-
Notifications
You must be signed in to change notification settings - Fork 143
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
autoattack.html trying to fetch soopayload.html on target #46
Comments
|
@sanktjodel : The same behavior here while testing "Hook and Control". When I replace/set Currently, "Hook and Control" is not working, because I don't see any session on the soohooked-Backend. Any hints for this? |
@tomverrecktecheib Can you please confirm that a basic DNS rebinding using the default "First then second" rebinding strategy worked? What browser and OS are you using? |
@sanktjodel : Yes basic DNS rebinding using the default "First then second" works, but throws an 404, because it query for I started an httpd on the victim on 127.0.0.1 and created a simple html-file called On the victim: On the attacker: Thank you. |
It sounds like the DNS rebinding was not successful. Did you try the default "First then second" rebinding strategy with the Simple Fetch Get payload using the Singularity manager interface instead of Hook and Control? It would also help if you could show the browser console output and the server log. |
@sanktjodel : I tried with "Simple Fetch Get" and on the victim's-manager.html, I'm able to see the Victim's console:
Server's console:
What is the purpose of Thank you. |
If you see a request for resource "soopayload.html" on the target service, it means that DNS rebinding did not happen successfully in all likelihood. Specifically, using "Simple Fetch Get" with "First then Second" in "autoattack.html" should dump the index page of the target service in the victim's browser. Similarly using "Simple Fetch Get" with "First then Second" in the interactive manager interface should generate an alert box with the contents of the target service index page. If these simple tests do not work, then "Hook and Control" will not succeed. Deploying a "soopayload.html" file with any contents on the target service will not solve the issue. |
Hi @gdncc , @sanktjodel |
Hi,
I tried to test my simple python app on port 8080 on localhost.
I own a domain and subdomain for this attack.
When I try to load the URL http://rebind.mydomain/autoattack.html, the rebind DNS is working but the simple payload try to fetch my simple python service with GET /soopayload.html which leads to 404...
I set up my config following this video :
https://www.youtube.com/watch?v=R5Y1luRhjbc
And this is the output of my python server :
The text was updated successfully, but these errors were encountered: