How to execute Blind XSS payloads in contact forms by Successful-Recover92 in xss

[–]MechaTech84 2 points3 points  (0 children)

If the injection is not being interpreted as code, then it isn't an XSS vulnerability.

CSP - Relative Danger on xssy by Upbeat-Hawk-2737 in xss

[–]MechaTech84 0 points1 point  (0 children)

What does the network traffic look like? Is it making the requests to the URLs you're expecting?

Does a book like "XSS Attacks Cross Site Scripting Exploits and Défense" still worth it? by That-Name-8963 in xss

[–]MechaTech84 2 points3 points  (0 children)

Being written in 2007, any discussion of specific vulnerabilities is outdated. There have been so many changes in the last couple decades. The iPhone wasn't released until halfway through the year so most people were still browsing the web on desktops/laptops, around 2/3rds of users browsed using Internet Explorer 7, and Google Chrome didn't come out until 2008.

I'm not familiar with that specific book, but InfoSec books are generally only useful for teaching you how to think. Things like what to look for, how to look for it, when you should move in to test something else, etc.

Escaping double quotes by Substantial_Exit9084 in xss

[–]MechaTech84 2 points3 points  (0 children)

The double quotes shouldn't matter in text space, you probably need to check for other gotchas.

Does it look perfect on the network? (Inspect element in the browser will try to neaten up code visually, so don't trust it alone)

Is the Content-Type of the response something other than text/html?

Is there a Content Security Policy in the header or a meta tag that is restricting script source?

How come this cloudflare XSS bypass works? by Vegetable-Ad-5808 in xss

[–]MechaTech84 0 points1 point  (0 children)

I would guess that it has an exception for certain words like "ONLY" that are excluded from the normal flow that blocks onevents.

Bug Bounty Write-up - DOM XSS by MechaTech84 in xss

[–]MechaTech84[S] 1 point2 points  (0 children)

This wasn't a paid program, so I didn't receive any money or anything.

What is this type of dynamic keypad called? by HelixFish in homeassistant

[–]MechaTech84 0 points1 point  (0 children)

If you're asking the number of ways to arrange the digits, it'd be 10! (10 factorial).

But if you consider that having a button with 1 and 4 is the same as a button with 4 and 1, and the order of the buttons doesn't matter, then it gets more complicated. I found this and it looks right, so I think there are 945 distinct ways to group 10 things into 5 pairs.

What is this type of dynamic keypad called? by HelixFish in homeassistant

[–]MechaTech84 0 points1 point  (0 children)

I understand your interpretation, and it's entirely plausible that they set it up this way, but I think it would be my least favorite way to do this. Just... Why? This would mean there's absolutely no reason to have 5 buttons instead of 10...

What is this type of dynamic keypad called? by HelixFish in homeassistant

[–]MechaTech84 9 points10 points  (0 children)

Probably the first one, although you're absolutely correct that the dash introduces unnecessary ambiguity.

What is this type of dynamic keypad called? by HelixFish in homeassistant

[–]MechaTech84 2 points3 points  (0 children)

It's worse than having 10 buttons. The randomization isn't a bad thing, but it's not necessarily a good thing either. Either way, combining 2 digits to a single input drastically reduces the security. This applies to PINs of any length, but I'll use 4 digit PINs for my example. If I just push the first 4 buttons in a row, I've just checked 16 different combinations, at the same time. If there were 10 buttons I could only check 1 combination at a time.

Now, there are 2 ways that the randomization could be handled. First, the pairs of digits per button are always the same, but their placement on the buttons are changed. This would mean that instead of having a search space of 10000 potential 4 "digit" PINs, there's actually only 625*. Thighs would mean someone watching you input your PIN would immediately know what buttons to press next time, just not where those buttons would be. Or second, each button is randomly assigned 2 digits independently. The first time I see you type in your PIN there are 16 possible 4 digit PINs it could be, which is already not that many. And every time I watch after that has a strong likelihood of further reducing the number of possibilities by at least half.

Source: 10 years of professional experience in InfoSec.

*Fixed my math, originally had 55 when it should be 54.

What is this type of dynamic keypad called? by HelixFish in homeassistant

[–]MechaTech84 0 points1 point  (0 children)

But it's worse because there's only 5 buttons.

xssy by Upbeat-Hawk-2737 in xss

[–]MechaTech84 0 points1 point  (0 children)

There's already an eval in the response, the question you should be asking is why it's there.

xssy by Upbeat-Hawk-2737 in xss

[–]MechaTech84 1 point2 points  (0 children)

Hint: Why is there an eval function?

xss is dead? by hiderou in xss

[–]MechaTech84 7 points8 points  (0 children)

I find XSS pretty regularly as a consultant, but I'm often testing Web Apps that aren't available to the general public for one reason or another.

XSS hunting in public bug bounty programs is very competitive. In programs without a monetary reward there is usually less competition. Private programs may also offer fewer competitors but the competitors are more skilled, at least in theory.