Open tcpiplab opened 7 years ago
Tested the XSS link in the HTML file. It successfully stole the admin
user's PHPSESSID
cookie and sent it to the Python listener:
2017-02-11 06:49 AM - 192.168.0.254 Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:51.0) Gecko/20100101 Firefox/51.0
------------------------------------------------------------------------------------------------------------------
Cookie Name Value
------------------------------------------------------------------------------------------------------------------
security ['low']
PHPSESSID ['958o040rdnl9b5flseb5po85p3']
But I made some mistakes in my testing of the next steps. I need to plan it out more carefully:
http://192.168.0.18/dvwa/
But note that the original admin
user must still be logged in with the same PHPSESSID cookie.
This is for xss-reflected-steal-cookie.md. The scenario would be that user A tricks user B into clicking a link containing the XSS code.