Hijack with cookies

User Tapermonkey

open Wireshark

set the filter to http cookies

Test as victim on another machine

Log in

username - username is username / password is password

do some banking

Back to being the bad guy

  • stop the recording

  • check first http packet

  • then Hypertext Transfer Protocol

  • then cookie

  • you want the JSESSIONID

  • Expland this

  • right click on the expanded JSESSION and copy 'as Printable Text'

Go back to the online banking website

Test as the victim on another machine

  • Press 'Alt + C'

  • Paste in cookie

  • Refresh the page

  • then we are logged in!

Last updated