opennms
+ Reply to Thread
Results 1 to 7 of 7

Thread: xss exploit on msn.com

  1. #1
    Join Date
    Dec 2006
    Posts
    3

    xss exploit on msn.com

    I want to get someone's cookie, so I can log into his/her hotmail account with proxomitron.

    First I wrote a php script to log files on a webserver into a website. Next I wrote a javascript to get the cookie, so the cookie can be written to the webserver. To test this script, I need to find an xss exploit on msn.com, but I can't find one.

    Does anyone now an xss exploit on msn.com that can be used to get the cookie?

  2. #2
    Join Date
    Jun 2006
    Posts
    459
    if i recall correctly xss is to make the perform a task not grab info... you would need them to click a link

    not much you can do with a cookie anyway
    Last edited by ~~smart~fool~~; 12-13-2006 at 05:06 PM.
    7h* L**7*57 c4n7 h4ck m*!
    Proud to have quit playing ®µÑȧ©ÅÞË

    If you write like a semi-literate boob you will very likely be ignored.
    Writing like a l**t script kiddie hax0r is the absolute l**t*st way to write!
    L0L

  3. #3
    Join Date
    Sep 2006
    Posts
    1,649
    No, an XSS injection is used to make the website think that the command is coming fromt the site's server. You can basically do whatever you can think of, as long as you have access to what your trying to do.

    For instance, mike's XSS injection involving the spam will not be executed if I click the link while I'm not logged in. So if you don't have the privleges to do the action normally, it won't happen.

    @crypto - [url]http://www.securiteam.com/[/url] has a whole list of vulnerabilities that may or may not have been fixed.
    Last edited by Moonbat; 12-13-2006 at 04:41 PM.

  4. #4
    Join Date
    Sep 2005
    Posts
    2,050
    Failure to filter user input allows code to be delivered to a user's browser which was not intended by the website to be there. The code can perform any function the other code on that page is capable of - change page layout, edit form data, redirect to external website, submit forms, etc.

    Two major security vulnerabilities which result from failure to filter user input are cross site scripting and cross site request forgery.

    Cross site scripting (XSS) relies on the access of a trusted page on a trusted domain to local objects specific to that website, such as cookies. This data is only available to pages on the trusted domain, so website B can't simply deliver a script to the users' browsers which sends away their sensitive cookies. However if you have a XSS vulnerability, you can run custom code inside a trusted web page, and send away the users' data to yourself in whatever way you feel necessary.

    Cross site request forgery (XSRF) is a term which describes the fact that some websites allow form data to be submitted from any website. However, even if a website only allows POST data from its own domain, a failure to filter user input compromises this security. You can simply inject malicious code which creates a form on the page directed at the target script, and submit it with javascript. This is what I used on this forum, and submitted users' forms directed at newthread.php. Any website with an interactive messaging system can be affected.

    I want to get someone's cookie, so I can log into his/her hotmail account with proxomitron.
    You should really try to understand the subject instead of following that outdated tutorial from net-force.nl. There are many more ways to edit cookies interactively.

    To test this script, I need to find an xss exploit on msn.com, but I can't find one.

    Does anyone now an xss exploit on msn.com that can be used to get the cookie?
    1. If anyone found one, they would keep it to themselves. They would certainly not post it here.

    2. If someone posted such a vulnerability publicly, it would be fixed within a day.

    Try using [URL="http://www.google.com/search?hl=en&lr=&as_qdr=all&q=+site%*Amsn.com&btnG=Search"]this search[/URL] to find vulnerable subdomains of msn.com. Look for older pages which haven't been updated in a long time.

  5. #5
    Join Date
    Dec 2006
    Posts
    3
    @smart
    Let the victim click the link is not a problem, and proxomitron can use the cookie to fake iexplore

    @moonbat
    Thank you for the link!

    @mike
    There are many more ways to edit cookies interactively..,
    Like?

    1. If anyone found one, they would keep it to themselves. They would certainly not post it here.
    I agree, but maybe someone will pm me a hole?

    1. If someone posted such a vulnerability publicly, it would be fixed within a day.
    That's not true. History tells us that it can take weeks/months for a hole has been fixed

    Try using this search to find vulnerable subdomains of msn.com. Look for older pages which haven't been updated in a long time</quote>
    thanks!
    Thanks!

    Thank you all for the reply's!

  6. #6
    Join Date
    Sep 2006
    Posts
    157
    this might work get a Cookie Editor get your cookie and the victoms cookie ope the editor up look for the myspace.com just type it in and itwill come up cause your cookie is logged then replace your cookie with the victoms cookie then open up myspace.com and you should be logged in as the vitcim.

    Not %*00 sure, but it might work. Hopefully :P

  7. #7
    Join Date
    Sep 2005
    Posts
    2,050
    Quote Originally Posted by cryptonomicon
    @smart
    @mike

    Like?
    Like Add 'n Edit Cookies, a Firefox extension. The extension currently doesn't work for Firefox 2.0, but all you have to do is edit one line of the file for it to work, like I did.

    I agree, but maybe someone will pm me a hole?
    If you expect people on this forum to both have the knowledge and luck to discover a vulnerability in msn.com... well, you expect too much.

    Your best bet is to look yourself, and definitely resist the temptation to Google for 'msn vulnerability'. If something like that can be found by Google, it has been fixed long ago.

    Other than that, join some of the prominent security mailing lists (bugtraq, full disclosure) if you want to be the first to hear of the discoveries. As soon as they hit the lists, they are fixed fairly quickly.

    That's not true. History tells us that it can take weeks/months for a hole has been fixed
    In some applications, but not MSN or any other major email provider - there is too much at stake. If we look at Windows they release patches for software vulnerabilities within weeks of disclosure; the MSN vulnerability discovered by net-force.nl was also fixed quickly. It depends on the publicity afforded to the vulnerability, how quickly they fix it, and how quickly they can apply the changes. No less than a week for an application with so many business responsibilities.

    If you plan on searching for vulnerabilities, you need a very good understanding of web application security risks in addition to simply knowing the languages. I have searched on all the known MSN domains and found nothing - what I think you need to do is discover hidden subdomains of msn.com (maybe by use of a brute force discovery tool?), because they are usually not meant to be seen and can totally lack security (if for testing, for example). I found an old page on another webmail service which could lead to cross site scripting, so it's not impossible.
    Last edited by Ezekiel; 12-14-2006 at 11:53 AM.

+ Reply to Thread

Similar Threads

  1. Photobucket password exploit
    By alhorby in forum Internet Privacy
    Replies: 0
    Last Post: 08-19-2007, 08:52 PM
  2. Myspace Redirect Exploit
    By Adora-Security in forum Internet Privacy
    Replies: 1
    Last Post: 05-25-2007, 11:03 AM
  3. MS Word RTF exploit trojan.
    By Intrepid in forum Viruses and Trojans
    Replies: 0
    Last Post: 06-15-2001, 01:14 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts