Hacker Newsnew | past | comments | ask | show | jobs | submit | quasarj's commentslogin

Wait, how are you supposed to say mate?

Mah-tay

WHAT D:


lol, no thank you

Being dead has no impact on the truth, actually.

And that’s not true! He did want to keep the editor stable and available for many platforms and compatible with vi. Rejected proposals break one of these rules.

True, but the point could have been made in a more tactful way, and it didn't add anything useful to the discussion anyway.

I call it the "British comedy effect". And it's awful, and if you like it, you're awful too, sorry to say.


One of these days I'm gonna have to learn why cross-site scripting even matters, especially with modern browsers restricting a script's access to anything local


The attacker can do anything using your session.

The "Hello world" examples always show using it to steal your cookies, which obviously doesn't work now when nearly every site uses the "httpOnly" flag which makes the cookie inaccessible to JavaScript, but really, stealing your session isn't necessary. They just have to make the XSS payload run the necessary JavaScript.

Once the JavaScript is running on the page, all bets are off. They can do ANYTHING that the page can do, because now they can make HTTP requests on your behalf. SOP no longer applies. CSRF no longer protects you. The attacker has full control of your account, and all the requests will appear to come from YOUR browser.


If I can run my own code but in your context, I can pull in malicious scripts.

With those (all these are "possible" but not always, as usual, it depends, and random off the top of my head):

- I can redirect you to sites I control where I may be able to capture your login credentials.

- May be able to prompt and get you to download malware or virus payloads and run them locally.

- Can deface the site you are on, either leading to reputational harm for that brand, or leading you to think you're doing one thing when you're actually doing another.

- I may be able to exfiltrate your cookies and auth tokens for that site and potentially act as you.

- I might be able to pivot to other connected sites that use that site's authentication.

- I can prompt, as the site, for escalated access, and you may grant it because you trust that site, thereby potentially gaining access to your machine (it's not that the browsers fully restrict local access, they just require permission).

- Other social engineering attacks, trying to trick you into doing something that grants me more access, information, etc.


It's a good question and one mature orgs ask themselves all the time. As you can see from most of the replies here, XSS captures the fancy of the bug bounty crowd because there are tonnes of hypothetical impacts so everyone is free to let their imagination run wild when arguing with triagers. It's also the exploit nonpareil for nerdsnipers because sanitisation is always changing and people get to spend their days coming up with increasingly ridiculous payloads to bypass them. In reality, find me one active threat actor who has compromised a business lately with an XSS. It's not an irrelevant risk, but the attention it gets is wildly disproportionate to its real-world impact.


You log in to goodsite.com

goodsite.com loads a script from user-generated-content-size.com/evil.js

evil.js reads and writes all your goodsite.com account data.


Uh-oh


How can he not include a video of it working? D:


i think its just people being out of touch with reality. perhaps engineering minds not thinking enough product. its too commonplace for me to even complain about. someone builds something primarily visual - a robot, a GUI application, etc. and links to their github/etc but they ensure that there are no visuals included.


This is far from primarily visual, but I do understand your point. I could not take videos unfortunately. I mentioned it in other places, but this project took so long, I just wanted to put it out there and get some feedback. I'm glad that people are this receptive to it, and I hope someone would take the project over!


You built all this and saw a mouse rolling on a ball playing Doom, but didn't record it?


> I could not take videos unfortunately

Why?


At least there are 3d models of the dispositive and some pictures !



That's the previous setup from four years ago, where the rats just run down a straight corridor.


This is the new YouTube, though not much on the account

https://www.youtube.com/shorts/mq2yfy23j7s


In the results section it looks like there's supposed to be an image of it but the link "placeholder_rat_playing.png" returns a 404 :(


because there's nothing to show

  We reached the point of rat habituation but didn’t start training. Our rats (Todd, Kojima, Gabe) aged out before full testing. The setup works, but behavioral validation is pending.


Same for me, though I'm trying to change it. Tests are great, but it's really really hard to add them to a project that didn't start with them.


For better, my friend


This is, in fact, what git was made for


That's a (bad) joke, right?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: