exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Spoofing Technique

Spoofing Technique
Posted Feb 9, 2010
Authored by mc2_s3lector

Whitepaper called spoofing technique.

tags | paper, spoof
SHA-256 | 9cf5bb03c9b206a026568fc09c49e0e27937b42598a05896f187da1388b29970

Spoofing Technique

Change Mirror Download
[+] Category   :  Spoofing     
[+] Category : Spoofing Technique
[+] Author : yogyacarderlink.web.id
[+] Contact : (00x0---www.yogyacarderlink.web.id
[+] date : 4-2-10
[+] biGthank to : Allah SWT,jasakom,KeDai Computerworks,0n3-d4y n3ro,eplaciano, all*.indonesian like a coding,


<frame
src=”http://server/file.html”>)

(http://server/page?frame_src=http://examp
le/file.html)

replace
“frame_src” parameter value with
“frame_src=http://you.example/spoof.html”

user expected domain example.com--->foregion data you.example.com

links can be sent to a user via email,messages, left on bulletin board post,
or forced upon users by Xss attacker. If you gets a user to visit a web
page designated by their malicious address, the user will believe he is
view authentication from address when he is not. Users will
implicitly trust the spoofed since the browser url bar
displays http://example, when in fact the underlying frame htm
is referencing http://you.example

exploits attack the trust relationship established between the
user& the web site. The technique has been used to create fake
web pages including defacements,login acces forms, false press releases,etc

sampling:
Creating a spoofed press release. Lets say a web site use created HTML frames
for their press release web pages.
A user would visit a link such as


(http://example/pr?pg=http://example/pl/03xxx.html). The resulting web page HTML would be:

code:

<HTML>
<FRAMESET COLS=”100, *”>
<FRAME NAME=”pl_menu” SRC=”menu.html”>
<FRAME NAME=”pl_content”
SRC=”http://example/pr/03xxx.html>
</FRAMESET>
</HTML>


“pl” web apps in samplign creates HTML with a static menu&dynamic generated frame src.
“pl_content” frame pulls its source from the URL parameter value
of “pg” to display the requested press release content. But what if an
you(attacker) altered the normal URL to
http://foo.example/pr?pg=http://attacker.example/sp
oofed_press_release.html? Without properly sanity checking
the “pg” value, the resulting HTML would be


Snippet code:
<HTML>
<FRAMESET COLS=”100, *”>
<FRAME NAME=”pl_menu” SRC=”menu.html”>
<FRAME NAME=”pl_content” SRC=”
http://you.example/spoofed_press_release.html”>
</FRAMESET>
</html>

end user you.example.com
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close