Okara Cantt - Pakistan's Biggest IT Education Forum
Welcome To OkaraCantt - Pakistan's Biggest IT Education Forum. We Hope You Enjoy Your Visit.

You're Currently Viewing Our Forum As A Guest. This Means You Are Limited To Certain Areas Of The Board And There Are Some Features You Can't Use. If You Join Our Community, You'll Be Able To Access Member-Only Sections, And Use Many Member-Only Features Such As Customizing Your Profile, Sending Personal Messages, And Voting In Polls. Registration Is Simple, Fast, And Completely Free.
Okara Cantt - Pakistan's Biggest IT Education Forum
Welcome To OkaraCantt - Pakistan's Biggest IT Education Forum. We Hope You Enjoy Your Visit.

You're Currently Viewing Our Forum As A Guest. This Means You Are Limited To Certain Areas Of The Board And There Are Some Features You Can't Use. If You Join Our Community, You'll Be Able To Access Member-Only Sections, And Use Many Member-Only Features Such As Customizing Your Profile, Sending Personal Messages, And Voting In Polls. Registration Is Simple, Fast, And Completely Free.
Okara Cantt - Pakistan's Biggest IT Education Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.



 
HomeLatest imagesSearchRegisterLog in

 

 {TUT}COOKIE STEALING{TUT}{NOOB FRIENDLY}}

Go down 
AuthorMessage
Administrator
ADMIN
ADMIN
Administrator


Join date : 2011-04-16
Posts : 75
Points : 8919
Reputation : 5010
Gender : Male
Browser : {TUT}COOKIE STEALING{TUT}{NOOB FRIENDLY}} 218

{TUT}COOKIE STEALING{TUT}{NOOB FRIENDLY}} Empty
PostSubject: {TUT}COOKIE STEALING{TUT}{NOOB FRIENDLY}}   {TUT}COOKIE STEALING{TUT}{NOOB FRIENDLY}} I_icon_minitimeFri Nov 25, 2011 10:24 am

Okay, before we can start putting our hands in the cookie jar, we must learn about cross-site scripting, usually abbreviated as XSS.

XSS is possible because of insecure coding by a coder. By giving us a means to interact with a site (such as a search box, or posting a comment) and not securing it, they leave it vulnerable to code injection. Let's give an example first, then I'll explain. Here is an example site:


Now, we see that this site has a search box. Normally this search box is meant to handle normal queries, but lets see what happens when we try to inject some code. Type the following into the search box: <script>alert("VULNERABLE")</script>.

Now when you search for it, you'll see an alert box pop up with the word 'VULNERABLE' in it. This means the search box is vulnerable to code injection, and is vulnerable to XSS. Now here's why it works.

If you check the source code of the web page, you'll see that the our query (the injection code) was directly echoed into the source, without filteration. Normally, this is okay because most search queries are normal words, but since it echoed our script directly into the source, our browser interprets it as if that script was a part of the overall webpage, and therefore executed it. Now normally, who cares if I can echo little alert boxes, right? Wrong. Especially because this site has a user database that can be compromised

The script I executed was a simple block of JavaScript. Read more about JavaScript here.


There are a variety of ways to use XSS to grab cookies, I'll go over one.

Now, suppose we're gonna do an XSS attack on the site I posted at the begining. We need to have a place to store the cookies we get, so lets get some quick webhosting. We will need to make two files on our site, a text file, and a PHP file. Let's pretend our site is poopsey.com. Now, we make a file called log.php and put the following code in:


This is some PHP code that will write the some information about the slave, such as the IP, browser, etc. along with the cookie into the second file we will make, called cookies.txt. Just make a text file called cookies.txt and leave it empty. I could go in depth with exactly what all this code means, but it's better if you read up on PHP yourself, I can't spoon-feed everything you know. You can read up on PHP here.


Now comes the fun part. We don't need our own cookies, we need other users' cookies. So we look at the first ever XSS vulnerability check we did on current.com. Look at it.


The part I bolded (%3Cscript%3Ealert%28%22VULNERABLE%22%29%3C%2Fscript%3E) is the code that we had entered (<script>alert("VULNERABLE")</script>). We replace this code with the following code:


Now the final URL looks like:


Now send this link to someone logged into the current.com site. When they click this link, it will take them to poopsey.com/log.php, write all their info, then redirect them back to current.com. Now all you have to do is take the slave's cookie and replace your own cookie with the slave's cookie. Then you have access to the slave's account for some time, usually until the login session expires.

Now that I think about it, I never explained exactly what a cookie was, or how to replace your cookies with the slave's. Oh well, I guess that means someone has to go Googling and pursue the information themselves

Thanks for reading, and I hope you learned something

Any kind of Thanks will be appreciated....
Back to top Go down
http://www.okaracantt.com
 
{TUT}COOKIE STEALING{TUT}{NOOB FRIENDLY}}
Back to top 
Page 1 of 1
 Similar topics
-
» ★✮★ [TUT] Complete TrueCrypt Tutorial [MUST-SEE][NOOB-PROOF]★✮★
» [TuT] How to Flood Facebook Wallpost/Comment/Message [With Pictures] [Noob Friendly] (Facebook Flooding)

Permissions in this forum:You cannot reply to topics in this forum
Okara Cantt - Pakistan's Biggest IT Education Forum  :: Hacks, Exploits, and Various Discussions :: Hacking Tutorials-
Jump to:  

Chat Room OKaraCantt.CoM

Free forum | ©phpBB | Free forum support | Report an abuse | Forumotion.com