-
Notifications
You must be signed in to change notification settings - Fork 55
Using The Cookie Theft Module
Munir Njiru edited this page Apr 8, 2016
·
2 revisions
This module aims to make it easier to give potency to a stored XSS. The simple process followed in creating an attack is as below :
- Visit a site identify stored XSS Vulnerability
- Identify a page you would love to test access to e.g. http://victim.com/admin/index.php
- Go back to your mth3l3m3nt framework & in the CTDB tab create campaign
- Feed it the page you would love to test access to because this will determine whether the current cookie can be used to access that page , it will be downloaded for you so that when you view the html you will tell whether it was successfully in the page or not.
- Once you create a campaign , you will get a link to your hooking script a simple example will be provided but feel free to hook your script differently it will still work.
- Wait for the target to visit the page & the information will be sent back to you & stored in your db , pages that you targeted will also be downloaded to your server.
- Open your browser & load the target site , replace the cookie you have with the one you got in your DB then try access the target page after that , if successful, you’re welcome.
Watch a video of this in action below:
Developed by Munir Njiru