All Projects → benso-io → Posta

benso-io / Posta

🐙 Cross-document messaging security research tool powered by https://enso.security

Programming Languages

javascript
184084 projects - #8 most used programming language

Labels

Projects that are alternatives of or similar to Posta

Learn Web Hacking
Study Notes For Web Hacking / Web安全学习笔记
Stars: ✭ 2,326 (+1526.57%)
Mutual labels:  hacking
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1248.25%)
Mutual labels:  hacking
Enteletaor
Message Queue & Broker Injection tool
Stars: ✭ 139 (-2.8%)
Mutual labels:  hacking
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-8.39%)
Mutual labels:  hacking
Cr3dov3r
Know the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+1088.81%)
Mutual labels:  hacking
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1175.52%)
Mutual labels:  hacking
Dnstricker
A simple dns resolver of dns-record and web-record log server for pentesting
Stars: ✭ 128 (-10.49%)
Mutual labels:  hacking
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-0.7%)
Mutual labels:  hacking
Intelspy
Perform automated network reconnaissance scans
Stars: ✭ 134 (-6.29%)
Mutual labels:  hacking
Wprecon
WPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-5.59%)
Mutual labels:  hacking
Threadboat
Program Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-7.69%)
Mutual labels:  hacking
Dark Fantasy Hack Tool
DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-8.39%)
Mutual labels:  hacking
Openvehiclediag
A rust based cross-platform ECU diagnostics and car hacking application, utilizing the passthru protocol
Stars: ✭ 135 (-5.59%)
Mutual labels:  hacking
H8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1412.59%)
Mutual labels:  hacking
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-2.1%)
Mutual labels:  hacking
Evil Winrm
The ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1474.13%)
Mutual labels:  hacking
Arduino Fastled Music Visualizer
An Arduino based music visualizer using the FastLED library and a strip of individually addressable LEDs
Stars: ✭ 134 (-6.29%)
Mutual labels:  hacking
Dailyhack
🐱‍💻 Tiny Tiny Hacks we use in our daily life.
Stars: ✭ 142 (-0.7%)
Mutual labels:  hacking
Ntlmscan
scan for NTLM directories
Stars: ✭ 141 (-1.4%)
Mutual labels:  hacking
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-5.59%)
Mutual labels:  hacking

Posta


enso.security - Posta

Posta is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit postMessage vulnerabilities, and includes features such as replaying messages sent between windows within any attached browser.

Main Page

Prerequisites

  • Google Chrome / Chromium
  • Node.js (optional)

Installation

Development Environment

Run Posta in a full development environment with a dedicated browser (Chromium):

  1. Install Posta
    git clone https://github.com/benso-io/posta
    cd posta
    npm install
    
  2. Launch the dedicated Chromium session using the following command:
    node posta <URL>
    
  3. Click on the Posta extension to navigate to the UI

Dev mode includes a local web server that serves a small testing site and the exploit page. When running in dev mode, you can access the exploit page at http://localhost:8080/exploit/

Chrome Extension

Run Posta as a Chrome / Chromium Extension:

  1. Clone the repo:
    git clone https://github.com/benso-io/posta.git
    
  2. Navigate to chrome://extensions
  3. Make sure Developer mode is enabled
  4. Click on Load unpacked
  5. Choose the chrome-extension directory inside Posta and upload it to your browser
  6. Load the extension
  7. Pin the extension to your browser
  8. Browse to the website you would like to examine
  9. Click on the Posta extension to navigate to the UI

Tabs

In the Tabs section we can find our main Origin, with the iframes it hosts and communicates with through the session. We can choose the specific frame by clicking on it, and observe the postMessages related to that frame only.

Tabs

Messages

In the Messages section, we can inspect all postMessage traffic being sent from the origin to its iframes, and vice versa. We can select specific communication for further examination by clicking on it. The Listeners area presents the code which is in charge of handling the communication, we can click and copy its contents for JS code observation.

Messages Listeners

Console

In the console section, we can modify the original postMessage traffic, and replay the messages with the tampered values which will be sent from the Origin to its iframe.

We should make tests and see if we can affect the behavior of the website by changing the postMessage content. If we manage to do so, it's time to try and exploit if from a different Origin, by clicking "Simulate exploit".

Console Buttons

Exploit

Click on the "host" button inorder to navigate to the exploitation window.

Host

In the Exploit section, Posta will try and host the specified origin as an iframe in order to initiate postMessage communication. Most of the time we won't be able to do so, due to X-Frame-Options being enabled on the origin website.

Therefore, in order to continue with our exploitation, we'll need to gain communication reference with our Origin by initiating the window.open method, which can be achieved by clicking on "Open as tab".

We have the console to our right which will help us modify and craft our specified payloads and test them in Cross-Origin Communication, initiated by clicking on the Exploit button.

Exploit Content

Authors

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].