The innerHTML Apocalypse

Security Research / Penetration Testing
Apr. 25, 2013
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
The innerHTML Apocalypse
1 of 51

More Related Content

What's hot

What should a hacker know about WebDav?What should a hacker know about WebDav?
What should a hacker know about WebDav?Mikhail Egorov
Polyglot payloads in practice by avlidienbrunn at HackPraPolyglot payloads in practice by avlidienbrunn at HackPra
Polyglot payloads in practice by avlidienbrunn at HackPraMathias Karlsson
An Abusive Relationship with AngularJSAn Abusive Relationship with AngularJS
An Abusive Relationship with AngularJSMario Heiderich
Hunting for security bugs in AEM webappsHunting for security bugs in AEM webapps
Hunting for security bugs in AEM webappsMikhail Egorov
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015CODE BLUE
Attacking thru HTTP Host headerAttacking thru HTTP Host header
Attacking thru HTTP Host headerSergey Belov

Viewers also liked

Web 2016 (13/13) Securitatea aplicațiilor WebWeb 2016 (13/13) Securitatea aplicațiilor Web
Web 2016 (13/13) Securitatea aplicațiilor WebSabin Buraga
A XSSmas carolA XSSmas carol
A XSSmas carolcgvwzq
Responsive WebdesignResponsive Webdesign
Responsive WebdesignMayflower GmbH
Native Cross-Platform-Apps mit Titanium Mobile und AlloyNative Cross-Platform-Apps mit Titanium Mobile und Alloy
Native Cross-Platform-Apps mit Titanium Mobile und AlloyMayflower GmbH
Usability im webUsability im web
Usability im webMayflower GmbH
Vom Entwickler zur FührungskraftVom Entwickler zur Führungskraft
Vom Entwickler zur FührungskraftMayflower GmbH

Similar to The innerHTML Apocalypse

An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015CODE BLUE
CONFidence 2018: XSS is dead. We just don't get it (Mario Heiderich)CONFidence 2018: XSS is dead. We just don't get it (Mario Heiderich)
CONFidence 2018: XSS is dead. We just don't get it (Mario Heiderich)PROIDEA
StHack 2014 - Mario "@0x6D6172696F" Heiderich - JSMVCOMFGStHack 2014 - Mario "@0x6D6172696F" Heiderich - JSMVCOMFG
StHack 2014 - Mario "@0x6D6172696F" Heiderich - JSMVCOMFGStHack
Code quality. Patch qualityCode quality. Patch quality
Code quality. Patch qualitymalcolmt
Code quality; patch qualityCode quality; patch quality
Code quality; patch qualitydn
I thought you were my friend - Malicious MarkupI thought you were my friend - Malicious Markup
I thought you were my friend - Malicious MarkupMario Heiderich

Similar to The innerHTML Apocalypse(20)

More from Mario Heiderich

Copy & Pest - A case-study on the clipboard, blind trust and invisible cross-...Copy & Pest - A case-study on the clipboard, blind trust and invisible cross-...
Copy & Pest - A case-study on the clipboard, blind trust and invisible cross-...Mario Heiderich
Locking the Throne Room - How ES5+ might change views on XSS and Client Side ...Locking the Throne Room - How ES5+ might change views on XSS and Client Side ...
Locking the Throne Room - How ES5+ might change views on XSS and Client Side ...Mario Heiderich
Dev and Blind - Attacking the weakest Link in IT SecurityDev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT SecurityMario Heiderich
HTML5 - The Good, the Bad, the UglyHTML5 - The Good, the Bad, the Ugly
HTML5 - The Good, the Bad, the UglyMario Heiderich
The Future of Web Attacks - CONFidence 2010The Future of Web Attacks - CONFidence 2010
The Future of Web Attacks - CONFidence 2010Mario Heiderich
Web WuermerWeb Wuermer
Web WuermerMario Heiderich

Recently uploaded

20230927 Tech_For_Good Discovery_Summit.pdf20230927 Tech_For_Good Discovery_Summit.pdf
20230927 Tech_For_Good Discovery_Summit.pdfInternational Society of Service Innovation Professionals
Personal Brand Exploration - NaQuan CreekmorePersonal Brand Exploration - NaQuan Creekmore
Personal Brand Exploration - NaQuan CreekmoreNaQuan Creekmore
Temenos_Global_Report_Final_Sep22.pdfTemenos_Global_Report_Final_Sep22.pdf
Temenos_Global_Report_Final_Sep22.pdfChris Skinner
Types and Sources of impurities.pptx Pharmaceutical Inorganic chemistry UNIT-...Types and Sources of impurities.pptx Pharmaceutical Inorganic chemistry UNIT-...
Types and Sources of impurities.pptx Pharmaceutical Inorganic chemistry UNIT-...Ms. Pooja Bhandare
Monthly Information Session for MV Asterix (September 2023) - Web.pptxMonthly Information Session for MV Asterix (September 2023) - Web.pptx
Monthly Information Session for MV Asterix (September 2023) - Web.pptxEsquimalt MFRC
In vitro.pptxIn vitro.pptx
In vitro.pptxHimadripriyaGogoi2

The innerHTML Apocalypse