Cookie injection procedure
1) Search for an image like "*. asp? Id = x "class with parameter rul
2) Remove "id = x" to check whether the page is normal. If it is abnormal, it indicates that the difference works directly during data transmission.
3) Clear the browser address and enter "javascript: alert (document. cookie =" id = "+ escape (" x "));"
Press Enter to return a dialog box with the content "id = x", and then refresh the page with the original url. If the display is normal,
Indicates that the Code collects data in the format of Request ("ID"). cookies can be used for injection.
4) Repeat the preceding steps to inject the Regular Script Injection judgment statement into the above URL :"
Javascript: alert (document. cookie = "id =" + escape ("x and 1 = 1 ")"
Or
Javascript: alert (document. cookie = "id =" + escape ("x and 1 = 2") is the same as normal Script Injection,
If both normal and abnormal pages are returned, the script system has an injection vulnerability and can be injected with cookies.
5) use the conventional injection statement Construction Method for Injection
From firehalt's BLOG