From 2dd5e7302f7167d1ffff7e5390eed3ead3f25132 Mon Sep 17 00:00:00 2001 From: zinduolis Date: Sun, 4 Jan 2026 20:55:33 +1000 Subject: [PATCH] provide further progress status and testing errors --- testing/manual_testing_plan.md | 70 +++++++++++++++++----------------- testing/testing_errors.md | 68 +++++++++++++++++++++++++++++++++ 2 files changed, 103 insertions(+), 35 deletions(-) create mode 100644 testing/testing_errors.md diff --git a/testing/manual_testing_plan.md b/testing/manual_testing_plan.md index dc0b97569..e876f2141 100644 --- a/testing/manual_testing_plan.md +++ b/testing/manual_testing_plan.md @@ -30,74 +30,74 @@ Test these modules using **Firefox** on your local Linux VM. They leverage stand | Status | Module Name | Instructions / Description | Cleanup Needed | Comments | | :---: | :--- | :--- | :--- | :--- | -| [x] | **Alert Dialog** | 1. Configure: `Title`, `Message`, `Button name`
2. Click Execute.

_Show user an alert_ | None. | | -| [x] | **BlockUI Modal Dialog** | 1. Configure: `Message`, `Timeout (s)`
2. Click Execute.

_This module uses jQuery BlockUI to block the window and display a message._ | None. | | -| [x] | **Clickjacking** | 1. Configure: `iFrame Src`, `Security restricted (IE)`, `Sandbox`...
2. Click Execute.

_Allows you to perform basic multi-click clickjacking._ | None. | | +| [x] | **Alert Dialog** | 1. Set `Title`, `Message`, and `Button name`.
2. Execute module.
3. Verify alert dialog appears on hooked page with configured text. | None. | | +| [x] | **BlockUI Modal Dialog** | 1. Set `Message` and `Timeout (s)`.
2. Execute module.
3. Verify blocking overlay appears with message.
4. Wait for timeout or use UnBlockUI to remove. | None. | | +| [x] | **Clickjacking** | 1. Set `iFrame Src` to target page for clickjacking.
2. Execute module.
3. Verify page shows overlay for click-based attack.
4. Click as user would to test interaction capture. | None. | | | [x] | **Confirm Close Tab** | 1. Configure: `Confirm text`, `Create a pop-under window on user\`
2. Click Execute.

_Shows a confirm dialog to the user when they try to close a tab._ | Close tab/window. Check for residual pop-unders. | a window pops up, but the text not as per command | -| [NEXT ] | **Create Foreground iFrame** | 1. Click Execute.

_Rewrites all links on the webpage to spawn a 100% by 100% iFrame with a source relative to the selected link._ | Close tab/window. Check for residual pop-unders. | | -| [ ] | **Create Invisible Iframe** | 1. Configure: `URL`
2. Click Execute.

_Creates an invisible iframe._ | None. | | -| [ ] | **Create Pop Under** | 1. Configure: `Clickjack`
2. Click Execute.

_This module creates a new discreet pop under window with the BeEF hook included._ | Close tab/window. Check for residual pop-unders. | | -| [ ] | **Cross-Origin Scanner (CORS)** | 1. Configure: `Scan IP range (C class)`, `Ports`, `Workers`...
2. Click Execute.

_Scan an IP range for web servers which allow cross-origin requests using CORS._ | None. | | +| [x ] | **Create Foreground iFrame** | 1. Execute module.
2. Click "Our Meaty Friends" button to reveal links.
3. Click any link (e.g., "The Browser Exploitation Framework Project homepage").
4. Verify page loads in fullscreen iFrame overlay (check DevTools for `