New options for optical exfil payload (#317)

This commit is contained in:
bg-wa 2018-01-27 15:24:58 -08:00 committed by Sebastian Kinne
parent 81e6d536dd
commit 920ff7fa67
2 changed files with 13 additions and 4 deletions

File diff suppressed because one or more lines are too long

View File

@ -12,11 +12,20 @@
# and open a browser, to exfiltrate data Using QR Codes and a video
# recording device.
#
# Optional html params:
# base64: Passing a base64 string to this param will auto-start processing QR Codes.
#
# playback: Passing the string "finish" to this param will auto-play the results,
# when QR codes finish rendering.
#
# Example:
# Ln65: Q STRING firefox "$target_html?playback=finish&base64=my_long_string"
#
# | Attack Stage | Description |
# | ------------------- | ---------------------------------------- |
# | SETUP | Open vi |
# | ATTACK | Writing HTML |
# | FINISH | Browser Ready |
# | FINISH | Browser Ready/Processing |
#
ATTACKMODE HID