#Learn365 Day-6: Cross-Site Leaks

Goldmine to Learn: https://t.co/TsqGRWxPq7

Cross-Site Leaks/XS-Leaks is a less explored security issue that usually comes from Side-Channel Attacks. I found this an interesting vector but unusual.

(1/n)

#BugBountyTips #infosec #AppSec

(2/n)
This basically utilizes the web's core principle of composability in order to determine & extract useful information.

XS-Leaks take advantage of small pieces of information that are exposed during interactions between websites.
(3/n)
Cross-Site Oracle.

This can be considered as a querying mechanism. The information used for this attack is of binary form and called Oracles. It usually has an answer of "Yes" or "No". You can say True or False.
(4/n)
For Example: Does User Harsh Exists in the Application. Yes, means that the user is there in the application.
- An attacker requires to smartly form queries in order to successfully execute this attack and gain hold of sensitive information.
(5/n)
Some of the Attacks using Cross-Site leaks are:

1. XS-Search: An attacker try to abuse the query mechanism such as search functionality to leak and get hold of the user's information.

Remediation
- Same Site Lax Cookies
(6/n)
Usual Exploitation Workflow:

1. Define a timeline when there is a Hit vs Miss
2. Start attacking the Querying Endpoint.
3. For Example: ?search=h (Throws a Hit)
search for the next word appended to `h` i.e. ?search=ha otherwise change the word i.e. ?search=b
(7/n)
2. Error Events

Based on the Error Message returned by the application, it may be possible to enumerate sensitive information. This is similar to user enumeration techniques.

Reference: https://t.co/2iIVT0xei2
(8/n)
3. Frame Counting
The window.length provides the number of frames in the window. This attribute can provide valuable information about a page to an attacker.

References: https://t.co/XjOZL3yiZF
(9/n)
3. Navigation Attacks
Reference: https://t.co/lS3LT80Foa

4. Cache Probing
- Workes based on detecting whether the web page was cached or not.
Ref: https://t.co/ejAdOHaIFG

5. ID Attribute
Ref: https://t.co/11lwLzE2DD
(10/n)

6. Post Message Broadcasts
a. Sharing Sensitive message with untrusted origins
b. Leaking information based on varying content or on the presence of a broadcast

7. Abusing Browser Features
- CORB (Cross-Origin Read Blocking)
- CORP (Cross-Origin Resource Policy)
(n/n)

8. Timing Attacks
- Clock Based
- Network Timing
- Execution Timing
- Hybrid Timing
- Connection Pool

# Referneces
1. https://t.co/byryqh3bql
2. https://t.co/khunvHYDga
3. https://t.co/ssQ39okO55

I'll revisit this attack in near future & will try to find.

More from For later read

@snip96581187 @Daoyu15 @lab_leak @walkaboutrick @ydeigin @Ayjchan @franciscodeasis @TheSeeker268 @angie_rasmussen Clearly, because as I have been saying for 8 months now, DTRA and DARPA have been using Ecohealth and UC Davis to collect novel pathogens for gain of function work back in the USA. I have documented this in many threads which I will post here just to annoy everyone.

@Daoyu15 @lab_leak @walkaboutrick @ydeigin @Ayjchan @franciscodeasis @TheSeeker268 @angie_rasmussen


@Daoyu15 @lab_leak @walkaboutrick @ydeigin @Ayjchan @franciscodeasis @TheSeeker268 @angie_rasmussen


@Daoyu15 @lab_leak @walkaboutrick @ydeigin @Ayjchan @franciscodeasis @TheSeeker268 @angie_rasmussen


@Daoyu15 @lab_leak @walkaboutrick @ydeigin @Ayjchan @franciscodeasis @TheSeeker268 @angie_rasmussen
(1/50)

#Cardano “Understanding Kamali”

#Cardano will be the underpinning of the emergence of Africa.

To grasp the full weight of the SOLUTIONS #Cardano can provide it is pertinent to read “Understanding Africa” as I will draw directly from the PROBLEMS laid out.


(2/50)

Here is a link if you have not already read


(3/50)

What I will attempt to do here, is to create an immersive world for you to be placed in to grasp the weight and size of problems from the ground level and then take a grass-roots approach at solving them using #Cardano and its technology.

(4/50)

As an investor and community member of #Cardano, this should be extremely important to you as you have a stake (pun intended) in this.

“You are paid in direct proportion to the difficulty of the problems you solve” - @elonmusk

(5/50)

In Africa, agribusiness, more than any other sector, has the potential to reduce poverty and drive economic growth. Agriculture accounts for nearly half of the continent’s gross domestic product and employs 60 percent of the labor force.

You May Also Like

#ज्योतिष_विज्ञान #मंत्र_विज्ञान

ज्योतिषाचार्य अक्सर ग्रहों के दुष्प्रभाव के समाधान के लिए मंत्र जप, अनुष्ठान इत्यादि बताते हैं।

व्यक्ति के जन्म के समय ग्रहों की स्थिति ही उसकी कुंडली बन जाती है जैसे कि फ़ोटो खींच लिया हो और एडिट करना सम्भव नही है। इसे ही "लग्न" कुंडली कहते हैं।


लग्न के समय ग्रहों की इस स्थिति से ही जीवन भर आपको किस ग्रह की ऊर्जा कैसे प्रभावित करेगी का निर्धारिण होता है। साथ साथ दशाएँ, गोचर इत्यादि चलते हैं पर लग्न कुंडली का रोल सबसे महत्वपूर्ण है।


पृथ्वी से अरबों खरबों दूर ये ग्रह अपनी ऊर्जा से पृथ्वी/व्यक्ति को प्रभावित करते हैं जैसे हमारे सबसे निकट ग्रह चंद्रमा जोकि जल का कारक है पृथ्वी और शरीर के जलतत्व पर पूर्ण प्रभाव रखता है।
पूर्णिमा में उछाल मारता समुद्र का जल इसकी ऊर्जा के प्रभाव को दिखाता है।


अमावस्या में ऊर्जा का स्तर कम होने पर वही समुद्र शांत होकर पीछे चला जाता है। जिसे ज्वार-भाटा कहते हैं। इसी तरह अन्य ग्रहों की ऊर्जा के प्रभाव होते हैं जिन्हें यहां समझाना संभव नहीं।
चंद्रमा की ये ऊर्जा शरीर को (अगर खराब है) water retention, बैचेनी, नींद न आना आदि लक्षण दिखाती है


मंत्र क्या हैं-
मंत्र इन ऊर्जाओं के सटीक प्रयोग करने के पासवर्ड हैं। जिनके जप से संबंधित ग्रह की ऊर्जा को जातक की ऊर्जा से कनेक्ट करके उन ग्रहों के दुष्प्रभाव को कम किया और शुभ प्रभाव को बढ़ाया जाता है।