Session Stealing (Remote Reflected XSS)

In this lab, you will learn how to launch a remote reflected XSS attack using phishing and you wlll also learn how to steal session IDs from a cookie. You will learn to use Uniform Resource Locator (URL) to encode characters using a web page in Ice Weasel.  

outcomes:

 In this lab, you will learn to: 

  1. Use phishing to launch a remote reflected XSS attack.
  2. Use the Cookies Manager to steal a session ID in a browser. 

videos:

Before you start this lab, review these videos.

Phishing Attack

Setting up a Collection Server

Falling Victim to the Attack

Session Stealing

Overview

Session IDs are long randomized values used to uniquely identify a user with an application. If a session ID happens to get stolen, the result could lead to unauthorized access. In this lab, we will demonstrate session stealing, where Bob the hacker is able to obtain Alice the administrator’s session ID through a remote reflected XSS attack. He will then use a Firefox plugin to steal Alice’s session.

image001.jpg

Session Stealing

Key terms and descriptions

querystring
A common and insecure way to submit data between URL requests is called a querystring. A querystring is added to the end of a URL and begins with a ?
Cross-Site Scripting
Cross-Site Scripting (XSS) is a type of injection attack that involves exploitations through code.
Phishing attack
Phishing is a social engineering technique that uses email, phone, and text messaging by posing as a legitimate email, phone call, and text message to get users to give up their user IDs, passwords, or their personal information that can be used by attackers to gain access to systems.
Remote reflected XSS
A remote reflected XSS has two characteristics:

Insertion only occurs within the client-side file.
Information is not reflected back to the local user. Instead, the information is sent to a specific location.