Добавить
Уведомления

DNS Rebinding in 3 Seconds & Hijack Target Browser to Access Internal Network

Demo showing DNS rebinding in 3 seconds using the "Multiple answers" strategy (https://github.com/nccgroup/singularity/wiki/Using-Singularity) with an interval of 1 second. The "Hook and Control" payload (https://github.com/nccgroup/singularity/wiki/Payloads) is used to hijack the victim browser and use it to access inaccessible resources on the localhost. In this case we are accessing the Jenkins instance running on the victim's localhost:8080. Singularity of Origin: https://github.com/nccgroup/singularity

12+
14 просмотров
2 года назад
9 февраля 2024 г.
12+
14 просмотров
2 года назад
9 февраля 2024 г.

Demo showing DNS rebinding in 3 seconds using the "Multiple answers" strategy (https://github.com/nccgroup/singularity/wiki/Using-Singularity) with an interval of 1 second. The "Hook and Control" payload (https://github.com/nccgroup/singularity/wiki/Payloads) is used to hijack the victim browser and use it to access inaccessible resources on the localhost. In this case we are accessing the Jenkins instance running on the victim's localhost:8080. Singularity of Origin: https://github.com/nccgroup/singularity

, чтобы оставлять комментарии