Find XSS Vulnerable Sites with the Big List of Naughty Strings

Durum
Üzgünüz bu konu cevaplar için kapatılmıştır...

iscorpix

Kıdemli Üye
10 Eyl 2012
4,378
12
Dirty, malformed, and outright mischievous text strings have long been the enemy of interactive website developers. Strings contain any combination of letters, numbers, spaces, and punctuation, and are entered into text boxes on websites by users. These strings in particular can do everything from highlighting XSS vulnerabilities to soliciting 404 error pages.

When looking for vulnerabilities and glitches on your or someone else's website, you could come up with your own text strings to test out, but there are plenty of lists out there that have all that you need already. One such list is called the Big List of Naughty Strings, created and maintained by minimaxir, aka Max Woolf, a Software QA Engineer working in San Fransisco, California.

Minimaxir has been curating this list (at least) as far back as June 2015. The list changes as vulnerabilities are fixed on the server end, and as new ways to cause havoc are discovered. Lists like these are status quo for web developers to check for issues and vulnerabilities on their sites. The lists are also very popular for anyone who wants to stir things up a little by doing much the same. These strings can break websites and worse.

Getting the Latest List

You can find minimaxir's list on his GitHub page, where you can grab it via Git or with a standard HTTP download. You can also just browse the file directly on GitHub. I grabbed the ZIP file by hitting the green "Clone or download" button to the right.

find-xss-vulnerable-sites-with-big-list-naughty-strings.w1456.jpg


Opening the List Up
Once I expanded the download on my local filesystem, I was left with a directory called "big-list-of-naughty-strings-master," which contained the following files.

find-xss-vulnerable-sites-with-big-list-naughty-strings.w1456.jpg


The blns.txt file is the only thing we are interested in here. The remainder of the files deal mostly with acquiring this folder via Git, or using the word list programmatically.

Opening blns.txt in a text editor shows me the words and text strings.

find-xss-vulnerable-sites-with-big-list-naughty-strings.w1456.jpg


There's far more words and strings than what you see in the above screenshot. This list is 686 lines long, so you'll need to scroll down quite a ways. Comments, set off by #, define the strings by section to save you a bit of time, or better explain the section you're investigating.

Step 3Using the List
This part is so easy that anyone can do it. Literally anyone. All you have to do is visit a website where you have a box to input text and submit one of the text strings. Choose any strings from the list and give it a try; There's lots to choose from—numeric strings, special characters, Unicode symbols, two-byte characters, right-t0-left strings, script injection, and more.

As an example, to check for an easy cross-site scripting (XSS) vulnerability, try a script injection:

Kod:
<script>alert(123)</script>

find-xss-vulnerable-sites-with-big-list-naughty-strings.w1456.jpg


You can also check your own site for accurate profanity filtering:

Super Bowl XXX


(Yes, that commonly fails on many site search functions because of the triple-X bit.)

You can also find a site built with Ruby on Rails and see how well it's constructed:

Kod:
eval("puts 'hello world'")
System("ls -al /")
`ls -al /`
Kernel.exec("ls -al /")
Kernel.exit(1)
%x('ls -al /')

')


Reddit caught wind of this list last month, so you might glean something interesting there from those in the know. However, it seems that Reddit itself is locked down pretty well, since someone posted nearly the entire blns.txt file there and nothing happened.

Fact is, it's harder and harder to mess up sites via text input these days. But you never know until you try! Just keep in mind that if you're using these strings against a site which is not your own, you may find yourself blocked. That means the developers are doing their job right.

find-xss-vulnerable-sites-with-big-list-naughty-strings.w1456.jpg


 

SpySubs

Üye
26 Şub 2013
172
0
127.0.0.1
Thank you.
-XSS yaygın bulunan bir açık çeşitidir. Ödül avcılığı programları kapsamında firmalar cüzi ücretler ödemekteler. Brutforce yada Dork yazarak site hacklemeyi öğrenmek yerine XSS öğrenin.
 

Re-Design

Katılımcı Üye
6 May 2013
973
0
Boş vaktiniz olunca Türkçesinide paylaşın ingilizce bilmeyen üyelerimizde faydalansın
 

NullJull

Yeni üye
21 Ağu 2017
3
0
GEREKMEZ
It will be very useful for members who share more Turkish resources. I do not need them but there are a lot of new members and even people who do not know what you know. I do not know what you know, but you do not know what I know. iscorpix
 
Durum
Üzgünüz bu konu cevaplar için kapatılmıştır...
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.