This module exploits a Universal Cross-Site Scripting (UXSS) vulnerability present in all versions of Android's open source stock browser before 4.4, and Android apps running on < 4.4 that embed the WebView component. If successful, an attacker can leverage this bug to scrape both cookie data and page contents from a vulnerable browser window. If your target URLs use X-Frame-Options, you can enable the "BYPASS_XFO" option, which will cause a popup window to be used. This requires a click from the user and is much less stealthy, but is generally harmless-looking. By supplying a CUSTOM_JS paramter and ensuring CLOSE_POPUP is set to false, this module also allows running aribrary javascript in the context of the targeted URL. Some sample UXSS scripts are provided in data/exploits/uxss.
- auxiliary/gather/android_stock_browser_uxss:
Ahora arrancaremos msfconsole y cargaremos el exploit con el comando "use":
Ahora, si el usuario no ha cerrado sesión y las cookies siguen siendo validas, podemos utilizarlas para suplantar su identidad mediante un hijacking de sesión.
¿Sencillo verdad? :)
Eso es todo por hoy, nos vemos en el próximo post!
Saludos!
0 comentarios:
Publicar un comentario