34 lines
904 B
Python
34 lines
904 B
Python
def get_content():
|
|
"""
|
|
Returns structured content for client-side exploitation techniques.
|
|
"""
|
|
return [
|
|
{
|
|
"title": "Common Client-Side Attack Vectors",
|
|
"content": """
|
|
- Web browsers, browser extensions.
|
|
- Document and image rendering applications.
|
|
"""
|
|
},
|
|
{
|
|
"title": "Common File Format Attacks",
|
|
"content": """
|
|
- Exploits weaknesses in how applications handle file requests.
|
|
- Examples: PDF, DOC(X), RTF, WMF.
|
|
"""
|
|
},
|
|
{
|
|
"title": "Malvertising",
|
|
"content": """
|
|
- Injecting malicious code into trusted websites.
|
|
"""
|
|
},
|
|
{
|
|
"title": "Phishing",
|
|
"content": """
|
|
- Goals: Click a link, open an attachment.
|
|
- Vectors: Emails with malicious attachments (e.g., PDF, DOC(X), WMF).
|
|
"""
|
|
}
|
|
]
|