Upload files to "Modules/Knowledge/SANS"
This commit is contained in:
33
Modules/Knowledge/SANS/client_side_exploits.py
Normal file
33
Modules/Knowledge/SANS/client_side_exploits.py
Normal file
@ -0,0 +1,33 @@
|
||||
def get_content():
|
||||
"""
|
||||
Returns structured content for client-side exploitation techniques.
|
||||
"""
|
||||
return [
|
||||
{
|
||||
"title": "Common Client-Side Attack Vectors",
|
||||
"content": """
|
||||
- Web browsers, browser extensions.
|
||||
- Document and image rendering applications.
|
||||
"""
|
||||
},
|
||||
{
|
||||
"title": "Common File Format Attacks",
|
||||
"content": """
|
||||
- Exploits weaknesses in how applications handle file requests.
|
||||
- Examples: PDF, DOC(X), RTF, WMF.
|
||||
"""
|
||||
},
|
||||
{
|
||||
"title": "Malvertising",
|
||||
"content": """
|
||||
- Injecting malicious code into trusted websites.
|
||||
"""
|
||||
},
|
||||
{
|
||||
"title": "Phishing",
|
||||
"content": """
|
||||
- Goals: Click a link, open an attachment.
|
||||
- Vectors: Emails with malicious attachments (e.g., PDF, DOC(X), WMF).
|
||||
"""
|
||||
}
|
||||
]
|
Reference in New Issue
Block a user