Coder Social home page Coder Social logo

webinfo's Introduction

WebInfo

A program to steal user information through a simple link

Requirements

  • NodeJS 14+
  • Any browser with ES6 support
  • certbot

Installation

Make sure certbot has created the required HTTPS files under /etc/letsencrypt/live/emilien.ca/.

:/WebInfo/src$ npm install

:/WebInfo/src$ npm start

Minimal Example

Here is a list of instructions for a minimal example:

  1. Make sure the server is running:

    :/WebInfo/src$ npm start
    listening on localhost:70
    
  2. Run the interactive shell in a seperate terminal window:

    :/WebInfo/src$ node server.js
    Server already listening on localhost:70. Interactive shell started.
    
  3. Add a new URL entry to the list. This is going to register a new redirection URL.

     > add
     URL: test
     Comment: a minimal example
     Redirection URL: google.com
     Maximum Usage: -1
     Items:
         [-1]       test->google.com: a minimal example
    
     >
  4. Navigate to https://localhost:70/test on a web browser. This simulates a victim clicking a malicious link to this program. You should them be redirected to google.com.

  5. View the information saved.

    > view
    URL: test

    The program should then output something like the following, which includes all the information the program was able to retreive from the victim:

    --------------------------------------------------
    general
        datetimeClient: 2020-12-06, 17:15:38
        userAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.67 Safari/537.36 Edg/87.0.664.55
        referer: [direct navigation]
        online: yes
        language: en-US
        connectionType: 4g
        datetimeServer: 2020-12-06, 17:15:38
        browser: Edge 87.0.664.55
    CPU
        platform: Win32
        cores: 4 cores
        oscpu: [unknown]
        architecture: amd64
    GPU
        renderer: ANGLE (AMD Radeon(TM) Graphics Direct3D11 vs_5_0 ps_5_0)
        vendor: Google Inc.
    RAM: 8 GB
    device
        touchSupport: yes
        vendor: undefined
        model: undefined
        type: undefined
        operatingSystem: Windows 10
    screen
        width: 1536 pixels
        height: 864 pixels
        pixelDepth: 24 bits / pixel
        orientation: landscape
    battery
        charging: no
        level: 63%
    sensors
        absolute: false
        position: stable
        brightness: [access denied]
        proximity: [access denied]
    location
        publicIP: ::1
        location: [not found]
    
    
    
    
    >

Usage

You can register multiple URLs that will be used as a malicious link. Once you register a URL, you can set properties such as its maximum usage or the website it will redirect to when a victim clicks on the malicious link.

Here is a list of commands that can be used within the interactive shell of this program:

  • help: Displays the help page
  • exit: Exits the program
  • add: Adds an item to the list
    • URL: The relative URL of the link that will be created. For example, if URL is test, then the victim will have to open https://localhost:70/test to get their informations stealed. An empty URL will default to a random 5-digit number.
    • Comment: A comment to remember what this URL is used for.
    • Redireciton URL: The URL to which the victim will be redirected to once all their information will have been saved.
    • Maximum Usage: The maximum amount of times that the URL can be used. This number decrements every time the victim opens up the URL in a web browser. Once it reaches 0, the victim will get a timeout error instead of a redirect. Useful if you want to prevent a suspecting victim from investigating what really happened when he/she clicked the malicious link. Entering a negative number will simple decrement to negative infinity, which means that the URL will work until it is deleted using the rm command.
  • rm: Removes an item from the list
    • URL: Enter the URL to remove
  • edit: Edits an item from the list
    • URL: Enter the URL to be edited
    • The program will then ask you the exact same thing as with the add command. If you wish to keep a field the same, just leave it empty. If you wish to modify a field, enter a value and hit enter.
  • list: Lists all the currently registered items
  • view: Shows the information saved from a URL
    • URL: Enter the URL to see the information saved from when a victim clicked a malicious link
  • clr: Clears the information saved from a URL
    • URL: Enter the URL to clear all the information saved

webinfo's People

Contributors

bricktech2000 avatar

Stargazers

 avatar  avatar Ethical Criminal avatar  avatar Negro Bolche avatar TimaFilli avatar

Watchers

 avatar

Forkers

dontupa

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.