Skip to content

VHackenstance/code_injector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CODE INJECTOR

This script does not work with HTTPS sites, which is pretty much every site now. Even the few sites left that are not HTTPS, such as bing.com, it will not work due to HSTS (HTTP Strict Transport Security) and Certificate Pinning. I am building it as a scaffold, as with every project here, for when I implement onPath for HTTPS.

Process - Locally

1. Set the iptables rules

  1. Set IP Table rules
    sudo iptables -I INPUT -j NFQUEUE --queue-num 0 --queue-bypass

    sudo iptables -I OUTPUT -j NFQUEUE --queue-num 0 --queue-bypass
  2. Afterwards, clear the iptables
    sudo iptables --flush
  3. Check the tables have been flushed.
    sudo iptables -L
    The chains, or table, of values should be empty.

Setting the iptables can now be run by a script

sudo python ./Utilities/set_iptables.py -s [True/False/Omit] -n [number/omit] -f [True/False/Omit]

  • -s, --set, is setiptables, do you want to set iptables True or False
    If you do not want to set just leave blank.
  • -n, --number, is number, specify the table number, default 0
    If you do not want to set just leave blank.
  • -f, --flush, is flush, do you want to flush(unset/clear) iptables True or False
    If you do not want to flush just leave blank.
    Or, you can place of a value of False.

About

**8** a: Stop packet encoding HTML. b: Inject code into website. c: set and flush iptables.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages