Главная
Study mode:
on
1
Introduction
2
Agenda
3
XML
4
Hacker Techniques
5
Constraints
6
Simple parsing
7
External entities
8
Entities in attributes
9
Simulation construction
10
Sample service
11
XML injections
12
SQL injections
13
DNS queries
14
Main technique
15
Visualization
16
Restrictions
17
Declaration of Entity
18
Load Entity
19
Express
20
T document
21
Parser
22
Summary
23
Success
24
Passing
25
Summary Table
26
Demo
27
Tools
28
Metasploit
29
GitHub
30
Conclusions
31
Special Thanks
Description:
Explore a groundbreaking technique for out-of-band data retrieval in this 30-minute Black Hat EU 2013 conference talk. Discover how to access files and resources from a victim's machine and internal network, even when normal output is possible from vulnerable applications handling XML data. Learn about XML hacker techniques, constraints, simple parsing, external entities, and entity attributes. Dive into simulation construction, sample services, XML injections, and SQL injections. Understand DNS queries, the main technique, visualization, and restrictions. Examine the declaration of entities, loading entities, and the ExpressT document parser. Gain insights into tools like Metasploit and GitHub for practical application. Presented by Alexey Osipov and Timur Yunusov, this talk provides a comprehensive overview of this innovative data retrieval method.

XML Out-of-Band Data Retrieval

Black Hat
Add to list