From c2c96ef08b86771b5edda22b5bb9f1c2985f1af2 Mon Sep 17 00:00:00 2001 From: ShadowByte <155693555+ShadowByte1@users.noreply.github.com> Date: Wed, 7 Aug 2024 14:08:45 +1000 Subject: [PATCH] Update README.md --- README.md | 99 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 99 insertions(+) diff --git a/README.md b/README.md index 5f9168a..ccb8360 100644 --- a/README.md +++ b/README.md @@ -573,8 +573,107 @@ Injecting malicious content into iframe sources can lead to XSS. http://example.com/page.php?page=http://malicious.com ``` +Injecting Base Tags +If script tags and event handler attributes are blogged you can try to leverage base tags for XSS +``` +//lets say the site has a script tag like this + +``` + +EventSource API Injection +The EventSource API allows servers to push updates to the client. If the server sends unsanitized data, it can lead to XSS. +``` +event: message\ndata: \n\n +``` + +CSS Content Property Injection +If an application allows user input in CSS properties without sanitization, it can lead to XSS. +``` + +``` + +Drag and Drop File Path Injection +If a web application accepts dragged-and-dropped files and reflects their paths without sanitization, it can lead to XSS. +Find the Files here: +https://github.com/ShadowByte1/XSS-File-Path-Names +``` +"> +``` + +Data Binding Libraries Injection +If an application uses data binding libraries (like AngularJS) and reflects user input without sanitization, it can lead to XSS. +``` +
+
+
+ +``` + +# Internationalized Domain Names (IDN) Homograph Attack +Description: +IDN allows the use of Unicode characters in domain names. Attackers can register domains that look visually similar to trusted domains by using characters from different languages that look alike. These domains can then host malicious content. + +Detailed Example of IDN Homograph Attack +Domain Registration: +The attacker registers a domain that looks similar to a trusted domain. For example, they can replace the Latin letter "a" with the Cyrillic letter "а" (U+0430). + +Trusted domain: example.com +Malicious domain: exаmple.com (notice the Cyrillic "а") +Punycode Representation: +Browsers convert Unicode domains to ASCII-compatible encoding called Punycode. This representation starts with xn--. + +example.com (trusted domain) +exаmple.com (malicious domain) becomes xn--exmple-2of.com +Hosting Malicious Content: +The attacker hosts a page on xn--exmple-2of.com with malicious scripts designed to look like the legitimate site but contain XSS payloads. + +Phishing Email or Link: +The attacker sends phishing emails or messages with links to the malicious domain, tricking users into clicking them.