Ready for the real environment experience?
In this lab, you will conduct an XSS attack through a DVWA (Damn Vulnerable Web Application) and exploit a vulnerability to hijack a user's browser session cookie.
Upon completion of this lab, you will be able to:
- Navigate through DVWA to perform an XSS attack to retrieve a session cookie
This lab is intended for:
- Individuals who want to learn how to perform XSS attacks through websites
- Security engineers who want to understand the security level of their websites to avoid XSS attacks
- People who want to know how an XSS attack can be performed
This lab has no prerequisites.
July 9th, 2020 - Enabled direct browser RDP connection for a streamlined experience
About the Author
Richard Beck is Director of Cyber Security at QA. He works with customers to build effective and successful security training solutions tailored for business needs. Richard has over 15 years' experience in senior Information Security roles. Prior to QA, Richard was Head of Information Security for an organisation who underpin 20% of the UK's Critical National Infrastructure. Richard also held Security and Technical Management posts in the Defence, Financial Services and HMG. Richard sits on a number of security advisory panels and previously chaired the Communication Industry Personnel Security Information Exchange (CPNI). Richard is also a STEM Ambassador working to engage and enthuse young people in the area of cyber security. Providing a unique perspective on the world of cyber security to teachers and encourage young people to consider a career in cyber security.