Chapter 1 Cross-site Scripting Fundamentals
1-Introduction
2-Web Application Security
3-XML and AJAX Introduction
4-Summary
5-Solutions Fast Track
6-Frequently Asked Questions
Chapter 2 The XSS Discovery Toolkit
1-Introduction
2-Burp
3-Debugging DHTML With Firefox Extensions
4-DOM Inspector
5-Web Developer Firefox Extension
6-Insert Edit HTML Picture
7-XSS Example in Web Developer Web Site
8-FireBug
9-Analyzing HTTP Traffic with Firefox Extensions
10-LiveHTTPHeaders
11-ModifyHeaders
12-TamperData
13-GreaseMonkey
14-GreaseMonkey Internals
15-Creating and Installing User Scripts
16-PostInterpreter
17-XSS Assistant
18-Active Exploitation with GreaseMonkey
19-Hacking with Bookmarklets
20-Using Technika
21-Summary
22-Solutions Fast Track
23Frequently Asked Questions
Chapter 3 XSS Theory
1-Introduction
2-Getting XSS’ed
3-Non-persistent
4-DOM-based
5-Persistent
6-DOM-based XSS In Detail
7-Identifying DOM-based XSS Vulnerabilities
8-Exploiting Non-persistent
9-DOM-based XSS Vulnerabilities
10-Exploiting Persistent DOM-based XSS Vulnerabilities
11-Preventing DOM-based XSS Vulnerabilities
12-Redirection
13-Redirection Services
14-Referring URLs
15-CSRF
16Flash, QuickTime, PDF, Oh My
17-Backdooring Image Files
19-HTTP Response Injection
20-Source vs. DHTML Reality
21-Bypassing XSS Length Limitations
22-XSS Filter Evasion
23-When Script Gets Blocked
24-Browser Peculiarities
25-CSS Filter Evasion
26-XML Vectors
27-Attacking Obscure Filters
28-Encoding Issues
29-Summary
30-Solutions Fast Track
31-Frequently Asked Questions
32-Playing with Flash Fire
33-Hidden PDF Features
34-QuickTime Hacks for Fun and Profit
35-Backdooring Image Files
36HTTP Response Injection
Chapter 4 XSS Attack Methods
1-Introduction
2-History Stealing
3-JavaScript/CSS API “getComputedStyle”
4-Code for Firefox/Mozilla. May
5-Work In Other Browsers
6-Stealing Search Engine Queries
7-JavaScript Console Error Login Checker
8-Intranet Hacking
9-Exploit Procedures
10-Persistent Control
11-Obtaining NAT’ed IP Addresses
12-Port Scanning
13-Blind Web Server Fingerprinting
14-Attacking the Intranet
15-XSS Defacements
16-Summary
17-Solutions Fast Track
18-Frequently Asked Questions
19-References
Chapter 5 Advanced XSS Attack Vectors
1-Introduction
2-DNS Pinning
3-Anti-DNS Pinning
4-Anti-Anti-DNS Pinning
5-Anti-anti-anti-DNS Pinning
6-AKA Circumventing Anti-anti-DNS Pinning
7-Additional Applications of Anti-DNS Pinning
8-IMAP3
9-MHTML
10-Expect Vulnerability
11-Hacking JSON
12-Summary
13-Frequently Asked Questions
Chapter 6 XSS Exploited
1-Introduction
2-XSS vs. Firefox Password Manager
3-SeXXS Offenders
4-Equifraked
5-Finding the Bug
6-Building the Exploit Code
7-Owning the Cingular Xpress Mail User
8-The Xpress Mail Personal Edition Solution
9-The Ackid (AKA Custom Session ID)
10-The Inbox
11-The Document Folder
12-E-mail Cross-linkage
13-CSFR Proof of Concepts
14-Cookie Grab
15-Xpressmail Snarfer
16-Owning the Documents
17-Alternate XSS: Outside the BoXXS
18-Owning the Owner
19-The SILICA and CANVAS
20-Building the Scripted Share
21-Owning the Owner
22-Lessons Learned and Free Advertising
23-Airpwned with XSS
24-XSS Injection: XSSing Protected Systems
25-The Decompiled Flash Method
26-Application Memory Massaging –XSS via an Executable
27-XSS Old School - Windows Mobile PIE 4.2
28-Cross-frame Scripting Illustrated
29-XSSing Firefox Extensions
30-GreaseMonkey Backdoors
31-GreaseMonkey Bugs
32-XSS the Backend: Snoopwned
33-XSS Anonymous Script Storage - TinyURL 0day
34-XSS Exploitation: Point-Click-Own with EZPhotoSales
35-Summary
36-Solutions Fast Track
37-Frequently Asked Questions
Chapter 7 Exploit Frameworks
1-Introduction
2-AttackAPI
3-Enumerating the Client
4-Attacking Networks
5-Hijacking the Browser
6-Controlling Zombies
7-BeEF
8-Installing and Configuring BeEF
9-Controlling Zombies
10-BeEF Modules
11-Standard Browser Exploits
12-Port Scanning with BeEF
13-Inter-protocol Exploitation and Communication with BeEF
14-CAL9000
15-XSS Attacks, Cheat Sheets, and Checklists
16-Encoder, Decoders, and Miscellaneous Tools
17-HTTP Requests/Responses and Automatic Testing
18-Overview of XSS-Proxy
19-XSS-Proxy Hijacking Explained
20-Browser Hijacking Details
21-Attacker Control Interface
22-Using XSS-Proxy: Examples
23-Setting Up XSS-Proxy
24-Setting Up XSS-Proxy
25-Injection and Initialization Vectors For XSS-Proxy
26-Handoff and CSRF With Hijacks
27-Sage and File:// Hijack With Malicious RSS Feed
28-Summary
29-Solutions Fast Track
30-Frequently Asked Questions
Chapter 8 XSS Worms
1-Introduction
2-Exponential XSS
3-XSS Warhol Worm
4-Linear XSS Worm
5-Samy Is My Hero
6-Summary
7-Solutions Fast Track
8-Frequently Asked Questions
Chapter 9 Preventing XSS Attacks
1-Introduction
2-Filtering
3-Input Encoding
4-Output Encoding
5-Web Browser’s Security
6-Browser Selection
7-Add More Security To Your Web Browser
8-Disabling Features
9-Use a Virtual Machine
10-Don’t Click On Links in E-mail, Almost Ever
11-Defend your Web Mail
12-Beware of Overly Long URL’s
13-URL Shorteners
14-Secrets Questions and Lost Answers
15-Summary
16-Solutions Fast Track
17-Frequently Asked Questions
Download
http://www.mediafire.com/?5ktpvb68dvq1xvi
Web chia sẻ thủ thuật máy tính, thủ thuật windows, thủ thuật internet, thủ thuật tin học, vi tính hay nhất, phần mềm miễn phí.
Saturday, July 21, 2012
Subscribe to:
Post Comments (Atom)
Popular Posts
-
What Is SQL Injection? 1-Introduction 2-Understanding How Web Applications Work. 3-A Simple Application Architecture 4-A More Complex Archit...
-
Áo tắm của thí sinh hoa hậu Hong Kong bị nhận xét quá thoáng, Phạm Băng Băng mặc váy trong suốt và Jessica C khoe vòng 1 nóng bỏng là tin tứ...
-
Đó là bày tỏ của bạn Dương Văn Đạt - Lớp Văn B, ĐHSP Thái Nguyên trong lá thư gửi đến Báo Giáo dục Việt Nam khi đề cập đến nhiều bất cập hiệ...
-
Đàn Ghita của Lor-ca (Thanh thảo) Xem thêm bài khác Mấy suy nghĩ về thế giới nghệ thuật thơ Thanh Thảo Cảm nhận về bài thơ "Đàn ghita ...
-
GS70 có độ mỏng 2,16 mm cùng cân nặng 2,6 kg, ấn tượng hơn cả chiếc laptop chơi game đình đám Blade Pro của Razer. MSI GS70. Ảnh chính thứ...
-
Để hoàn thành bộ tut Local Attack full, hôm nay Soleil sẽ giới thiệu bài 3, cũng chính là bài quan trọng và trọng tâm nhất trong Local Atta...
-
Quang Thắng cười thả ga vì có cơ hội nói xấu cô bạn 'đào thế' thân thiết: 'Con đó khôn lắm, rạch giời rơi xuống, cả nước Việt Na...
-
Demo: http://thegioisacmau.net Download: Click here to download!
-
Kết thúc khóa học 2012 trên h0cm@i.vn hiện tại mình đang giữ Khoá luyện thi đại học đảm bảo môn hóa 2012 trên h0cm@i.vn . Nhưng sẻ không sh...
-
Hậu vệ Armand Traore đề nghị một diễn viên phim khiêu dâm tới Anh với mức giá 2.000 USD mỗi ngày. Hậu vệ Armand Traore của QPR. Ảnh: PA . M...
No comments:
Post a Comment