Тёмный

CSS Keylogger - old is new again 

LiveOverflow
Подписаться 893 тыс.
Просмотров 314 тыс.
50% 1

This is "well known" research that resurfaces every other year. Let me tell you a story how I have heard about this in 2012 and putting it into perspective.
Research "Scriptless Attacks -
Stealing the Pie Without Touching the Sill" (2012):
+ Paper: www.nds.rub.de...
+ Slides: www.slideshare...
+ Talk recording: channel9.msdn....
CSS Keylogger: github.com/max...
Stealing Data With CSS - Attack and Defense: www.mike-gualt...
Twitter:
+ / 0x6d6172696f
+ / sirdarckcat
+ / garethheyes
+ / thornmaker
+ / mlgualtieri
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Website: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
=[ 📄 P.S. ]=
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#SecurityResearch

Опубликовано:

 

30 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 255   
@tomysshadow
@tomysshadow 6 лет назад
That reminds me a lot about how they made it so in JS you can't detect the colour of a link, since websites could put hidden links to their competitors and check if they were purple in order to see if the user visited their competitor's site...
@UltimatePerfection
@UltimatePerfection 6 лет назад
TOMYSSHADOW No problem. Just do it in css. A.competitor.visited{background url...
@UltimatePerfection
@UltimatePerfection 6 лет назад
TOMYSSHADOW Need a separate class for each competitor, but you get the idea.
@tomysshadow
@tomysshadow 6 лет назад
I just recall that being something that came up in the past, since I distinctly remember being frustrated I couldn't get the colour of a link for some reason. It was probably some ugly hack I was trying to do years ago.
@j.redhead
@j.redhead 6 лет назад
if i recall correctly, firefox discards most css properties/values for :visited, so that shouldn't(?) work
@leeroyescu
@leeroyescu 6 лет назад
Browsers are aware of this and they consider it a privacy violation. Doesn't work in Chrome 64.
@ashboon1625
@ashboon1625 6 лет назад
Amazing! Never heard of CSS attacks.
@darkovdarkov1417
@darkovdarkov1417 5 лет назад
@@ChrisG0 you have to access the HTML on the client, not on the server. Much easier, browser extensions, for example, can do that, just one example.
@voidnull3192
@voidnull3192 5 лет назад
sass/scss || css/?$_
@MrTurururu3
@MrTurururu3 4 года назад
thank you so much for this video, just had mine done on whizhackzofoz.com
@CodingWithBen
@CodingWithBen 4 года назад
ash boon Same! Never knew this. Always thought it was just a styling language
@stalkwe5333
@stalkwe5333 3 года назад
Same
@KangJangkrik
@KangJangkrik 3 года назад
Netscape: Javascript is automatically disabled, people are secure Hacker: **hacks via CSS** Netscape: WAIT THAT'S ILLEGAL Hacker: always has been 🔫
@kenonerboy
@kenonerboy 5 лет назад
"Why is it hard to make friends over 30"
@EthnicalSec
@EthnicalSec 6 лет назад
I fucking love this channel !
@MaoDev
@MaoDev 6 лет назад
Ethnical | Informatique I'm a fucking loved that chunnel*
@VworksArt
@VworksArt 5 лет назад
I've never heard of CSS being used as an attack. I have to say as primitive as it is, it's pretty damn clever.
@DominicNweze
@DominicNweze 2 года назад
Yes it is cool, how an incomplete langue that's not even considered a programming language could be used for such an attack.
@GeorgeAlexanderTrebek
@GeorgeAlexanderTrebek 6 лет назад
When this video came up i first seen CSS and thought it was Counter Strike Source.... Then i saw it was your channel and i felt like a idiot... hahahahah
@jeromedeveyra4534
@jeromedeveyra4534 5 лет назад
hahahahahahahaha
@9001greg
@9001greg 5 лет назад
you are an idiot, don't worry
@Backfighter7O7
@Backfighter7O7 6 лет назад
If this blew your mind. Did you actually know, that HTML5 and CSS3 together are turing complete? Someone implemented Rule 110 with it 😵
@DominicNweze
@DominicNweze 2 года назад
What's the rule 110.
@Backfighter7O7
@Backfighter7O7 2 года назад
@@DominicNweze en.m.wikipedia.org/wiki/Rule_110
@gyroninjamodder
@gyroninjamodder 6 лет назад
This can be used to deanonymize users of tor. It also is why you should use the tell browser and why it tells you not to change the browser windows dimensions. I'm not sure why you are saying it can't as it definitely can. Maybe you are misunderstanding what they mean about Deanonymization in this context is just being able to distinguish two users from each other in a somewhat persistent way.
@Wertercat
@Wertercat 5 лет назад
Tell browser?
@gdtoob
@gdtoob 5 лет назад
wertercatt I’m pretty sure he meant Tails. Tails is an operating system meant for users who want to be anonymous. It doesn’t store history or persistent data at all and you’re meant to run it in a live USB/CD.
@_pi
@_pi 6 лет назад
I was just thinking you should make a video about this and... you didn't take long to do it!
@dr.z7958
@dr.z7958 6 лет назад
But how is this relevant? wouldn't the effort of injecting a CSS code into a browser is the same as injecting JS codes?
@LiveOverflow
@LiveOverflow 6 лет назад
yeah, I said in the video that it's more of a "thought experiment", because it's really rare
@inspirationeveryday1175
@inspirationeveryday1175 6 лет назад
plz man make a video in with how to make a keylooger with a html plz
@tatusaalasti2150
@tatusaalasti2150 6 лет назад
Weird that the re-research guy didn't simply Google- search for CSS- keylogger programs before starting his little project.
@rage7658
@rage7658 6 лет назад
Tatu Saalasti i mean he was probably caught up with his thought process and didnt wanna lose his train of thought
@rage7658
@rage7658 6 лет назад
An Enemy LMFAO true xD
@dawnless852
@dawnless852 6 лет назад
I got a 45 min ad?!
@Poisontooth
@Poisontooth 5 лет назад
Pawelnougoed I got an ad that was an hour in a half 😲
@DaVince21
@DaVince21 5 лет назад
@@Poisontooth So you played it at 2x speed? 😛
@LunarLambda
@LunarLambda 5 лет назад
I got a 2+ HOUR ad once. Was some nightcore compilation or something? ridiculous lol
@paulhendrix8599
@paulhendrix8599 5 лет назад
So what? You can skip it. I actually watched a 45 minute ad once because it was an interesting talk.
@snbeast9545
@snbeast9545 5 лет назад
Use uBlock Origin instead of Adblock.
@jw27
@jw27 4 года назад
how to insert this css into other's html, that is a question if you have access to the css, you can just use js to get the values
@itech9313
@itech9313 4 года назад
Maybe creating a extension for browser. They allow you to apply css. I saw it in a tutorial in the past.
@Preinstallable
@Preinstallable 3 года назад
Userstyles
@DSAhmed
@DSAhmed 2 года назад
I've heard of CSS being a delivery mechanism for XSS, but this definitely new and interesting to me, although its now a decade old.
@attention_shopping
@attention_shopping 6 лет назад
CSS keylogging isn’t new (2009 slideplayer.com/slide/3493669/) but the reason the github repo exploded is because it applies it to REACT apps.
@Dorumin
@Dorumin 6 лет назад
I use JavaScript and HTML on simple sites, but I see why people would use react for complicated web applications
@Dorumin
@Dorumin 6 лет назад
Yeah yeah, jQuery is fantastic, isn't it? :P I know that all the devs these days are dwelling in their dependencies, but that doesn't mean that your counter app needs to have 50kb in libraries when you can just make that with the DOM API. Libraries like React and Vue are great at reducing developing time and cost, but that doesn't mean that they need to be in every website
@mariustancredi2192
@mariustancredi2192 6 лет назад
Cross Site Styling "Other XSS" can get dangerous, but the main attack vector is that it can be abused to mask injected HTML to look like legit content of the website, and can carry out pretty effective phishing attacks.
@ムワ-d7n
@ムワ-d7n 6 лет назад
I though css is just for styling script for html, and this attack is really break my tough about css :v
@michaelscofield2652
@michaelscofield2652 6 лет назад
Nice english many likes from me.
@ムワ-d7n
@ムワ-d7n 6 лет назад
no problem ;)
@richardvaughn2705
@richardvaughn2705 6 лет назад
#MUWA • Because CSS can download things like images and it can also inject HTML.
@Shadownrun2
@Shadownrun2 6 лет назад
in that case the thing is that images can come from different servers without causing trouble with the Cross Origin Resource Security, you wouldn't be able to send the data across to your server using javascript directly ...
@DaVince21
@DaVince21 5 лет назад
CSS can't really be called a script because that would imply it's a scripting language. It's more of a definition file for visual styles (hence it's called a "style sheet").
@justanormalperson
@justanormalperson 6 лет назад
thats actually quite cool
@ToxicallyMasculinelol
@ToxicallyMasculinelol 5 лет назад
btw someone should mention that there actually is a pretty serious attack vector for this kind of threat: userchrome files. a huge number of people use extensions like Stylish and download custom stylesheets, often without even checking the code. and even for the people who do check the code, you can obfuscate important details by encoding them in base64, and by minimizing control characters, shit like that. i wonder if there's even a way to encode the entire malicious part in base64 and find some way to store it that it'll still be read. isn't really my area of expertise but i know you can do that shit in js easily. there are websites that host these stylesheets. i haven't used stylish but i don't think it has any form of protection against remote resources. otherwise you'd need to locally store any additional icons. compared to the custom script sites that are available, the css websites are really fuckin sketchy. which makes sense, css seems so much easier to trust. and no doubt you could do a lot more by uploading a malicious custom script and hope that people install it to tampermonkey, but if you do a malicious stylesheet it's a lot less likely to get caught. i use firefox so the stylesheets i've made are just loaded instantly by the browser and i don't have any need for stylish, but my wikipedia stylesheet is impressive enough to share on one of those sites. i haven't shared it since i originally took it from an existing but defunct stylesheet, but i improved it massively and in my opinion it's the best 'wikipedia dark mode' stylesheet available on any of the custom stylesheet websites, by a long margin. if i wanted to i could upload it, and sneak this into it, and i think it'd be super popular until someone eventually found the poison. i don't think many people would notice in time because it's over 3,000 lines and it just looks so pretty. and that's before making any kind of effort to obfuscate it. like you would add a ton of pointless properties that just restate the initial value. make it so long that looking through it is too daunting to bother with. make it huge. honestly if this was the goal, it should be a browser-wide dark mode. like dark reader. of course dark reader uses js to work its magic, but in this case we advertise it as being very effective for a small number of major websites (google, youtube, wikipedia, amazon, facebook, etc.) and moderately effective for most other websites. therefore we can make it a stylesheet with no document selector. like the problem with the wikipedia stylesheet is it's not a more effective vector than your example of just happening upon some remote injection exploit on a specific website. if you make a good enough cross-website stylesheet then you have an excuse to make it apply to EVERY website. and there's no reason to use a [type="password"] selector either, just steal everything. all user inputs. not just textboxes but checkboxes, radio buttons, any interactable legacy element. better yet, start the stylesheet off without any malicious content. make it popular and give it its own website that you link to on the stylesheet websites. there are others like that already. then when people navigate to your website, they see a post on the website that says you're expanding the stylesheet to apply to the *entire* browser. so not just the content but the browser UI. which requires more than an extension, they need to make a config tweak and download the modifications directly and put it in their profile folder. so now you have a userchrome.css that records all inputs into the browser UI, including any interactions (possibly even non-interacted text displays?) with password managers like keepass, bitwarden, etc. and you have a usercontent.css that records most inputs into websites. and even worse, i'm not sure about google chrome but for firefox users, you can fill in all the gaps with userchromeJS. there's an exploit that allows basically arbitrary XBL bindings in css sheets. which means you can install and run scripts locally, during startup and before any extensions load. so the whole package is userchrome.css, usercontent.css, userchrome.js, userchrome.xml. and you use the script to log inputs in elements that aren't implemented using regular html objects. basically you can log interactions with more advanced objects, and then do whatever else you want to do with javascript, which is going to be even less comprehensible to the average user. maybe there's some way to steal data from password managers, that kind of thing. it seems like a pretty underestimated threat. but it doesn't even have to be that advanced to do real damage. even without the js, a userchrome.css file can still steal someone's email and password as they log into their password manager. then if they don't have 2fa you would steal all their accounts. even without the userchrome.css file, a cross-website stylesheet for an extension like stylish can still steal someone's paypal login, bank login, etc. it sounds weird because we don't hear about this ever, but there seem to be no countermeasures in place. this must be already happening. i know plenty of people have uploaded malicious scripts to websites like userscripts and openuserjs. i think the explanation for css skins being a less common vector is probably that most people are simply unaware that a worthwhile malicious attack even exists within pure css. i had never heard of this until now and it never occurred to me even though i use attribute selectors all the time lol. it's pretty clever, just not intuitive that you'd write a binary switch for every character or character combination. it's kind of like building a digital keyboard in pure css lol.
@attention_shopping
@attention_shopping 6 лет назад
Additionally it shows a great POC using chrome extensions as CSS injector which is less common to vet compared to malicious JS injection
@maxautism6602
@maxautism6602 5 лет назад
I subbed because of your paint skills.
@markayala7752
@markayala7752 6 лет назад
I fucking love this channel !
@testobjektx1242
@testobjektx1242 6 лет назад
GREAT Video, well explained and intresting moderation! Keep it goin' sir :D
@Rudxain
@Rudxain 2 года назад
4:22 David's profile reads "Infinity" when interpreted as JSfuck. I was about to put it in a BF interpreter but quickly realized it has a lot of infinite loops. So it's 2 ways to say Infinity while saying fuck, lol
@CGoody564
@CGoody564 6 лет назад
Lol. Why the fuck am I here? The extent of my programming knowledge is the first few chapters of "head first learning; python" textbook. Lolz
@topkek_
@topkek_ 2 года назад
I know english is not your first language, but you mispronounce interpret in every video, just pointing it out for you - love the content either way!
@sorin.n
@sorin.n 5 лет назад
Lol. As you say in your presentation: the title is misleading. This is why I also immediately cliked on your video title 😉
@koruspring1519
@koruspring1519 6 лет назад
How do you inject the malicious css though?
@LiveOverflow
@LiveOverflow 6 лет назад
Same way you get malicious JS or HTML somewhere. With some kind of injection or so.
@mc.doncardervisa7279
@mc.doncardervisa7279 6 лет назад
Couldn't you in theory inject it via a MITM attack.
@BeHappyTo
@BeHappyTo 5 лет назад
why bother with this if youre mitm/
@DaVince21
@DaVince21 5 лет назад
@@BeHappyTo Style points, maybe?
@predatorleader
@predatorleader 5 лет назад
@@BeHappyTo because HTTPS .... duh
@Valnuss
@Valnuss 5 лет назад
I still don't get why this is a "realistic" security issue. You can only use this kind of stuff if you have already access to a website (via xss etc.). And if you have access to a website you can do a lot more/dangerous stuff than using a css keylogger... every js solution would be better. Doenst matter if 1 out of 10000 visitors uses a js blocker...
@GrantGryczan
@GrantGryczan Год назад
Many websites allow for custom CSS but have no trivial means of custom JS. A site like Reddit would be vulnerable to this if it didn't have a security policy blocking requests to external sites.
@ewyg
@ewyg 6 лет назад
finally something I can understand...
@paviterjotsingh6398
@paviterjotsingh6398 4 года назад
Can someone guide me little bit I am a noob stumbled upon this video now hung up on it
@BLOPS2ps3
@BLOPS2ps3 6 лет назад
You should do my schools ctf. its at ctf.tamu.edu Even though the competition ends today I believe the challenges will still be up. It would be very interesting to see your take on them.
@NOLlFE1
@NOLlFE1 5 лет назад
No ty not clicking that .. sad
@KidJV
@KidJV 5 лет назад
5:27 is it really hard to make friends at over 30?
@bottleogames
@bottleogames 3 года назад
"History Repeats itself" - Someone
@cc12yt
@cc12yt 3 года назад
counter strike source keylogger wtf how
@bdot02
@bdot02 6 лет назад
Couldn't you combine this with css variables and then capture the actual password?
@ToxicallyMasculinelol
@ToxicallyMasculinelol 5 лет назад
how would you "remove this vulnerability" without eliminating either the attribute selector or the background property? wouldn't be a very useful css version lol
@aspektx
@aspektx 6 лет назад
"Fuck! Browsers are weird."
@elydelacruz
@elydelacruz 6 лет назад
This is definitely still valid need to know knowledge today even if just as a testament that all user IO needs to be cleaned and validated! Especially things inputted through form fields people! Imagine a bookmarklet that injects this the keylogger on to your page. Know imagine the bookmarklet link disguised as a link to a valid resource!!! Recipe for disaster *nods head in disbelief*
@payangbadrul8998
@payangbadrul8998 4 года назад
Not believe it? Hold non-logging.
@MrSmitheroons
@MrSmitheroons 6 лет назад
I think to a typical user, losing their password privacy is actually a big deal, so if this can keylog a password, that's not a small problem.
