripting
Cross site scripting
Identifying XSS Vulnerabilities
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
Xss attack
Web Vulnerabilities And Exploitation - Compromising The Web
The Cross Site Scripting Guide
Cross Site Scripting
Cross-Site Scripting course made by Cristian Alexandrescu
Complete xss walkthrough
Cross Site Scripting (XSS)
XSeyeyeyeyeyeyeyeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeS.pptx
Ad

More from ClubHack (20)

PDF
India legal 31 october 2014
PPTX
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
PPTX
Summarising Snowden and Snowden as internal threat
PDF
The Difference Between the Reality and Feeling of Security by Thomas Kurian
PDF
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
PPTX
Smart Grid Security by Falgun Rathod
PPTX
Legal Nuances to the Cloud by Ritambhara Agrawal
PPT
Infrastructure Security by Sivamurthy Hiremath
PDF
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
PPTX
Critical Infrastructure Security by Subodh Belgi
PPTX
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
PDF
Clubhack Magazine Issue February 2012
PDF
ClubHack Magazine issue 26 March 2012
PDF
ClubHack Magazine issue April 2012
PDF
ClubHack Magazine Issue May 2012
PDF
ClubHack Magazine – December 2011
PDF
One link Facebook (Anand Pandey)
PDF
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
PDF
Pentesting Mobile Applications (Prashant Verma)
India legal 31 october 2014
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Summarising Snowden and Snowden as internal threat
The Difference Between the Reality and Feeling of Security by Thomas Kurian
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Smart Grid Security by Falgun Rathod
Legal Nuances to the Cloud by Ritambhara Agrawal
Infrastructure Security by Sivamurthy Hiremath
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hacking and Securing iOS Applications by Satish Bomisstty
Critical Infrastructure Security by Subodh Belgi
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Clubhack Magazine Issue February 2012
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue April 2012
ClubHack Magazine Issue May 2012
ClubHack Magazine – December 2011
One link Facebook (Anand Pandey)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Pentesting Mobile Applications (Prashant Verma)
Ad

XSS Shell by Vandan Joshi