Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Inconsistent, fails with multiple cookie values #1

Open
DanMcInerney opened this issue Feb 10, 2014 · 0 comments
Open

Inconsistent, fails with multiple cookie values #1

DanMcInerney opened this issue Feb 10, 2014 · 0 comments

Comments

@DanMcInerney
Copy link
Owner

When inserting multiple cookie values the server will send a response, but the browser will never load the page since the attacker's machine never seems to send TCP ACKs back to the server to let it know that its received data. Wondering if this has something to do with sequence numbers or the handshake. The modified packet is identical to modified packets from tools like Burp suite or Tamper Data firefox extensions so I'm not sure why it's failing.

This script works by running a sniffer in one thread sniffing the victim's traffic, the main thread continuously ARP poisoning the victim, and another thread to intercept and modify the outgoing requests of the attacker should the request be to a site that cookiejack has stored the cookie data from. The actual injection and modifications are on line 139 for those interested.

About the only time I can get this to work is if you strip out all the cookie data except for the most important, like PHPSESSID=98f4389f489fh438. Otherwise the attacker's machine won't load the page.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant