Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

JS/HTML injection via SSID #90

Open
jn4kr opened this issue Mar 17, 2019 · 5 comments
Open

JS/HTML injection via SSID #90

jn4kr opened this issue Mar 17, 2019 · 5 comments
Labels

Comments

@jn4kr
Copy link

jn4kr commented Mar 17, 2019

As you can see it's possible to inject HTML/Javascript in the attack page via the ssid.

Steps to reproduce

  1. Create a beacon with the tag you wan't to inject as SSID (e.g. <svg onload="alert('1')"/> )
  2. Select the beacon as target
  3. Switch to the attack page

Screenshots

scan

attack

@bddvlpr bddvlpr added the bug label Mar 17, 2019
@minanagehsalalma
Copy link

@jn4kr ...
Does android even process these WiFi names in the available wifis list ?!

@jn4kr
Copy link
Author

jn4kr commented Mar 20, 2019

Yeah. But i think it's off topic, so I'll sent you a mail about this topic.

@bddvlpr
Copy link
Collaborator

bddvlpr commented Mar 21, 2019

Project is kinda dead but once i really don’t know what to do, i’ll think about it.

@kingdevnl
Copy link
Collaborator

We might be able to strip out all HTML code using a REGEX?

@ghost
Copy link

ghost commented Oct 31, 2019

Check thsi out: https://code-examples.net/en/q/129e949

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants