<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: The future of XSS attacks</title>
	<link>http://websecurity.com.ua/3878/</link>
	<description></description>
	<pubDate>Sat, 18 Apr 2026 17:02:27 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3878/#comment-309409</link>
		<pubDate>Sat, 30 Jan 2010 21:53:28 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309409</guid>
					<description>&lt;strong&gt;Zerial&lt;/strong&gt;

Thanks for your attention to my article and for your work.

I hope the article was interesting for you (as it looks like, because you dicided to translate it). And I hope my English version of the article was sufficiently clear for you :-). I can suggest for you some breaklines (indents) in the text of your version of my article - it'll improve its readability.

And feel free to read other my &lt;a href="http://websecurity.com.ua/category/articles/" rel="nofollow"&gt;articles&lt;/a&gt; (there are English versions of many of them, some of which are published at my site and some at WASC Mailing List).</description>
		<content:encoded><![CDATA[<p><strong>Zerial</strong></p>
<p>Thanks for your attention to my article and for your work.</p>
<p>I hope the article was interesting for you (as it looks like, because you dicided to translate it). And I hope my English version of the article was sufficiently clear for you <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> . I can suggest for you some breaklines (indents) in the text of your version of my article - it&#8217;ll improve its readability.</p>
<p>And feel free to read other my <a href="http://websecurity.com.ua/category/articles/" rel="nofollow">articles</a> (there are English versions of many of them, some of which are published at my site and some at WASC Mailing List).
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Zerial</title>
		<link>http://websecurity.com.ua/3878/#comment-309397</link>
		<pubDate>Sat, 30 Jan 2010 14:02:31 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309397</guid>
					<description>Hi MustLive,

I've translated to Spanish this article:
http://blog.zerial.org/seguridad/el-futuro-de-los-ataques-cross-site-scripting-xss/</description>
		<content:encoded><![CDATA[<p>Hi MustLive,</p>
<p>I&#8217;ve translated to Spanish this article:<br />
<a href="http://blog.zerial.org/seguridad/el-futuro-de-los-ataques-cross-site-scripting-xss/" rel="nofollow">http://blog.zerial.org/seguridad/el-futuro-de-los-ataques-cross-site-scripting-xss/</a>
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3878/#comment-309329</link>
		<pubDate>Thu, 28 Jan 2010 21:58:50 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309329</guid>
					<description>&lt;blockquote&gt;lol, wordpress encoded my PoC xDD&lt;/blockquote&gt;
Yes, WP is fun engine :-). I've fixed your comment.

&lt;strong&gt;sirdarckcat and NotMyRealName&lt;/strong&gt;

Thanks for your feedback. It's important for me to know thoughts of other security professionals on this topic.

I see that you are mature security professionals and it's hard to surprise you in this topic, but in any case there was something new in these two articles for you. And looked in my article MouseOverJacking attacks, that there are other attack vectors besides XSS (such as DoS, CSRF and others). And feel free to read other my &lt;a href="/category/articles/" rel="nofollow"&gt;articles&lt;/a&gt;, where you certainly will find something interesting and new for yourself.

I'll anwer separately at your comments soon.</description>
		<content:encoded><![CDATA[<blockquote><p>lol, wordpress encoded my PoC xDD</p></blockquote>
<p>Yes, WP is fun engine <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> . I&#8217;ve fixed your comment.</p>
<p><strong>sirdarckcat and NotMyRealName</strong></p>
<p>Thanks for your feedback. It&#8217;s important for me to know thoughts of other security professionals on this topic.</p>
<p>I see that you are mature security professionals and it&#8217;s hard to surprise you in this topic, but in any case there was something new in these two articles for you. And looked in my article MouseOverJacking attacks, that there are other attack vectors besides XSS (such as DoS, CSRF and others). And feel free to read other my <a href="/category/articles/" rel="nofollow">articles</a>, where you certainly will find something interesting and new for yourself.</p>
<p>I&#8217;ll anwer separately at your comments soon.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: NotMyRealName</title>
		<link>http://websecurity.com.ua/3878/#comment-309307</link>
		<pubDate>Thu, 28 Jan 2010 07:23:36 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309307</guid>
					<description>I think this would be better titled "The past of XSS attacks".  Most of this has been known for a long time.

expression(), background(), -moz-binding(): That is ancient and has been known for a long time.

Use of tag attributes, like onload, onerror, etc.: Ancient.

onMouseOver with a clever style: OK, I hadn't seen that before, but it feels to me like a pretty minor tweak to some existing thing.

I think you're hyping this way too hard.  Fancy names like "MouseOverJacking"?  "The Future of XSS"?  It's just a twist on standard approaches.  A clever twist, but come on: have a sense of perspective.</description>
		<content:encoded><![CDATA[<p>I think this would be better titled &#8220;The past of XSS attacks&#8221;.  Most of this has been known for a long time.</p>
<p>expression(), background(), -moz-binding(): That is ancient and has been known for a long time.</p>
<p>Use of tag attributes, like onload, onerror, etc.: Ancient.</p>
<p>onMouseOver with a clever style: OK, I hadn&#8217;t seen that before, but it feels to me like a pretty minor tweak to some existing thing.</p>
<p>I think you&#8217;re hyping this way too hard.  Fancy names like &#8220;MouseOverJacking&#8221;?  &#8220;The Future of XSS&#8221;?  It&#8217;s just a twist on standard approaches.  A clever twist, but come on: have a sense of perspective.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: sirdarckcat</title>
		<link>http://websecurity.com.ua/3878/#comment-309300</link>
		<pubDate>Thu, 28 Jan 2010 02:09:04 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309300</guid>
					<description>lol, wordpress encoded my PoC xDD

http://0x.lv/xss.php?nofil&#38;html_xss=%3Ca+style=xss=expression(alert(1))%3E</description>
		<content:encoded><![CDATA[<p>lol, wordpress encoded my PoC xDD</p>
<p><a href="http://0x.lv/xss.php?nofil&amp;html_xss=%3Ca+style=xss=expression" rel="nofollow">http://0x.lv/xss.php?nofil&amp;html_xss=%3Ca+style=xss=expression</a>(alert(1))%3E
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: sirdarckcat</title>
		<link>http://websecurity.com.ua/3878/#comment-309297</link>
		<pubDate>Thu, 28 Jan 2010 02:07:14 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309297</guid>
					<description>1st, expression works on IE8 on pages without a doctype:
http://0x.lv/xss.php?nofil&#38;html_xss=

And on IE you can also use behavior:url(#default#time2) and onbegin if the page has a doctype.. so either way, IE is pretty much pwnable via styles.

If you want cross browser solutions, we usually use onmouseover with top/width on 100% and position absolute on 0,0.

Just to mention the first results on google:
http://sla.ckers.org/forum/read.php?2,24036
http://sla.ckers.org/forum/read.php?2,31650
http://sla.ckers.org/forum/read.php?2,15812,page=2

But yeah, considering we are on 2010 and there are PoCs since 2007, I'm correct on "years".

Nice name anyway! I will never use it, but maybe some people will.

Greetings!!</description>
		<content:encoded><![CDATA[<p>1st, expression works on IE8 on pages without a doctype:<br />
<a href="http://0x.lv/xss.php?nofil&amp;html_xss=" rel="nofollow">http://0x.lv/xss.php?nofil&amp;html_xss=</a></p>
<p>And on IE you can also use behavior:url(#default#time2) and onbegin if the page has a doctype.. so either way, IE is pretty much pwnable via styles.</p>
<p>If you want cross browser solutions, we usually use onmouseover with top/width on 100% and position absolute on 0,0.</p>
<p>Just to mention the first results on google:<br />
<a href="http://sla.ckers.org/forum/read.php?2,24036" rel="nofollow">http://sla.ckers.org/forum/read.php?2,24036</a><br />
<a href="http://sla.ckers.org/forum/read.php?2,31650" rel="nofollow">http://sla.ckers.org/forum/read.php?2,31650</a><br />
<a href="http://sla.ckers.org/forum/read.php?2,15812,page=2" rel="nofollow">http://sla.ckers.org/forum/read.php?2,15812,page=2</a></p>
<p>But yeah, considering we are on 2010 and there are PoCs since 2007, I&#8217;m correct on &#8220;years&#8221;.</p>
<p>Nice name anyway! I will never use it, but maybe some people will.</p>
<p>Greetings!!
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3878/#comment-309287</link>
		<pubDate>Wed, 27 Jan 2010 22:44:28 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309287</guid>
					<description>&lt;blockquote&gt;dude, we’ve all been using this for years&lt;/blockquote&gt;
&lt;strong&gt;sirdarckcat&lt;/strong&gt;, really? Because I thought XSS via styles (described in my article) mostly were used :-).

Are you talking about MouseOverJacking or about XSS via event hadlers? Because these are different things, as I mentioned in my article &lt;a href="/3814/" rel="nofollow"&gt;MouseOverJacking attacks&lt;/a&gt; (read "The idea of MouseOverJacking attacks" part of the article).

MouseOverJacking is automated attacks, while XSS via event hadlers is not. I'm using XSS via event hadlers for many years (first time I mentioned at my site about such XSS regarding holes at &lt;a href="/588/" rel="nofollow"&gt;cenzic.com and picosearch.com&lt;/a&gt;), but MouseOverJacking is different thing. It uses both XSS holes (via onMouseOver) and special ways to make attack fully automated - to make it comparable to attacks via styles.

As I mentioned in current article, the most often the attacks via style property are used (I also used them for many years in my PoCs). And taking into account situation with modern browsers, I proposed my cross-browser solution.</description>
		<content:encoded><![CDATA[<blockquote><p>dude, we’ve all been using this for years</p></blockquote>
<p><strong>sirdarckcat</strong>, really? Because I thought XSS via styles (described in my article) mostly were used <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> .</p>
<p>Are you talking about MouseOverJacking or about XSS via event hadlers? Because these are different things, as I mentioned in my article <a href="/3814/" rel="nofollow">MouseOverJacking attacks</a> (read &#8220;The idea of MouseOverJacking attacks&#8221; part of the article).</p>
<p>MouseOverJacking is automated attacks, while XSS via event hadlers is not. I&#8217;m using XSS via event hadlers for many years (first time I mentioned at my site about such XSS regarding holes at <a href="/588/" rel="nofollow">cenzic.com and picosearch.com</a>), but MouseOverJacking is different thing. It uses both XSS holes (via onMouseOver) and special ways to make attack fully automated - to make it comparable to attacks via styles.</p>
<p>As I mentioned in current article, the most often the attacks via style property are used (I also used them for many years in my PoCs). And taking into account situation with modern browsers, I proposed my cross-browser solution.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3878/#comment-309285</link>
		<pubDate>Wed, 27 Jan 2010 21:56:28 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309285</guid>
					<description>&lt;strong&gt;Ismael Rocha&lt;/strong&gt;

You are welcome.</description>
		<content:encoded><![CDATA[<p><strong>Ismael Rocha</strong></p>
<p>You are welcome.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Ismael Rocha</title>
		<link>http://websecurity.com.ua/3878/#comment-309276</link>
		<pubDate>Wed, 27 Jan 2010 12:42:18 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309276</guid>
					<description>Good stuff!</description>
		<content:encoded><![CDATA[<p>Good stuff!
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: sirdarckcat</title>
		<link>http://websecurity.com.ua/3878/#comment-309271</link>
		<pubDate>Wed, 27 Jan 2010 10:43:02 +0000</pubDate>
		<guid>http://websecurity.com.ua/3878/#comment-309271</guid>
					<description>about:
&#62; You also tell me, what do you think about using of MouseOverJacking 
&#62; instead of expression() and -moz-binding for conducting XSS attacks as 
&#62; cross-browser solution (which works in any browser, including new
&#62; versions of Firefox and IE)?

dude, we've all been using this for years..</description>
		<content:encoded><![CDATA[<p>about:<br />
&gt; You also tell me, what do you think about using of MouseOverJacking<br />
&gt; instead of expression() and -moz-binding for conducting XSS attacks as<br />
&gt; cross-browser solution (which works in any browser, including new<br />
&gt; versions of Firefox and IE)?</p>
<p>dude, we&#8217;ve all been using this for years..
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
