lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <122827b90601201031p16198b59r3e50c288c1b3654d@mail.gmail.com>
Date: Fri Jan 20 18:31:43 2006
From: stan.bubrouski at gmail.com (Stan Bubrouski)
Subject: MBT Xss vulnerability

Well I'm not going to talk about how XSS is useless because we all
know it can be quite a serious problem.  I think, and I don't know the
guy so I can't be sure, the original dissenter to this post was
pointing out that:
What would you phish from a site that doesn't have any forms anyways?
What would stealing a session cookie get you if the only dynamic
content is a search function?

I'm not saying XSS isn't important, I'm just wondering why this case is?

-sb

On 1/20/06, Jerome Athias <jerome.athias@...e.fr> wrote:
> Hey guy, do you know something about XSS
> 1) Phishing?
> 2) encoded URL, UTF8...?
> 3) cookie steal?
> ...
>
> it'll not be difficult to reproduce a website and have an url difficult
> to understand for a basic user...
> sure it's harder to spoof the url in the browser...
> //
>
> Native.Code a ?crit :
> > What a lame vulnerability it is. If your POC redirects to another site
> > (which is not MBT site), how someone will become victim and believe that
> > he/she is doing business with MBT?
> >
> > Your post is yet another proof that FD is more and more inhibited by scipt
> > kiddies. Get a life!
> >
>
>
> ---------------------------------------------------------------------------------------------------------
> About FD:
> "Speech is silver, but silence is gold"
>
>
> /JA
> /https://www.securinfos.info/
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