Cours

This module focuses on identifying and exploiting CSRF and XSS vulnerabilities in modern web applications, delving into the intricacies of contemporary defense mechanisms and techniques to circumvent them. Specifically, we will craft potent XSS payloads to achieve engagement objectives, such as data exfiltration, victim impersonation, and execution of state-changing actions within a web application. Additionally, we will learn how to enumerate and exploit vulnerabilities in web applications within victims' internal networks.

In more detail, this module covers the following:

  • CSRF Exploitation:

    • What is the Same-Origin policy?

    • What is Cross-Origin Resource Sharing (CORS)?

    • Exploitation of CORS misconfigurations

    • Bypassing weak CSRF defenses

  • Exploiting CSRF via XSS

    • Exfiltrating data from the victim's session

    • Performing state-changing actions from the victim's session

    • Enumerating internal web applications

    • Exploiting internal web applications

    • What is a Content-Security Policy (CSP)?

    • Bypassing weak CSPs

    • Bypassing weak XSS filters

This module is broken into sections with accompanying hands-on exercises to practice each of the tactics and techniques we cover. The module ends with a practical hands-on skills assessment to gauge your understanding of the various topic areas.

You can start and stop the module anytime and pick up where you left off. There is no time limit or "grading", but you must complete all of the exercises and the skills assessment to receive the maximum number of cubes and have this module marked as complete in any paths you have chosen.

As you work through the module, you will see example commands and command output for the various topics introduced. It is worth reproducing as many of these examples as possible to reinforce further the concepts presented in each section. You can do this in the PwnBox provided in the interactive sections or your virtual machine.

Last updated