Skip to content

Commit

Permalink
Improve reflected XSS
Browse files Browse the repository at this point in the history
  • Loading branch information
jallbrit-cisco committed Jun 27, 2024
1 parent e69cbf5 commit 12a2a55
Showing 1 changed file with 17 additions and 1 deletion.
18 changes: 17 additions & 1 deletion modules/6.md
Original file line number Diff line number Diff line change
Expand Up @@ -73,12 +73,28 @@ At this point, if you've never used Burp Suite before, just spend a minute click

10. Scroll down again to `Redirections`. Under "Follow redirections:", select `Always`.

11. At the top, click `Start Attack`. If you used `john.lst`, you should see pretty quickly that one of the passwords gave a result for "Welcome"... (hint: you already logged in with the admin password earlier...)
11. At the top, click `Start Attack`. If you used `john.lst`, you should see pretty quickly that one of the passwords gave a result that was flagged for the string "Welcome" (hint: you already logged in with the admin password earlier...)

## Exercise X: Reflected XSS

In Firefox, navigate to `http://metasploitable/dvwa`, and click on `XSS reflected` in the left panel. Exploit the text input using XSS.

{% capture text %}
<pre>
&lt;script&gt;alert("pwned!")</script>
</pre>
{% endcapture %}
{% include cheat.html text=text %}

Bonus question: you just XSS'd yourself, which isn't really that great. How could you XSS someone else with this exploit?

{% capture text %}
<p>
The XSS attack is embedded in the URL, so you could send someone a link with your XSS parameters pre-filled in. If they click it when they're logged in, the code will run on their machine.
</p>
{% endcapture %}
{% include cheat.html text=text %}

## Exercise X: Stored XSS


Expand Down

0 comments on commit 12a2a55

Please sign in to comment.