Skip to main content

How I XSSed My Crush ;)

This post is all about how I used XSS to impress my crush so if you are not interested then stop reading this and get back to your work :)


*Let the story begin*

So few years ago when I was just chatting with some random people on facebook suddenly a random link appeared in message box.




The message was from her so I was obviously curious to know what that link was about. So next day I visited the link and then this page appeared :




When I saw this page I was like  "Holy fuck!!! This is what I wanted my entire life!!!!!"

So like a typical fool I entered all details and clicked on "Click to find out".
Now page was slowly loading and I was expecting the MAGIC to happen BUTTTTTTTT instead SHIT happened :



At this point = (She : 1 Me : 0)

Now I was like "What the f**k I ever did anything wrong with you???"




I was disappointed to know that I was fooled by a girl. No , Actually it was because she was the only prettiest friend I had that time and I don't wanted her to think that I'm a fool.

I wanted to save my ass at any cost.
She was offline and she usually comes online at night so I had enough time to think how I can take the revenge.

Then suddenly something happened in my brain and I was like :

"Challenge Accepted"

As we all know security of such websites is lame as f**k so I decided to hack that website.
I easily found SQLi but getting her account password wasn't what I wanted. I wanted to do something cool ;)
Then I found a stored XSS ......... And the interesting part about this XSS was it triggers as soon as the user login to their account.

At this point = (She : 1 Me : 1)

So it was my evil payload :

<script>
alert(" Mess with the best die like the rest ... ! ");
prompt(" Say sorry 100 times to get back your account.  ");
location.href="https://www.facebook.com/Innoxent.Rakesh";
</script>


Now payload was injected properly and all I had to do is wait for her response ;)

And then :

At this point = (She : 1 Me : 2)

Whenever she tried to login to her account my injected payload was getting executed and after two pop ups she was getting redirected to my facebook profile automatically. 
It was more evil than just getting her password, isn't it?


And after some requests I helped her to recover her account.



Now it was amazing moment for me , she was totally impressed  ;)


So this is how I XSSed her and end up being awesome instead of being a dumb ass.



Conclusion :

If you are using computer then you should at least know how to turn off the f***ing Javascript .

Comments

  1. your the inspiration for me . i was so unhappy but after your trick and i also able to csrf my girlfriend . and also i idor my girlfriend .. even i share this post to my friends and they RCE their girlfriend .. so happyyyyyyyy thank you buddy ..

    ReplyDelete
  2. Thennks Dude!!! First I Had Sed life now this changed my lyffff !!!! Thenks

    ReplyDelete
  3. i am his girlfriend ... you fuckers dont bad comments on it ..

    your janu romansh

    ReplyDelete
  4. I'm his wife.. I miss you Raks. Ooo nadan parinde ghar aaja!!

    ReplyDelete
    Replies
    1. Who the fuck you are to call my rakus raks .. you fukinggggg bitch ..

      rakus come back to my life .. you can do xss and sqli also .. :(

      Delete
    2. Tell me your rate ?

      Delete
  5. Hey @rakeshmane when your coming bro?

    ReplyDelete
  6. Hey Rakuu,
    Are you single ?

    ReplyDelete

Post a comment

Popular posts from this blog

JSP ContextPath Link Manipulation - XSS

This post is about how to manipulate resource links of HTML elements (script, img, link, etc) when getContextPath method is used to obtain base path of resources. With the ability to manipulate links you can do XSS, CSS Injection, etc.

Basically we are going to use path parameters to manipulate context path such that links would point to attacker's domain. There's a good blog that talk about the similar issues : https://superevr.com/blog/2011/three-semicolon-vulnerabilities

However this post is more about manipulating context path to hijack resource links of HTML elementsSo let's have a look at a simple JSP page (test.jsp)


This page just loads some resources like script, image, css and that's it. It doesn't take any direct input from user but it is using value returned by request.getContextPath() as base path to resources link.

What can we do here?

Let's try to control the base path by using path parameters :

http://127.0.0.1:8080/;pathParameter/contextPathEx…

Xssing Web Part - 1

Xssing Web Part - 1
Hello,

I'm thinking about sharing everything I know about XSS :) However it's not possible to put all methods in one single post so I would be making several parts of "Xssing Web". Mostly I would be talking about how to bypass XSS filters and how to turn most of non exploitable XSS to exploitable.


All of you might have encountered one such end point that takes URL as parameter and redirects to it using javascript like :

location.href='URL' 
or
window.location.href='URL' 
or
window.location.replace('URL') 
or
window.location='URL'


In this post I would be talking about how to get XSS in such situations and how to bypass their filters.

First thing we can do here is try 'javascript' protocol or 'data' URI scheme.

window.location='javascript:alert(1)'
or
window.location='data:html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg'

It would execute 'alert(1)' function.

From now onwards I will only be talki…

Xssing Web Part - 2

Xssing Web With Unicodes
Hello friends, 

This is the second part of "Xssing Web". In this post I would show how to abuse unicodes to bypass XSS filters. 
BTW if you want to check previous part click here.

Note : If you think there are any mistakes in this post then kindly mention it in comments.

I have developed several XSS challenges to show how unicodes can be used to bypass filters. If you want to try those challenges first then click here, get back here if you couldn't solve any.


Abusing Unicode :

So what is Unicode?

-> Unicode is nothing but the encoding standard. It defines UTF-8UTF-16,UTF-32, etc encodings.

1) UTF-8 :

Characters Size :1 byte to 4 byte

Example :
Character "A" => 0x41
Character "¡"  => 0xC2 0xA1
Character "ಓ" => 0xE0 0xB2 0x93
Character "𪨶" => 0xF0 0xAA 0xA8 0xB6

2) UTF-16:

Character Size : 2 byte

However in UTF-16 there are two ways to represent any characters.

i) UTF-16be (be- Big Endian) [Left to Right Byte …