Walkthrough 1889
Walkthrough 1889
URL https://attackdefense.com/challengedetails?cid=1889
Important Note: This document illustrates all the important steps required to complete this lab.
This is by no means a comprehensive step-by-step solution for this exercise. This is only
provided as a reference to various commands needed to complete this exercise and for your
further research on this topic. Also, note that the IP addresses and domain names might be
different in your lab.
Step 1: Start the terminal and check the IP address of the machine.
The IP address of the attacker machine is 192.94.37.2, the target machine will be located at IP
address 192.94.37.3
URL: http://192.94.37.3/index.php?page=dns-lookup.php
Step 5: Enter any text to “Hostname/IP” textfield and click on "Lookup DNS"
Step 9: Enter any text to “Hostname/IP” textfield and click on "Lookup DNS". The request will
be intercepted by burp suite.
Step 10: Pass the URL to XSSER. Replace “HelloWorld” with “XSS”, this is done so that
XSSer will substitute payload in place of "XSS" string.
Step 13: In Burp Suite, replace the POST parameters with the final attack payload and forward
the request.
URL: http://192.94.37.3/index.php?page=user-poll.php
Step 16: Copy the URL, replace the nmap value with "XSS" and pass it to XSSer
URL:
http://192.94.37.3/index.php?page=user-poll.php&csrf-token=&choice=nmap&initials=jd&user-p
oll-php-submit-button=Submit+Vote
Step 18: Open the final attack link to trigger the XSS vulnerability in firefox browser.
URL:
http://192.94.37.3/index.php?page=user-poll.php&csrf-token=&choice=%3Cscript%3Ealert%281
%29%3C%2Fscript%3E&initials=jd&user-poll-php-submit-button=Submit+Vote
References