davbark zikomo information

0 views
Skip to first unread message

Hilma Kolin

unread,
Aug 2, 2024, 5:22:34 AM8/2/24
to siticonsi

Check out the cookies that the site uses to authenticate you, you can edit the cookies from the dev tools! just mess around with them, edit them until you refresh the page and you are logged out, try to figure out what are the cookies that hold your session ID.

if you open a diferent browser (say firefox) or a diferent computer and paste those cookies while you are on facebook's domain using the dev tools, then you will be able to resume your previous session, that's session hijacking

Facebook might complain, because it will see that you suddenly changed the user agent (or some other way of fingerprinting who you are) and will likely send you a notification asking about "suspicious activity" on your account.

The "cookies" file you mention is a SQLite database that contains ALL these cookes, you can open it with sqlite browser and check them out yourself. The actual values of the cookies have been encripted in recent versions of chrome, so they cant be viewed from the sqli database so easily.

If the cookie is not marked as HttpOnly then it can be read by javascript, if you can add some javascript to the site (this is called Cross site scripting) then you can read the cookies content and ask javscript to send that to some server you control.

You cannot steal a Google account credentials by simply looking at cookies.Cookies are used for "session purposes". When you perform login on google you store cookies that (to put it simply) reminds google that you are authenticated but credentials are not saved insider cookies.

What you could think of is stealing a session (Session Hijacking) like attempting an attack of cross-site request forgery so you can perform some actions as the logged user. Or search some vulnerabilities like Session Framing (highly unlikely).

If you are interested in Web application vulnerabilities I also recommend you to take a look at some CTF games (capture the flag). For an entry level you can take a look at picoCTF that has many types of challenges including web application ones.

A user's session cookie acts as their credential after they've been authenticated and until they are signed off. A user provides valid username/password and gets a session cookie in return. Its this cookie that each subsequent HTTP request needs to present to the server so that it knows the 'context' of the request. This ensures that a user isn't asked for the username/password for each page/request.

Hence, if you obtain the session cookie of a logged in user, you can essentially impersonate him/her without actually knowing their password. A very common method to steal cookies are our beloved XSS attacks. However, a good combination of CSP settings and protections like XSS auditor combined with httpOnly cookies thwart most XSS attacks. If you find one on gmail, you'll probably get a hefty sum of $$ via their bug bounty program ;)

CSRF is another way how attackers make servers perform changes that weren't authorized or initiated by the user. There was a cute CSRF attack on gmail where a attacker could send POST requests to create an email filter on user's account which will essentially forward a copy all emails to an email of attackers choice. Read about it at: _flaw_lets_anyone_read_your_e-mail/

Alternatively you can 'steal' the cookies by using the Chrome Developer tools, you can view the cookies values on VM machine, and then in the host use the same to set cookies values by executing js code on the console :

September 9, 2022 Update: Since the original publication of this blog on August 29, 2022, the Flipshope browser extension was updated in the Chrome Store on September 6, 2022 with a version that no longer contains the potentially harmful features originally discussed in this blog.

A few months ago, we blogged about malicious extensions redirecting users to phishing sites and inserting affiliate IDs into cookies of eCommerce sites. Since that time, we have investigated several other malicious extensions and discovered 5 extensions with a total install base of over 1,400,000

The extensions offer various functions such as enabling users to watch Netflix shows together, website coupons, and taking screenshots of a website. The latter borrows several phrases from another popular extension called GoFullPage

Chrome extensions work by subscribing to events which they then use as triggers to perform a certain activity. The extensions analyzed subscribe to events coming from chrome.tabs.onUpdated. chrome.tabs.onUpdated will trigger when a user navigates to a new URL within a tab.

Once this event triggers, the extension will set a variable called curl with the URL of the tab by using the tab.url variable. It creates several other variables which are then sent to d.langhort.com. The POST data is in the following format:

We discovered an interesting trick in a few of the extensions that would prevent malicious activity from being identified in automated analysis environments. They contained a time check before they would perform any malicious activity. This was done by checking if the current date is > 15 days from the time of installation.

I recently formatted my computer and saved the txt of all cookies from my old browser and now I want to import them all to my chrome so I don't have to log in to sites I was already logged in like steam, gmail, netflix and others could someone help me I've tried in every way to import my cookies to chrome and so far nothing thanksAnd I forgot to mention I've tried all the ways to import cookies and so far nothing has been required

You will need extension version v2.1.5 or greater to get Netflix to work. This version is already available on Firefox and Chrome. This post discusses cookies, how they work, recent changes to their behavior, and finally, what you need to do to get Netflix to work on TwoSeven.

Unfortunately, the two cookies that were modified were ones that denote the login session. As a result of the change, they were no longer being sent as part of browser requests to netflix.com. This in turn led Netflix to believe that the user was not logged in.

How does this help tracking individuals?
Consider a scenario where you visit Amazon to do some shopping. You browse through a few items, and then you decide to check your Facebook. Unknown to you, Amazon made a request to an ad website which stored a cookie on your browser. Now, if Facebook also makes a request to the same ad website (almost certainly already taking place), then the ad website can now uniquely identify you using the cookie it stored earlier. As a result, you will potentially start seeing ads on Facebook that are highly relevant to your recent Amazon activity.

Initially, cookies with no SameSite attribute were being treated as SameSite=None, and thus continued to work in all cases. However, in February this year, Chrome also began treating cookies with no SameSite attribute as SameSite=Lax. All of this required the TwoSeven extension to come up with a strategy to deal with these changes to cookies.

TwoSeven has two ways of dealing with SameSite. First, through the extension settings, it allows users to configure the domains on which to work around SameSite restrictions. These workarounds only apply when the configured domains are embedded within twoseven.xyz. In other words, adding netflix.com to this list will make no difference until netflix.com is embedded within twoseven.xyz.

If all else fails, try toggling the Override cookies to SameSite=None switch. Note that this should be used as a last resort, as this essentially reverts your browser to a pre-SameSite era, where all of the cookies are accessible for cross-website tracking. There are also potential security implications from making this change, as your cookies may be exposed to malicious domains. Currently, there is no safe way to undo this change. You would need to clear your cookies for the website in question.

On my debian installation I installed chromium 39 and the latest version of libnss3, netflix failed to play. I tried on my ubuntu installation and it too failed. I tried installing chrome from the website and it WORKED. I looked at the version of chrome and chromium. They're both 39.0.2171.XY. AFAIK chrome 38+ works.

You will need that plugin installed to chromium for it to work. You might also add the google talk plugin and pdf plugin while you're at it, but if you do so you pretty much just installed chrome as those are some of the primary differences.

In fact, though, until late summer 2015 you couldn't install that component singly to chromium - we can chalk that one up to another (short-lived) win for Digital Restrictive Management, I guess. With some serious downtime and expert hacking you might be able to compile your own package (a chromium compile is no Sunday drive, by the way) - but you might have to hack the plugin out of chrome.

As of August 2015, though, you can now install the Widevine module separately as the chromium maintainer has patched the source to accept its use. For example, on an Arch Linux system there is the chromium-widevine AUR package. Have a look at its PKGBUILD script to see how it's done - it doesn't look very complicated. Essentially the chrome...deb debian package file is downloaded, from it are extracted only a few Widevine relevant files, their version numbers captured, and then these are copied into the relevant chromium installation paths.

There is also the Pipelight project which should enable you to use the Silverlight plugin (via wine) to watch Netflix video (and so not the HTML5 method which works with chrome) in chromium. It is a somewhat heavy-handed approach in my opinion, but it is a popular option.

Don't worry - it's quick and painless! Just click below, and once you're logged in we'll bring you right back here and post your question. We'll remember what you've already typed in so you won't have to do it again.

90f70e40cf
Reply all
Reply to author
Forward
0 new messages