@tehf00n
@tehf00n 6 лет назад
I went back to 2012 and the video disappeared like Marty McFly in his photo. I came back to finish the video.
@Lik3wise
@Lik3wise 6 лет назад
I'm a new subscrito to your channel and I must say that I'm stunned by your videos. I'm not a hacker/programmer myself, but I'm really interested in that stuff and I want to learn "it" over the next years. My question to you would be "How old were you when you started programming?" and "How many programming languages do you speak?" and "How long did it take to get this profound knowledge of things to work with?" The last question is kinda cheesy, because you never stop learning, but I mean, how long did it take to get all most of the necessary meta-knowledge that led to the first "Aha!" moments you had during hacking/reverse engineering? I'm a big fan of your work. Keep it up! Greets from a fellow German :D (Your accent is hard to miss^^)
@richardvaughn2705
@richardvaughn2705 6 лет назад
Basically any forum messageboard site that displays user content while the viewer is logging in is vulnerable.
@germaniothesmart-alec6056
@germaniothesmart-alec6056 5 лет назад
reminds me of :visited pseudo along with javascript to escape browser history information
@brianazeri
@brianazeri 6 лет назад
i dont understand anything about computer science, but there is something enjoyable watching your videos lol
@martinp.4797
@martinp.4797 6 лет назад
Didn't know that it was already discovered, but I found this attack at the beginning good, but after 10 min of research it wasn't good than I understood, and so the title is for smth
@mhendrickx
@mhendrickx 6 лет назад
One could argue that hosting CSS files on a "untrusted" CDN is not a big deal, compared to hosting JS on a untrusted CDN. If one hijacks the CDN, they could implement this, no?
@caseykuilman9307
@caseykuilman9307 5 лет назад
It could happen, but it is rather unlikely since usually attackers will use JS instead of CSS. But yes, it could be done (theoretically, at least).
@shivamchhapola5245
@shivamchhapola5245 6 лет назад
In 2014 I also came across this thing but I ignored it. But now I'm interested because of you. 😊
@GRBtutorials
@GRBtutorials 5 лет назад
Well, CSS is nowadays almost Turing complete, so...
@wesleykronmiller390
@wesleykronmiller390 6 лет назад
alert("dang youtube xss?")
@uccohwrmtqle2xernixq7mdw39
@uccohwrmtqle2xernixq7mdw39 6 лет назад
I found a exploit and found out that's how fishing scams work
@Section8Consulting
@Section8Consulting 5 лет назад
LETS GO BACK 1997 ....
@jgcommander
@jgcommander 6 лет назад
I have seen it loong time ago w/ using font ligatures so you are not abaddoned in this surprise :)
@kangjiahuang9928
@kangjiahuang9928 4 года назад
sirdarckcat, I think it's pronounced "Sir Dark Cat"
@parthpatel9602
@parthpatel9602 3 года назад
0:54 here I am a complete noob still watching live overflow!
@inspirationeveryday1175
@inspirationeveryday1175 6 лет назад
okey can you plz make a keylooger with html pleaze plz plz ....
@dhiahassen9414
@dhiahassen9414 5 лет назад
Have any browser prevent this in recent versions ? if anyone knows
@anthonynjoroge5780
@anthonynjoroge5780 3 года назад
What's up with the 'so handsome' mini pop-ups?😂😂
@alpharomeo5123
@alpharomeo5123 6 лет назад
Very old, its funny 😄 if you don't know About it HHH
@demonbruster926
@demonbruster926 6 лет назад
How to solve ( current read-only problem ) for usb
@_FLOROID_
@_FLOROID_ 6 лет назад
You know... I'm entirely new to the topic... and I really don't know anything about what this channel is all about, so.... where do I start? ^^ Any suggestions as to where I can start learning about programming and hacking overall? :3
@adib-enc
@adib-enc 5 лет назад
you can learn much by following each on this list amanhardikar.com/mindmaps/Practice.html it is important to know s/w developing before s/w exploitation ;)
@baldyardigan
@baldyardigan 5 лет назад
This reminds me a lot of the css code that shuts down iPhones.
@md6886
@md6886 6 лет назад
Second! Sick video. Have never heard about it tho
@jhonny8bit219
@jhonny8bit219 5 лет назад
Zou
@ПавелМорозов-ю5й
Не понятно, че делать то с этим. Как загружать жертве, только через плугин браузера?
