Obtaining Session Identifiers without User Interaction

Part 1: Simulate the attacker

Navigate to http://xss.htb.net and, using Web Developer Tools (Shift+Ctrl+I in the case of Firefox), notice that the application uses a cookie named auth-session most probably as a session identifier.

Now fire up Wireshark to start sniffing traffic on the local network as follows.

eldeim@htb[/htb]$ sudo -E wireshark

You will come across the below.

Right-click "tun0" and then click "Start capture"

Part 2: Simulate the victim

Navigate to http://xss.htb.net through a New Private Window and login to the application using the credentials below:

  • Email: heavycat106

  • Password: rocknrol

This is an account that we created to look into the application!

Inside Wireshark, first, apply a filter to see only HTTP traffic. This can be done as follows (don't forget to press Enter after specifying the filter).

Navigate to Edit -> Find Packet

Left-click on Packet list and then click Packet bytes

Select String on the third drop-down menu and specify auth-session on the field next to it. Finally, click Find. Wireshark will present you with the packets that include an auth-session string.

The cookie can be copied by right-clicking on a row that contains it, then clicking on Copy and finally clicking Value.

Part 4: Hijack the victim's session

Back to the browser window using which you first browsed the application (not the Private Window), open Web Developer Tools, navigate to storage, and change your current cookie's value to the one you obtained through Wireshark (remember to remove the auth-session= part).

Last updated