<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: MouseOverJacking attacks</title>
	<link>http://websecurity.com.ua/3814/</link>
	<description></description>
	<pubDate>Sun, 05 Apr 2026 21:45:59 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3814/#comment-309573</link>
		<pubDate>Thu, 04 Feb 2010 21:42:40 +0000</pubDate>
		<guid>http://websecurity.com.ua/3814/#comment-309573</guid>
					<description>&lt;strong&gt;MaXe&lt;/strong&gt;

Thanks for your feedback.

&lt;blockquote&gt;These types / kinds of attacks are not new&lt;/blockquote&gt;
Don't confuse it with general XSS attacks with event handlers, because it's different things. I wrote about it in the article - look at the paragraph "The difference between common attack with using of onMouseOver event and MouseOverJacking attack".

&lt;blockquote&gt;I've been using them for perhaps over a year now and I call / name it: "XSS with EventHandlers"&lt;/blockquote&gt;
I'm using XSS via event hadlers for many years (first time I mentioned at my site about such XSS regarding holes at &lt;a href="/588/" rel="nofollow"&gt;cenzic.com and picosearch.com&lt;/a&gt;), but MouseOverJacking is different type of attacks. MouseOverJacking is automated attacks, while XSS via event hadlers is not (in most cases). MouseOverJacking uses both XSS holes (via onMouseOver) and special ways to make attack fully automated - to make it comparable to attacks via styles.

&lt;blockquote&gt;In cases where has only been “blocked” by f.ex. preg_replace&lt;/blockquote&gt;
As I mentioned, the idea is to make attack fully automated. And as I mentioned in this article and in comments to &lt;a href="/3878/" rel="nofollow"&gt;The future of XSS attacks&lt;/a&gt; article, for MouseOverJacking there are other attack vectors besides XSS (such as DoS, CSRF and others).

&lt;blockquote&gt;In HTML5 it’s possible to use more onerror-eventhandlers due to more tags supports them.&lt;/blockquote&gt;
Thanks for mentioning, I'll look at HTML5 specification (at new onerror-eventhandlers). But for now only some browsers support HTML5. So mouseover is only event which allows to make cross-browser and automated attacks with using of MouseOverJacking technique.</description>
		<content:encoded><![CDATA[<p><strong>MaXe</strong></p>
<p>Thanks for your feedback.</p>
<blockquote><p>These types / kinds of attacks are not new</p></blockquote>
<p>Don&#8217;t confuse it with general XSS attacks with event handlers, because it&#8217;s different things. I wrote about it in the article - look at the paragraph &#8220;The difference between common attack with using of onMouseOver event and MouseOverJacking attack&#8221;.</p>
<blockquote><p>I&#8217;ve been using them for perhaps over a year now and I call / name it: &#8220;XSS with EventHandlers&#8221;</p></blockquote>
<p>I&#8217;m using XSS via event hadlers for many years (first time I mentioned at my site about such XSS regarding holes at <a href="/588/" rel="nofollow">cenzic.com and picosearch.com</a>), but MouseOverJacking is different type of attacks. MouseOverJacking is automated attacks, while XSS via event hadlers is not (in most cases). MouseOverJacking uses both XSS holes (via onMouseOver) and special ways to make attack fully automated - to make it comparable to attacks via styles.</p>
<blockquote><p>In cases where has only been “blocked” by f.ex. preg_replace</p></blockquote>
<p>As I mentioned, the idea is to make attack fully automated. And as I mentioned in this article and in comments to <a href="/3878/" rel="nofollow">The future of XSS attacks</a> article, for MouseOverJacking there are other attack vectors besides XSS (such as DoS, CSRF and others).</p>
<blockquote><p>In HTML5 it’s possible to use more onerror-eventhandlers due to more tags supports them.</p></blockquote>
<p>Thanks for mentioning, I&#8217;ll look at HTML5 specification (at new onerror-eventhandlers). But for now only some browsers support HTML5. So mouseover is only event which allows to make cross-browser and automated attacks with using of MouseOverJacking technique.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MaXe</title>
		<link>http://websecurity.com.ua/3814/#comment-309128</link>
		<pubDate>Sat, 23 Jan 2010 11:35:07 +0000</pubDate>
		<guid>http://websecurity.com.ua/3814/#comment-309128</guid>
					<description>These types / kinds of attacks are not new. I've been using them for perhaps over a year now and I call / name it: "XSS with EventHandlers" because that's exactly what it is.

In cases where  has only been "blocked" by f.ex. preg_replace (seen in many cases),  is just one of my favorite working examples of getting an alert box still.

In many other cases, I was inside tags like search-fields that would be located on a site where it would be almost virtually impossible not to mouse-over and thereby I used the "onmouseover" eventhandler.

In case there's "auto-focus" on this search-field that I am talking about, the eventhandler known as "onblur" can also be used.

To conclude it all: It's just a matter of how you can apply your knowledge with the current features of the browser you're using to exploit a website with Cross Site Scripting.

In HTML5 it's possible to use more onerror-eventhandlers due to more tags supports them.


Best regards,
MaXe - Founder of InterN0T</description>
		<content:encoded><![CDATA[<p>These types / kinds of attacks are not new. I&#8217;ve been using them for perhaps over a year now and I call / name it: &#8220;XSS with EventHandlers&#8221; because that&#8217;s exactly what it is.</p>
<p>In cases where  has only been &#8220;blocked&#8221; by f.ex. preg_replace (seen in many cases),  is just one of my favorite working examples of getting an alert box still.</p>
<p>In many other cases, I was inside tags like search-fields that would be located on a site where it would be almost virtually impossible not to mouse-over and thereby I used the &#8220;onmouseover&#8221; eventhandler.</p>
<p>In case there&#8217;s &#8220;auto-focus&#8221; on this search-field that I am talking about, the eventhandler known as &#8220;onblur&#8221; can also be used.</p>
<p>To conclude it all: It&#8217;s just a matter of how you can apply your knowledge with the current features of the browser you&#8217;re using to exploit a website with Cross Site Scripting.</p>
<p>In HTML5 it&#8217;s possible to use more onerror-eventhandlers due to more tags supports them.</p>
<p>Best regards,<br />
MaXe - Founder of InterN0T
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3814/#comment-308247</link>
		<pubDate>Thu, 31 Dec 2009 12:11:03 +0000</pubDate>
		<guid>http://websecurity.com.ua/3814/#comment-308247</guid>
					<description>&lt;strong&gt;juanin&lt;/strong&gt;

&lt;blockquote&gt;is impossible to understand your article&lt;/blockquote&gt;
I wrote this article (translated from Ukrainian) as good as I can. So I am sorry, if it's hard for you to understand this article. You can try to read my other &lt;a href="http://websecurity.com.ua/category/articles/" rel="nofollow"&gt;articles&lt;/a&gt; (their English versions) in case if other ones will be better for you to understand.

&lt;blockquote&gt;the attack is not interesting&lt;/blockquote&gt;
I don't think so. For me it's interesting technique which can be used for different attacks (as I wrote). For this reason I wrote my article. But it's your own decision if this attack technique is interesting for you.

&lt;blockquote&gt;Show step by step real examples or you are just pretneding to find something new.&lt;/blockquote&gt;
In "Examples of MouseOverJacking attacks" part of the article I showed real examples. What is incomprehensible for you in those examples?

You need to save those examples to new html files at your computer and run to see the result. For example of DoS attack on Google Chrome you need old version (Chrome 0.2.149.27) to see the DoS (crash of the browser). For example of XSS attack you need any browser - it works in any current browsers (I tested in my five browsers).</description>
		<content:encoded><![CDATA[<p><strong>juanin</strong></p>
<blockquote><p>is impossible to understand your article</p></blockquote>
<p>I wrote this article (translated from Ukrainian) as good as I can. So I am sorry, if it&#8217;s hard for you to understand this article. You can try to read my other <a href="http://websecurity.com.ua/category/articles/" rel="nofollow">articles</a> (their English versions) in case if other ones will be better for you to understand.</p>
<blockquote><p>the attack is not interesting</p></blockquote>
<p>I don&#8217;t think so. For me it&#8217;s interesting technique which can be used for different attacks (as I wrote). For this reason I wrote my article. But it&#8217;s your own decision if this attack technique is interesting for you.</p>
<blockquote><p>Show step by step real examples or you are just pretneding to find something new.</p></blockquote>
<p>In &#8220;Examples of MouseOverJacking attacks&#8221; part of the article I showed real examples. What is incomprehensible for you in those examples?</p>
<p>You need to save those examples to new html files at your computer and run to see the result. For example of DoS attack on Google Chrome you need old version (Chrome 0.2.149.27) to see the DoS (crash of the browser). For example of XSS attack you need any browser - it works in any current browsers (I tested in my five browsers).
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: juanin</title>
		<link>http://websecurity.com.ua/3814/#comment-308217</link>
		<pubDate>Wed, 30 Dec 2009 20:50:00 +0000</pubDate>
		<guid>http://websecurity.com.ua/3814/#comment-308217</guid>
					<description>please write it again is impossible to understand your article. It looks like you written it in an ackward way to hide the fact that the attack is not interesting. Show step by step real examples or you are just pretneding to find something new. thanks.</description>
		<content:encoded><![CDATA[<p>please write it again is impossible to understand your article. It looks like you written it in an ackward way to hide the fact that the attack is not interesting. Show step by step real examples or you are just pretneding to find something new. thanks.
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
