.:WAN Browser Hijacking :.
Asalamualaikum Frndzz I am Malik Ubi and today we will learn about WAN Browser Hijacking lets play the Game :-D
.:WAN Browser Hijacking :.
We will learn how Xss will work when we combine it ok lets go
XSS injections can combine with other techniques, for example to take control of the browsers of users in a WAN.
The scenario is as follows:-
- The attacker breaks into the local network/s victim/s.
- Poison the network dns chache.
- Generate a web page "vulnerable" to impersonate another routine (google.com).
- Users who request google.com, actually connect to the attacker's server due to "poison" the DNS tables.
- The attacker executes "Beef" as a framework on own machine and wait for connecting Victims.
- When a victim executes the malicious code (hook), the attacker immediately receive a notice in the framework of having a -zombie- online.
- As the victim continues its navigation, the attacker can perform various techniques in a very simple and almost automated through the framework.
Now lets discuss jani pRactical method here it is :-D
Practical method of attack:
1) The attacker breaks into the local network/s victim/s
Whether he knows the password, or because it gets to crack the encryption algorithm (WEP / WPA ..).
2) DNS poisoning the network chache
Through the free software tool "Ettercap (http://ettercap.sourceforge.net/), the attacker can send replies DNS (Domain Name Server) "spoofed" to get redirect requests of victims to a server under control (local or remote).
3) Generate a web page "vulnerable" to impersonate another routine (google.com)
4) Users requesting google.com, actually connect to the attacker's server due to "poison" the DNS tables.
The attacker has inserted into the "fake" google site a XSS code that opens a channel of communication back and forth with the victim, through a framework.
5) The attacker executes "Beef" as a framework on own machine and wait for connecting victims. Through the "hook": beefmagic.js.php
6) As the victim continues its navigation, the attacker can perform various techniques in a very simple and almost automated way through the framework.
Thats all hope u liked my tutorial on Wn Browser Hijacking
#Mαℓïк_Цвï
Post A Comment
No comments :