Session Hijacking
Session Hijacking Example
Configurate the vHost
eldeim@htb[/htb]$ IP=ENTER SPAWNED TARGET IP HERE
eldeim@htb[/htb]$ printf "%s\t%s\n\n" "$IP" "xss.htb.net csrf.htb.net oredirect.htb.net minilab.htb.net" | sudo tee -a /etc/hosts
Part 1: Identify the session identifier

Part 2: Simulate an attacker

Last updated