Cross-Site Websocket Hijacking

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 ก.ย. 2024
  • Not so long ago, to make website's content appear in real time it had to be kind of simulated.
    For example from the level of JavaScript - by sending a request to the server every few seconds and downloading the latest content.
    The more often we sent requests, the faster the user got the response.
    These times are behind us. Now, for this purpose, websockets are used - they allow for two-way communication between the client and the server in real time.
    But what traps we can fall into if we want to implement this functionality on our site?
    Today's episode of "from 0 to pentesting hero" is about a little-known attack named: Cross-Site Websocket Hijacking.
    More info: www.christian-...
    Icon made by Freepik, Eucalyp, Webalys, prettycons, monkik, Flat-icons-com from www.flaticon.com
    #from0topentestinghero #java #websocket

ความคิดเห็น • 11

  • @PwnFunction
    @PwnFunction 5 ปีที่แล้ว +8

    Awesome video
    Just a small clarification @ 3:08, cookies are sent to the server based on the domain name and not the port. However, protocol is a bit different, it allows HTTP or HTTPS based on the cookie flags and other protocols aren't bound to access the cookies.

    • @KacperSzurek
      @KacperSzurek 5 ปีที่แล้ว +2

      You are right, thanks for comment.

    • @PwnFunction
      @PwnFunction 5 ปีที่แล้ว +1

      @@KacperSzurek My pleasure :)

  • @CristiVladZ
    @CristiVladZ 5 ปีที่แล้ว +2

    very insightful. I learn something new every day. Thank you!

  • @CapsAdmin
    @CapsAdmin 3 ปีที่แล้ว +2

    Couldn't the attacker just modify the Origin header? Maybe not from the browser, but you could set up a proxy that does it maybe.

    • @iwaduarte
      @iwaduarte 3 ปีที่แล้ว

      The idea here is to think in terms of the USER that you want to hack. If you are trying to use the cookies of a NORMAL user he would be probably accessing using Chrome, Firefox, Safari etc. So it would not be possible to manipulate the Origin Header since that is not the default configuration.

  • @green_quirk
    @green_quirk 4 ปีที่แล้ว

    Thanks, man.

  • @tekken-pakistan2718
    @tekken-pakistan2718 3 ปีที่แล้ว

    Thanks!

  • @brian_mckenzie8317
    @brian_mckenzie8317 4 ปีที่แล้ว

    I have a question ... I already have the knowledge on IDOR, CSRF vulnerabilities but I need to practice .. like chess ... I am happy there are softwares I can practice on relating to chess ... because I can test out ..reaarange..apply...try out anything I have learnt ... so saying that ..
    are there any websites or softwares I can buy that has like 100's of IDOR vulnerabilities that I can use Burp on and practice all night?? Thanks.

  • @bappachakraborty9255
    @bappachakraborty9255 4 ปีที่แล้ว

    Can you please make a video for "How to intercept Thick Client application with Burp Using Invisible Proxy"

  • @lonewolfcoding5208
    @lonewolfcoding5208 2 ปีที่แล้ว

    guys i created a system for our project capstone for my school im an IT student
    i use node js and i use 2 servers one for front (UI) and backend (node js server)
    now i struggle because of socket io
    i dont want to overengineer because our time is limited all i want is security