mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-30 00:20:59 +00:00
48 lines
4.8 KiB
Markdown
48 lines
4.8 KiB
Markdown
|
# Mitego ya Iframe
|
||
|
|
||
|
<details>
|
||
|
|
||
|
<summary><strong>Jifunze AWS hacking kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
||
|
|
||
|
Njia nyingine za kusaidia HackTricks:
|
||
|
|
||
|
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
||
|
* Pata [**swag rasmi wa PEASS & HackTricks**](https://peass.creator-spring.com)
|
||
|
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
|
||
|
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
|
||
|
* **Shiriki mitego yako ya udukuzi kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
||
|
|
||
|
</details>
|
||
|
|
||
|
## Taarifa Msingi
|
||
|
|
||
|
Hii njia ya kutumia XSS kupitia iframes kuiba taarifa kutoka kwa mtumiaji anayeendelea kupitia ukurasa wa wavuti ilichapishwa awali katika machapisho haya 2 kutoka trustedsec.com: [**hapa**](https://trustedsec.com/blog/persisting-xss-with-iframe-traps) **na** [**hapa**](https://trustedsec.com/blog/js-tap-weaponizing-javascript-for-red-teams).
|
||
|
|
||
|
Shambulio huanza kwenye ukurasa unaoweza kudhuriwa na XSS ambapo inawezekana kufanya **waathiriwa wasiondoke XSS** kwa kuwafanya **vinjari ndani ya iframe** ambayo inachukua wavuti yote.
|
||
|
|
||
|
Shambulio la XSS kimsingi litapakia ukurasa wa wavuti kwenye iframe kwa 100% ya skrini. Kwa hivyo, muathiriwa **hataona yuko ndani ya iframe**. Kisha, ikiwa muathiriwa ananavigeisha kwenye ukurasa kwa kubonyeza viungo ndani ya iframe (ndani ya wavuti), atakuwa **anavigeisha ndani ya iframe** na JS ya kiholela iliyopakiwa itaiba taarifa kutoka kwa uvinjari huu.
|
||
|
|
||
|
Zaidi ya hayo, ili kufanya iwe halisi zaidi, inawezekana kutumia baadhi ya **wasikilizaji** kuchunguza wakati iframe inabadilisha eneo la ukurasa, na kusasisha URL ya kivinjari na maeneo hayo ambayo mtumiaji anadhani anahamia kurasa kwa kutumia kivinjari.
|
||
|
|
||
|
<figure><img src="../.gitbook/assets/image (1248).png" alt=""><figcaption><p><a href="https://www.trustedsec.com/wp-content/uploads/2022/04/regEvents.png">https://www.trustedsec.com/wp-content/uploads/2022/04/regEvents.png</a></p></figcaption></figure>
|
||
|
|
||
|
<figure><img src="../.gitbook/assets/image (1249).png" alt=""><figcaption><p><a href="https://www.trustedsec.com/wp-content/uploads/2022/04/fakeAddress-1.png">https://www.trustedsec.com/wp-content/uploads/2022/04/fakeAddress-1.png</a></p></figcaption></figure>
|
||
|
|
||
|
Zaidi ya hayo, inawezekana kutumia wasikilizaji kuiba taarifa nyeti, si tu kurasa nyingine ambazo muathiriwa anatembelea, lakini pia data inayotumiwa kujaza fomu na kuzituma (vyeti?) au kuiba uhifadhi wa ndani...
|
||
|
|
||
|
Bila shaka, vizuizi kuu ni kwamba **muathiriwa anapofunga kichupo au kuweka URL nyingine kwenye kivinjari atatoka kwenye iframe**. Njia nyingine ya kufanya hii ingekuwa ni **kufanya upya ukurasa**, hata hivyo, hii inaweza kuzuiwa kwa sehemu **kwa kulemaza menyu ya muktadha ya bofya la kulia kila wakati ukurasa mpya unapakia ndani ya iframe au kugundua wakati panya ya mtumiaji inaondoka kwenye iframe, labda kubonyeza kitufe cha kufunga upya wa kivinjari na katika kesi hii URL ya kivinjari inasasishwa na URL ya asili inayoweza kudhuriwa na XSS kwa hivyo ikiwa mtumiaji anapakia tena, itapata sumu tena (tambua kuwa hii sio ya siri sana).
|
||
|
|
||
|
<details>
|
||
|
|
||
|
<summary><strong>Jifunze AWS hacking kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
||
|
|
||
|
Njia nyingine za kusaidia HackTricks:
|
||
|
|
||
|
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
||
|
* Pata [**swag rasmi wa PEASS & HackTricks**](https://peass.creator-spring.com)
|
||
|
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
|
||
|
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
|
||
|
* **Shiriki mitego yako ya udukuzi kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
||
|
|
||
|
</details>
|