Skip to content

amichael7/python-stegosploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

python-stegosploit

How Stegosploit Works

The exploit code is inserted within the pixels of the image so that the image contains the exploit code. IMAJS then creates a polyglot image that will be read as an image and contains a decoder that will extract and run the javascript exploit.

The exploit that we will use is an Internet Explorer Use-after-free exploit (CVE-2014-0282).

What we have done so far

Highlights:

  • The server can serve images to the VM over 10.0.2.2:5000
  • The jpg.py program can build a polyglot file (valid .html and .jpg)

Checklist

  • Refactor CRC32.pm

  • Refactor PNGDATA.pm

  • Refactor html_in_jpg_ie.pl

  • Refactor pngenum.pl

  • Demo Server

    • Move all static exploit files in demo pages to /static
    • Make sure all static files are passed parsed using template_render
    • Add an image picker for the image_layer_analysis.html (Optional)

References

About

Python port of stegosploit toolkit

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •