mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-04-28 11:36:08 -04:00
websecurity
This commit is contained in:
parent
a491bdca1e
commit
0a30e5e40e
@ -49,7 +49,7 @@ $ wget -rck <TARGET-WEBSITE>
|
|||||||
|
|
||||||
```
|
```
|
||||||
$ /wget -r -l1 -H -t1 -nd -N -nd -N -A.swf -erobots=off <WEBSITE> -i output_swf_files.txt
|
$ /wget -r -l1 -H -t1 -nd -N -nd -N -A.swf -erobots=off <WEBSITE> -i output_swf_files.txt
|
||||||
```
|
|
||||||
* Once we have identified and downloaded *.swf files, we must analyze the code, the functions (as *loadMovie*) variables in order to identify those that call and allow other types of vulnerabilities such as cross site scripting. Below shows some vulnerable functions:
|
* Once we have identified and downloaded *.swf files, we must analyze the code, the functions (as *loadMovie*) variables in order to identify those that call and allow other types of vulnerabilities such as cross site scripting. Below shows some vulnerable functions:
|
||||||
|
|
||||||
```
|
```
|
||||||
@ -61,8 +61,7 @@ function.getURL,javascript:alert('css')
|
|||||||
TextField.html - payload: <img src='javascript:alert("css")//.swf'>
|
TextField.html - payload: <img src='javascript:alert("css")//.swf'>
|
||||||
```
|
```
|
||||||
|
|
||||||
* We could use tools such as **Deblaze** and **SWFIntruder**. We should also
|
* We could use tools such as **Deblaze** and **SWFIntruder**. We should also analyze the parameter AllowScriptAccess, Flash Parameter Pollution or sensitive APIs:
|
||||||
analyze the parameter AllowScriptAccess, Flash Parameter Pollution or sensitive APIs:
|
|
||||||
|
|
||||||
```
|
```
|
||||||
loadVariables, loadVariblesNum, MovieClip.loadVariables, loadVars.load, loadVars.sendAndLoad
|
loadVariables, loadVariblesNum, MovieClip.loadVariables, loadVars.load, loadVars.sendAndLoad
|
||||||
|
Loading…
x
Reference in New Issue
Block a user