Добавить
Уведомления

DNS Rebinding in 3 Seconds & Hijack Target Browser to Access Internal Network

Demo showing DNS rebinding in 3 seconds using the "Multiple answers" strategy (https://github.com/nccgroup/singularity/wiki/Using-Singularity) with an interval of 1 second. The "Hook and Control" payload (https://github.com/nccgroup/singularity/wiki/Payloads) is used to hijack the victim browser and use it to access inaccessible resources on the localhost. In this case we are accessing the Jenkins instance running on the victim's localhost:8080. Singularity of Origin: https://github.com/nccgroup/singularity

12+
16 просмотров
2 года назад
12+
16 просмотров
2 года назад

Demo showing DNS rebinding in 3 seconds using the "Multiple answers" strategy (https://github.com/nccgroup/singularity/wiki/Using-Singularity) with an interval of 1 second. The "Hook and Control" payload (https://github.com/nccgroup/singularity/wiki/Payloads) is used to hijack the victim browser and use it to access inaccessible resources on the localhost. In this case we are accessing the Jenkins instance running on the victim's localhost:8080. Singularity of Origin: https://github.com/nccgroup/singularity

, чтобы оставлять комментарии