[Owasp-delhi] Script Varients

2009-06-04 Thread Parmendra Sharma
Dear All, May have discussion/views on this topic given at: http://jeremiahgrossman.blogspot.com/2009/06/results-unicode-leftright-pointing.html Useful for finding out XSS vulnerabilities. -- Thanks and Regards: Parmendra Sharma Computer Security Analyst __

Re: [Owasp-delhi] Regarding XSS

2009-06-04 Thread Nilesh Kumar (India)
Hi Parmendra, >> You may try different things, for example: if application using decoding the >> URL encoded payloads supplied by the browser and not output escaping them >> after, then it might be >>vulnerable.So you >>have to try different things. >> You have to be more diverse. It means whe

Re: [Owasp-delhi] Regarding XSS

2009-06-04 Thread Nilesh Kumar (India)
>>While testing for an XSS issue within a website. How do you be so sure that >>there is no XSS within a parameter. If it’s escaping the script in HTML entities like < for < then it’s escaping it well. But don’t be sure try other variants too. >>Will u go to inject every varient of the s

[Owasp-delhi] [DOM based XSS]

2009-06-04 Thread suresh tiwary
hi OWASP Delhi, I wish to know the steps or P.O.C to show "DOM based XSS". What are the steps to show dom based XSS ? for example, to show reflected xs, we just enter in a text box and click enter and we can see the script getting reflected and then

Re: [Owasp-delhi] Reporting Phishing Attack

2009-06-04 Thread vaibhav aher
If the no is of TATA i can help u out..Just let me know the number. Regards On Wed, Jun 3, 2009 at 1:24 PM, Soi, Dhruv wrote: > I think most of the time it is done by recovery agencies. They use the > technique of pretending as courier service to grab the address of the > defaulter and then se