Time
4 hours 20 minutes
Difficulty
Intermediate
CEU/CPE
5

Video Description

This brief lesson offers a demonstration in how to use the document cookie command to pull cookies.

Video Transcription

00:04
all right, here. We're in our Callie environment.
00:08
So we see her zero my guy Bones
00:11
Azad
00:14
plus
00:17
document
00:18
that cookie.
00:22
So he hit entering Nothing. Nothing happens.
00:26
Well, Cygnus bit away.
00:32
Oh, so it is working.
00:34
So
00:35
how exactly, uh, going pull these cookies? Maybe.
00:40
Perhaps. Ah, listener of some sort that come in handy. So in our exploitation portion, we will be showing how to set up a listener
00:51
to get cookie documents. So we will be showing you that later on.
00:57
All right. So what was covered? We discussed discovering across the scripting with a map how to deal with Iraq Ni Vega and ex successor. Then I showed some discovering cross site scripting manually. So up next, we're going to show you how to ah, exploit cross ex scripting, happy acting, everyone.

Up Next

Web Application Penetration Testing

In this web application penetration testing course, SME, Raymond Evans, takes you on a wild and fascinating journey into the cyber security discipline of web application pentesting. This is a very hands-on course that will require you to set up your own pentesting environment.

Instructed By

Instructor Profile Image
Raymond Evans
Instructor