Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

extend the session hijacker module functionality #295

Open
gustavo-iniguez-goya opened this issue Sep 27, 2015 · 2 comments
Open

extend the session hijacker module functionality #295

gustavo-iniguez-goya opened this issue Sep 27, 2015 · 2 comments

Comments

@gustavo-iniguez-goya
Copy link
Contributor

  • Allow to detect users/pass fields on the URL and on the HTTP header (Authorization:)
  • Save not only the root domain of a cookie, but also all the pages the user is visiting within a URL.
  • Intercept not only web sites with cookies, but also without them (tagging them with an icon of "not cookies" for example).
  • Allow to select which SSL certificate to use.
  • Allow to visit an intercepted page (start a new hijacking session) without stop the current scanning.
  • Allow to intercept HTTPs cookies (if I'm not wrong, the current implementation only redirects https to http).
  • update the list of TLD: we have ~1600 domains (@see getBaseDomain()), but the list has grown up to ~5000 https://publicsuffix.org/list/public_suffix_list.dat
@IwraStudios
Copy link
Member

IwraStudios commented Jul 24, 2016

Allow to visit an intercepted page (start a new hijacking session) without stop the current scanning.

that should be available in csploit2 since it is going to become a webinterface

@IwraStudios
Copy link
Member

Allow to intercept HTTPs cookies (if I'm not wrong, the current implementation only redirects https to http).

That should not be possible since you can't read ssl/https

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants