This lab stores the user's password hash in a cookie. The lab also contains an XSS vulnerability in the comment functionality.
To solve the lab:
stay-logged-in cookie and use it to crack his password.carlos and delete his account from the "My Account" page.wiener:petercarlosThis lab contains an XSS vulnerability, and we need to steal the cookie. Here's the step-by-step guide:
username: wienerpassword: peterstay-logged-in header and copy it. 📋
Take the cookie in the stay-logged-in header and copy it:
d2llbmVyOjUxZGMzMGRkYzQ3M2Q0M2E2MDExZTllYmJhNmNhNzcw
Use Burp Suite's Decoder 🔍 to decode the cookie with Base-64.
