As in the previous post - this post expands on the process in which you send information entered into a webpage to an attacker hosted site. In this example you are exploiting a DOM based XSS vulnerability which means that the vulnerability is exploited entirely on the user/victim side (before interaction with the site/server). You … Continue reading XSS DOM Exploitation
I've seen many tutorials over the last few months regarding the good old: alert('XSS') piece of XSS, but in essence this does very little for you - it just proves that the site is vulnerable to XSS. So a good way to really exploit and make use of a persistent XSS vulnerability is to do … Continue reading Persistent XSS and how to really exploit it.
This is just an example and can be manipulated and played with as you please, but I keep forgetting the format and would like to quickly reference this when required - so it's for me...it's for you too, but it's for me..too: 🙂 <img src='roadtonowhere' onerror="alert('XSS');" />
Another nice tool in the Kali arsenal is called fierce: fierce -dns website.domain This command will uncover a massive list of DNS entries related to the domain in question. You can also add the target DNS server when making requests: fierce -dns website.domain -dnsserver ns.domain.domain
Another great tool I recently came across is the subbrute tool. I know that dirb and dirbuster can help you enumerate the various paths for a URL/domain, but this tool lets you go the other way by discovering the subdomains. To install the tool on Kali: git clone https://github.com/TheRook/subbrute.git Then to run it you only … Continue reading DNS Subdomain Enumeration
I just learned of a new tool for fingerprinting a website: WHATWEB (Using Kali) It's as easy as typing the apps name followed by the URL/IP: whatweb -v website.domain (or the IP of the server hosting the site - you can even add multiple URLs/IPs) The best thing about this tool as the way in … Continue reading Whatweb for Web fingerprinting
I've been trying to get Owasp ZAP to work on my Kali test machine. but I kept getting an error that I need to upgrade my Java: "ZAP requires a minimum of Java 7 to run, found 1.6.0_36" So it seems straight forward enough, just update Java... 🙂 Here's how: Download the latest Java SE … Continue reading Owasp ZAP not working on Kali?