- What is XSS Tunnelling?
- XSS Channel:
which is opened by an XSS attack. At a technical level, it is a type of AJAX
application which can obtain commands, send responses back and is able to talk
- XSS Shell:
and an attacker so that an attacker to control a victim’s browser by sending it
commands. This communication is bi-directional.
Download XSS Shell from here.
reference by way of an XSS attack. The attacker is then able to control the victim’s
browser. After this point the attacker can see requests, responses and is able to
instruct the victim’s browser to carryout requests etc.
- How Does XSS Shell Work?
attacker and the victim. It is a server-side application and requires an ASP and IIS
web server. It uses an MS Access database as storage.
victim’s browser and is responsible for the receiving and processing of commands
together with providing the channel between the victim and the attacker. This code
was tested under Firefox, IE6 and IE7.
The final part of the XSS Shell is the administration interface. An attacker can send
new commands and receive the responses from a victim(s) browser instantly from
this interface. Again it is ASP and requires IIS.
1. An attacker infects a website with a persistent or reflected (temporary) XSS
3. The Victim’s browser begins to perform periodic requests to the XSS Shell
Server and looks for new commands.
4. When the victim browser receives a new command such as (Get Cookies,
returns the results to the XSS Shell.
5. The Attacker can push new commands to victim(s) browser and view the
results from the XSS Shell administration interface.
For educational purpose only...Do not misuse it...