Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
For 802.11 and bluetooth security people alike. Latest trends, attack surface issues, and prevention. How wireless security is becoming the new vector to hacking corporate websites and applications. 

Current Page: 1 of 1
Results 1 - 3 of 3
7 years ago
a_rager
That's because Anton is behind the curve this week with real work and hasn't uploaded it yet ;) Will try to push it this weekend. The new version just fixes a couple bugs and allows file:// url hijacks with file:// based XSS (like sage or perhaps PDF XSS with a known local file PDF some clever vector hacking).
Forum: XSS Info
7 years ago
a_rager
When you change the port to something besides 80, it needs to be reflected in the $code_server URL as well (XSS-Proxy isn't smart enough to figure it out for you...). In your case, set $code_server="http://localhost:81" and the hijack should work. I'll be uploading a newer version later today that fixes some bugs and allows file:// URL hijacks. Still doesn't add the portnum to the U
Forum: XSS Info
7 years ago
a_rager
As a couple have posted, it depends what you want to do. For longer distance intercept (monitor mode) and links, I like prism2/2.5 cards (Senao) as they are avail with Cisco-style mmcx antenna connectors and are senstive recieve as well as strong transmit. I like Linux-wlan-ng drivers with these cards, but hostap works well too. There may be cards with slighly better rx sensitivty, but overall
Forum: Wireless Security
Current Page: 1 of 1