mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 04:33:28 +00:00
GitBook: [#3134] No subject
This commit is contained in:
parent
c315f8c82d
commit
23e2c9bb5d
1 changed files with 5 additions and 1 deletions
|
@ -89,7 +89,7 @@ The tool [**https://github.com/taviso/cefdebug**](https://github.com/taviso/cefd
|
|||
Note that **NodeJS RCE exploits won't work** if connected to a browser via [**Chrome DevTools Protocol**](https://chromedevtools.github.io/devtools-protocol/) **** (you need to check the API to find interesting things to do with it).
|
||||
{% endhint %}
|
||||
|
||||
## RCE
|
||||
## RCE in NodeJS Debugger/Inspector
|
||||
|
||||
{% hint style="info" %}
|
||||
If you came here looking how to get [**RCE from a XSS in Electron please check this page.**](../../pentesting/pentesting-web/xss-to-rce-electron-desktop-apps/)****
|
||||
|
@ -124,6 +124,10 @@ ws.send(JSON.stringify({
|
|||
}));
|
||||
```
|
||||
|
||||
### Webdriver RCE and exfiltration
|
||||
|
||||
According to this post: [https://medium.com/@knownsec404team/counter-webdriver-from-bot-to-rce-b5bfb309d148](https://medium.com/@knownsec404team/counter-webdriver-from-bot-to-rce-b5bfb309d148) it's possible to obtain RCE and exfiltrate internal pages from theriver.
|
||||
|
||||
### Post-Exploitation
|
||||
|
||||
In a real environment and **after compromising** a user PC that uses Chrome/Chromium based browser you could launch a Chrome process with the **debugging activated and port-forward the debugging port** so you can access it. This way you will be able to **inspect everything the victim does with Chrome and steal sensitive information**.
|
||||
|
|
Loading…
Reference in a new issue