Skip to content

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

License

Notifications You must be signed in to change notification settings

Mykhis/Slient-URL-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

URL Exploit Hidden Downloader

URL contamination and muted Java drive-by downloads can occur during various online activities such as browsing websites, opening emails, or interacting with malicious pop-up windows disguised as system error messages.

  • Key Points: User Consent Illusion: Users may appear to have given "consent" for the download, but they are often unaware that malicious software is being downloaded. Drive-By Downloads: While browsing a compromised website, users can fall victim to drive-by downloads, where malicious code is executed without their knowledge, exploiting browser or plugin vulnerabilities. Execution of Malicious Code: The downloaded material can execute harmful code without the user's awareness, leveraging weaknesses in the browser or its plugins. Drive-By Installation: Similar to drive-by downloads, this involves the setup and execution of malicious content by the attacker.
  • Attack Process: Configuration: The attacker configures malicious material to execute the assault. Hosting: The attacker hosts the malicious content on a personal server or compromises a legitimate website to distribute the content. Client Interaction: When the content loads, the attacker analyzes the client's trace to craft code that exploits specific vulnerabilities. Exploitation: The attacker uses these vulnerabilities to initiate the drive-by download attack.
  • Techniques Used: API Exploitation: Exploiting API calls intended for plugins. Shell Code Injection: Writing shell code into memory and using browser or plugin vulnerabilities to execute it, allowing further malicious actions like data exfiltration or malware deployment.

How to Use

Visual Studio :

  1. Open the solution file (.sln).
  2. Select Build Solution from the Build menu or press Ctrl+Shift+B to compile the project.
  3. When the build is complete, select Start Without Debugging from the Debug menu or press Ctrl+F5 to run the project.
  • URL Exploit Builder Now Available

Features

  • URL Contamination (Subtle Java Drive By)
  • Universally Adaptable across Web Browsers
  • Universally Compatible with Java Variants
  • Seamlessly Propagates via Social Media Channels: Facebook, Gmail, Yahoo, Hotmail, and more.
  • URL Contamination is furnished with pre-embedded payloads and an array of shellcode presets, affording you the freedom to select according to your discerning palate.
  • Universally Compatible with Web Servers such as Apache, Xampp, Nginx, IIS, and their ilk.
  • Synchronizes harmoniously with Metasploit and its complete spectrum of post modules.

Photo

image

Disclaimer

This source code is for educational purposes only.

License

This project is licensed under the MIT. For more information, see the License.