Weaponising XSS for Red Teams

by Jesse and Noah | - 4:30pm

Too often, cross-site scripting (XSS) vulnerabilities don’t get the attention they deserve. In many pentest reports, a tester will simply showcase them as a harmless alert(document.domain) proof-of-concept and move on. This downplays the real-world impact of this vulnerability and leaves their full offensive potential largely ignored, especially for red teams aiming to breach hardened external perimeters.

In this talk, we’ll go beyond the browser pop-up to demonstrate a novel application of XSS in modern offensive operations. We’ll break down how a simple frontend bug can become a launching point for advanced phishing campaigns, allowing an adversary to harvest user credentials and gain access to MFA-protected user sessions. You’ll see practical scenarios and demos that highlight just how deadly XSS can be when it’s weaponised with purpose.

To put these techniques in the hands of the community, we’ll also be releasing an open-source tool named Shadow Browser that was designed to supercharge red team phishing ops. It is similar to the popular Evilginx, but very different in practice. If you’re ready to move past the theoretical XSS pop-up alerts and start exploiting its full power, this talk will take you from alert() to a full-fledged Red Team phishing campaign.

About Jesse and Noah

Jesse is a Security Consultant at Tanto Security where he partakes in various red-team and pentesting engagements. He enjoys playing CTFs under the tag “Solopie” and is an active player in the space, contributing to DownUnderCTF in previous years and participating in the International CyberSecurity Challenge as a part of Team Oceania. Noah is a Security Consultant at TantoSec and currently studying a Bachelor’s of Cybersecurity. His interests vary on the week from web projects, learning hardware security, radio, and other various topics from exploring his Twitter feed. He also plays in CTFs on the weekend, playing with Emu Exploit, his university team MQCyberSec and occasionally IrisSec. Additionally, Noah is terrified of speaking in front of 2000+ people 😭

Other talks