Large-Scale, Automatic XSS Detection using Google Dorks
نویسندگان
چکیده
XSS Attacks continue to be prevalent today, not only because XSS sanitization is a hard problem in richformatting contexts, but also because there are so many potential avenues and so many uneducated developers who forget to sanitize reflected content altogether. In this paper, we present Gd0rk, a tool which employs Google’s advanced search capabilities to scan for websites vulnerable to XSS. It automatically generates and maintains a database of parameters to search, and uses heuristics to prioritize scanning hosts which are more likely to be vulnerable. Gd0rk includes a highthroughput XSS scanner which reverse engineers and approximates XSS filters using a limited number of web requests and generates working exploits using HTML and JavaScript context-aware rules. The output produced by the tool is not only a remarkably vast database of vulnerable websites along with working XSS exploits, but also a more compact representation of the list in the form of google search terms, whose effectiveness has been tested during the search. After running for a month, Gd0rk was able to identify more than 200.000 vulnerable pages. The results show that even without significant network capabilities, a large-scale scan for vulnerable websites can be conducted effectively.
منابع مشابه
Google Dorks: Analysis, Creation, and New Defenses
With the advent of Web 2.0, many users started to maintain personal web pages to show information about themselves, their businesses, or to run simple e-commerce applications. This transition has been facilitated by a large number of frameworks and applications that can be easily installed and customized. Unfortunately, attackers have taken advantage of the widespread use of these technologies ...
متن کاملA multi-scale convolutional neural network for automatic cloud and cloud shadow detection from Gaofen-1 images
The reconstruction of the information contaminated by cloud and cloud shadow is an important step in pre-processing of high-resolution satellite images. The cloud and cloud shadow automatic segmentation could be the first step in the process of reconstructing the information contaminated by cloud and cloud shadow. This stage is a remarkable challenge due to the relatively inefficient performanc...
متن کاملCharacterizing Google Hacking: A First Large-Scale Quantitative Study
Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnera...
متن کاملA vulnerability in Google AdSense: Automatic extraction of links to ads
On the basis of the XSS (Cross Site Scripting) and Web Crawler techniques it is possible to go through the barriers of the Google Adsense advertising system by obtaining the validated links of the ads published on a website. Such method involves obtaining the source code built for the Google java applet for publishing and handling ads and for the final link retrieval. Once the links of the ads ...
متن کاملStructural Learning of Attack Vectors for Generating Mutated XSS Attacks
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011