The original article is here.Here is a very good summarization of the latest web hacking techniques. What does web hacking mean? XSS? SQL Injection? Actually, there have been many many more new web hacking techniques emerging in the last year. Some of them are kind of freak and some of them are targeting specific application context. Below is a list of these web hacking techniques of 2008.
- Cross-Site Printing
- CUPS Detection
- CSRFing the uTorrent plugin
- Clickjacking / Videojacking
- Bypassing URL Authentication and Authorization with HTTP Verb Tampering
- I used to know what you watched, on YouTube (CSRF + Crossdomain.xml)
- Safari Carpet Bomb
- Flash clipboard Hijack
- Flash Internet Explorer security model bug
- Frame Injection Fun
- Free MacWorld Platinum Pass? Yes in 2008!
- Diminutive Worm, 161 byte Web Worm
- SNMP XSS Attack (1)
- Res Timing File Enumeration Without JavaScript in IE7.0
- Stealing Basic Auth with Persistent XSS
- Smuggling SMTP through open HTTP proxies
- Collecting Lots of Free ‘Micro-Deposits’
- Using your browser URL history to estimate gender
- Cross-site File Upload Attacks
- Same Origin Bypassing Using Image Dimensions
- HTTP Proxies Bypass Firewalls
- Join a Religion Via CSRF
- Cross-domain leaks of site logins via Authenticated CSS
- JavaScript Global Namespace Pollution
- GIFAR
- HTML/CSS Injections – Primitive Malicious Code
- Hacking Intranets Through Web Interfaces
- Cookie Path Traversal
- Racing to downgrade users to cookie-less authentication
- MySQL and SQL Column Truncation Vulnerabilities
- Building Subversive File Sharing With Client Side Applications
- Firefox XML injection into parse of remote XML
- Firefox cross-domain information theft (simple text strings, some CSV)
- Firefox 2 and WebKit nightly cross-domain image theft
- Browser’s Ghost Busters
- Exploiting XSS vulnerabilities on cookies
- Breaking Google Gears’ Cross-Origin Communication Model
- Flash Parameter Injection
- Cross Environment Hopping
- Exploiting Logged Out XSS Vulnerabilities
- Exploiting CSRF Protected XSS
- ActiveX Repurposing, (1, 2)
- Tunneling tcp over http over sql-injection
- Arbitrary TCP over uploaded pages
- Local DoS on CUPS to a remote exploit via specially-crafted webpage (1)
- JavaScript Code Flow Manipulation
- Common localhost dns misconfiguration can lead to “same site” scripting
- Pulling system32 out over blind SQL Injection
- Dialog Spoofing – Firefox Basic Authentication
- Skype cross-zone scripting vulnerability
- Safari pwns Internet Explorer
- IE “Print Table of Links” Cross-Zone Scripting Vulnerability
- A different Opera
- Abusing HTML 5 Structured Client-side Storage
- SSID Script Injection
- DHCP Script Injection
- [File Download Inje
1
ction](http://www.aspectsecurity.com/documents/Aspect_File_Download_Injection.pdf) 58. [Navigation Hijacking (Frame/Tab Injection Attacks)](http://www.gnucitizen.org/blog/hijacking-innocent-frames/) 59. [UPnP Hacking via Flash](http://www.gnucitizen.org/blog/hacking-the-interwebs/) 60. [Total surveillance made easy with VoIP phone](http://www.gnucitizen.org/projects/total-surveillance-made-easy-with-voip-phones/) 61. [Social Networks Evil Twin Attacks](http://www.gnucitizen.org/blog/social-networks-evil-twin-attacks/) 62. [Recursive File Include DoS](http://websecurity.com.ua/2047/) 63. [Multi-pass filters bypass](http://websecurity.com.ua/2115/) 64. [Session Extending](http://websecurity.com.ua/2233/) 65. [Code Execution via XSS](http://securityvulns.ru/Udocument911.html) ([1](http://securityvulns.ru/Udocument941.html)) 66. [Redirector’s hell](http://websecurity.com.ua/2670/) 67. [Persistent SQL Injection](http://securityvulns.ru/Vdocument24.html)[](http://powerofcommunity.net/poc2008/hasegawa.pptx) 68. [JSON Hijacking with UTF-7](http://powerofcommunity.net/poc2008/hasegawa.pptx)<a rel="nofollow" href="http://www.comsecglobal.com/FrameWork/Upload/SQL_Smuggling.pdf"></a> 69. [SQL Smuggling](http://www.comsecglobal.com/FrameWork/Upload/SQL_Smuggling.pdf)[](http://www.secforce.co.uk/media/presentations/OWASP_Abusing_PHP_sockets.pdf) 70. [Abusing PHP Sockets](http://www.secforce.co.uk/media/presentations/OWASP_Abusing_PHP_sockets.pdf) ([1](http://www.secforce.co.uk/media/tools/socket_attack.zip), [2](http://www.secforce.co.uk/media/demos/PHP_socket_hijacking_demo.html))[](http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-21) 71. [CSRF on Novell GroupWise WebAccess](http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-21)