@CookieGamesHD
@CookieGamesHD 6 лет назад
Awesome channel
@iroxudont
@iroxudont 6 лет назад
It doesn't even work unless your js is actively changing the value attribute on every input. Some other guy also reported that each character would only get registered once.
@Ownage4lif31
@Ownage4lif31 6 лет назад
Stephen Lynx watch the video properly reeee
@astrix8812
@astrix8812 4 года назад
so handsome
@eliaselkhoury2029
@eliaselkhoury2029 4 года назад
Im stuck on starting Yarn. How do I open it ?
@thornmaker
@thornmaker 6 лет назад
Nice overview and breakdown. And thank you for highlighting the earlier research. :)
@d4lep0ro
@d4lep0ro 6 лет назад
awesome video. I work with selectors every day and I've never thougth of this!
@AveryTCC
@AveryTCC 4 года назад
Great video
@effteepeedistro5388
@effteepeedistro5388 5 лет назад
dope idea
@Sirvierl0ffel
@Sirvierl0ffel 6 лет назад
Bist du deutsch???
@jan_harald
@jan_harald 6 лет назад
the moment selecting stuff via n letter becomes possible, is the moment a ton of sites will have keyloggers appear out of thin air
@LiveOverflow
@LiveOverflow 6 лет назад
Why?
@jan_harald
@jan_harald 6 лет назад
because you wouldn't need megabytes of css to log the input
@LiveOverflow
@LiveOverflow 6 лет назад
Or just use JavaScript?
@AntiWanted
@AntiWanted 3 года назад
Nice
@jeremy_s
@jeremy_s 6 лет назад
I don’t understand how anyone could possibly exploit my web app with this?
@Mishiman
@Mishiman 6 лет назад
It's impossible if you prevent XSS and third party content
@josh.salles
@josh.salles 5 лет назад
Myspace would have been fun.
@gabydewilde
@gabydewilde 5 лет назад
but you chose to use it in your video title anyway
@MrEgosar
@MrEgosar 5 лет назад
Deutsche und englisch. Ich find es erstaunlich wie schnell man es hört :D nichts gegen dich :)
@Size
@Size 6 лет назад
Agreed this isn't a keylogger.
@rudde7251
@rudde7251 6 лет назад
And I learned about it trough this video.
@dreamyrhodes
@dreamyrhodes 6 лет назад
Berlinsides! I was making music there lol
@xorinzor
@xorinzor 6 лет назад
Not quite sure how this CSS keylogger would be advantegeous over an JS Keylogger. 1. It's a lot more work, and a lot less reliable as you, for example, cant detect backspaces. 2. It will generate A LOT more requests in a browser, thus making it a lot easier for console users to detect something fishy going on (Aside of the large amount of requests, just loading this huge list of CSS rules will impact the site loading performance as well, which surely also will be noticed. 3. Are there really people who disable JavaScript? And if so, what percentage are we looking at, especially depending on the website, since most require JS to work if you dont want the website to lose most of its functionality.
@catmanboy0
@catmanboy0 6 лет назад
I disable JavaScript but end up turning it on if I need it for a website.
@iorbit
@iorbit 5 лет назад
You're missing the point. What makes this noteworthy is the ingenuity of the 'attack', not that it there are easier and more efficient ways of stealing people's passwords. If stuff like this doesn't make you go 'oh snap, son!' when you first hear about it, then I think you're in this hobby for the wrong reason.
@yesthatsam
@yesthatsam 6 лет назад
You Sir are wise :) thanks for reminding this
@thejaredwilcurt9336
@thejaredwilcurt9336 5 лет назад
Didn't Mattias (from Opera) give a talk on like 10 obscure things he had learned about CSS and this was one of them prior to the talk you referenced?
@LiveOverflow
@LiveOverflow 5 лет назад
not aware of that! Do you have a link to talk recordings or slides?
@thejaredwilcurt9336
@thejaredwilcurt9336 5 лет назад
@@LiveOverflow I was wrong, it happened in 2014, here's the link ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-WjP7TEKB7Uo.html
@rwpage89
@rwpage89 6 лет назад
Great content as usual man, love your channel. Totally off-topic question, but what do you use for your pen/pencil/drawing overlay graphics when you make your videos? I have some video tutorials for a couple friends that involve a lot of math that would be much easier to write into than use some kind of equation formatter.
@LiveOverflow
@LiveOverflow 6 лет назад
You can find a making off video on my channel ;)
@rwpage89
@rwpage89 6 лет назад
Didn’t even think to check for that, thanks a ton!
