lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY10-DAV341Kx9VXFL0000f411@hotmail.com>
From: se_cur_ity at hotmail.com (morning_wood)
Subject: Slashdot: Gmail Accounts Vulnerable to XSS      Exploit

there is a [x] box..

"Don't ask for my password for 2 weeks."

this sets the users cookie. Gmail uses the cookie for authentication.


>XSS holes are not (as we all know) an immediate bypass for
> any authentication.
right

>It can be used, with a bit of work, to steal
> cookies/authentication data from unexpecting users, NOT as an immediate
> break-into-accounts kiddie tool.
right

> However, the interesting thing I found about this article was this line:
> "regardless of whether or not the password is subsequently changed"
>
> Does Gmail use some sort of static security key?
> Does anyone have any further details on the security implemented by Google
> in their new service?
see above.


m.wood


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