12/12/2022 - THM Severside Request Forgery and XSS Flashcards

1
Q

What does SSRF stand for?

A

Server-side Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a SSRF?

A

A vulnerability that allows a user to cause the webserver to make an additional/edited HTTP request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the impacts to SSRF?

A

Unauthorized access
Access to customer/organizational data
Ability to scale to internal networks
Reveal authentication tokens/credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a common attack technique used within SSRF?

What pattern is used to stop a webservers mitigation filter after malicious code is injected?

A

“&x” - stops remaining path from being appended to attackers URL

Directory Traversal: Accessing another directory not intended to be searched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are common SSRF vulnerability locations?

A

Form input values

Partial URL showing just a hostname

URL showing the whole path

*If working with blind SSRF you will need to use external HTTP logging tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two high-attack strategies for SSRF
*Hint think higher than cookies and attacks

A

Blind; vulnerability occurs but with no information returned to the attacker’s screen

Regular; vulnerability is returned to the attacker screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ways to defeat SSRF mitigations

A

If the defense uses…

  • Deny Lists: leverage other names to get the same result (ie deny localhost.. 0.0.0.0,127....,0,0000,etc.. (check notes for more)
  • Allow List: Locate pattern allowed and comment it out
  • Use Open Redirect: redirect the url to attackers server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are four high level attack schemes for XSS attacks?

A

Session Steal

Proof of Concept

Key Logger

Business Logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which JS document property contains the users session token?

A

document.cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which JS document property captures keystrokes?

A

document.onkeypress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What JS functions convert and decode base64 encoding

A

BTOA()

ATOB()

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of XSS attacks?

A

Stored
Reflected
DOM
Blind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a stored XSS attack and common attack areas?

A

Malicious information stored on the web app

  • Look for comments in a blog
  • User profile information
  • Website listing
  • changing form data (the form is drop-down selecting only integers but you send string)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a DOM based attack?

A

Programming interface flaw for HTML or XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Impact of Stored XSS attack

A

Redirect user

Steal session cookie

Perform other website action while acting as the visting user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DOM based attack impact?

A

Links sent to victims redirecting them to another website from the page or the users session

17
Q

What is a blind XSS

A

Same as a stored XSS attack but you cannot verify payload worked

18
Q

How do you test for blind xss?

A

Ensure payload has a call back (http request) to verify payload works

19
Q

What is a tool to test for blind xss?

A

xsshunter