19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 12 n Attacking Users: Cross-Site Scripting 445<br />

Figure 12-7: A reflected XSS attack injecting Trojan functionality<br />

The URLs in <strong>the</strong>se attacks point to <strong>the</strong> au<strong>the</strong>ntic domain name of <strong>the</strong> actual<br />

<strong>application</strong>, with a valid SSL certificate where applicable. Therefore, <strong>the</strong>y are<br />

far more likely to persuade victims to submit sensitive information than pure<br />

phishing <strong>web</strong>sites that are hosted on a different domain and merely clone <strong>the</strong><br />

content of <strong>the</strong> targeted <strong>web</strong>site.<br />

Inducing User Actions<br />

If an attacker hijacks a victim’s session, he can use <strong>the</strong> <strong>application</strong> “as” that<br />

user and carry out any action on <strong>the</strong> user’s behalf. However, this approach to<br />

performing arbitrary actions may not always be desirable. It requires that <strong>the</strong><br />

attacker monitor his own server for submissions of captured session tokens from<br />

compromised users. He also must carry out <strong>the</strong> relevant action on behalf of every<br />

user. If many users are being attacked, this may be impractical. Fur<strong>the</strong>rmore,<br />

it leaves a ra<strong>the</strong>r unsubtle trace in any <strong>application</strong> logs, which could easily be<br />

used to identify <strong>the</strong> computer responsible for <strong>the</strong> unauthorized actions during<br />

an investigation.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!