@VoidMoth
@VoidMoth 6 лет назад
CSS is a Turing complete language. you could rewrite metasploit in CSS, you could write a C comiler in CSS, you get the idea
@VoidMoth
@VoidMoth 6 лет назад
youre a big boy now so I guess you can use these new things called internet search engines you should try them
@yesthatsam
@yesthatsam 6 лет назад
It is not per se as it is not autonomous
@dshopov
@dshopov 5 лет назад
I wonder why there is no "this site uses CSS" notification on every website out there ... Please make it more popular! We need more "news" on every page!
@Caraxian
@Caraxian 5 лет назад
Димитър Шопов because literally every website uses CSS, even if it’s a plain text page
@dshopov
@dshopov 5 лет назад
@@Caraxian same goes with cookies nowadays but ...
@mihajlonesic
@mihajlonesic 6 лет назад
It’s not about who did it first...
@richardvaughn2705
@richardvaughn2705 6 лет назад
Great idea! Rediscover old xss hacks, have everyone download your chrome plugin. Its not like you couldnt just put a keylogger in the plugin right?
@caseykuilman9307
@caseykuilman9307 5 лет назад
You could (theoretically) do so. However, since extensions are not stored as compiled files & such things are quick to be found by researchers it wouldn't last very long. It is also against the law, so I recommend to avoid doing such :).
@OpenKeith
@OpenKeith 4 года назад
@@caseykuilman9307 not if you're a school
@TeDynef
@TeDynef 5 лет назад
Why was is not fixed years ago
@AyoubWellsten
@AyoubWellsten 6 лет назад
Great video bro, never heard of css attack!
@Blessy4543213
@Blessy4543213 6 лет назад
creative is hack born to dare
@joshuafountain
@joshuafountain 6 лет назад
Setting the background of a an input selector isn't keylogging btw
@endy9059
@endy9059 5 лет назад
When an image is grabed it leaves a record.
@caseykuilman9307
@caseykuilman9307 5 лет назад
Not necessarily, but as Endy commented earlier it leaves traces (request logs) at the server, thus revealing to the attacker what the user has typed.
@unknown-yo2tx
@unknown-yo2tx 5 лет назад
can you have an HTML key logger in an extension so it works for all pages?
@caseykuilman9307
@caseykuilman9307 5 лет назад
You could make an extension carry a javascript file to be ran at all times. Yet you would get caught very quickly (extensions carry their full source code), not to mention it is highly illegal.
@mojekonto9287
@mojekonto9287 4 года назад
I remember that in Firefox (around year 2012) it was possible to install an extension that would log all key presses across the entire browser. I got the source code from somewhere on the web, installed it and got terrified. Since that time, I am cautious about any extensions;) I heard it is not possible to run such code anymore in later versions of Firefox, but I haven't checked, no need for it.
@cahill_dave
@cahill_dave 5 лет назад
How did you get the thumbnail for this video to autoplay in my feed?
@neoney
@neoney 5 лет назад
Dave Cahill Its not the thumbnail, its like a preview of a video (new yt function, the poster doesnt do anything to achieve it)
@cahill_dave
@cahill_dave 5 лет назад
kod neexe w sklepie that’s I realized this right after I closed the video lol. Cheers!
@natesamuelson1841
@natesamuelson1841 6 лет назад
I had once been very interested in hacking/Cyber Security but never pursued the interest for lack of experience and the vastness of the field. However, now that I am graduating with a CSCI degree and have some experience in various programming languages this is a lot more feasible. The only reason that this was even brought to my attention was your incredibly informative videos. I am now considering a career path in the field and even a masters degree. This is all thanks to your hard work. I really appreciate what you do. Keep kickin ass!
@edg6779
@edg6779 6 лет назад
Counter strike sorce :D
Далее
can you hack this screenshot service?? - CSCG 2021
22:48
Good vs. Bad Security Tweets
17:43
Просмотров 175 тыс.
Why Is CSS So Weird?
15:07
Просмотров 58 тыс.
Hacking Google Cloud?
21:59
Просмотров 124 тыс.
Hacker Tweets Explained
13:47
Просмотров 159 тыс.
The Website is Down #1: Sales Guy vs. Web Dude
10:24
STOP WASTING YOUR TIME AND LEARN MORE HACKING!
11:35
Просмотров 539 тыс.