Module 6: Cross-Site Scripting Exploitation and Case Study
Cross-Site Scripting - Exploitation
Accessing The Sandbox
Moving the Payload to an External Resource
kali@kali:~$ mkdir xss
kali@kali:~$ cd xss
kali@kali:~/xss$ echo "alert(1)" > xss.js
kali@kali:~/xss$ python3 -m http.server 80
Serving HTTP on 0.0.0.0 port 80 (http://0.0.0.0:80/) ...


Stealing Session Cookies


Stealing Local Secrets

Keylogging
Stealing Saved Passwords


Phishing Users



Case Study: Shopizer Reflected XSS
Getting Started
Discovering the Vulnerability






Loading Remote Scripts







Exploiting Reflected XSS









Last updated