Files
Hunt-AI/Modules/Knowledge/SANS/client_side_exploits.py

34 lines
904 B
Python

def get_content():
"""
Returns structured content for client-side exploitation techniques.
"""
return [
{
"title": "Common Client-Side Attack Vectors",
"content": """
- Web browsers, browser extensions.
- Document and image rendering applications.
"""
},
{
"title": "Common File Format Attacks",
"content": """
- Exploits weaknesses in how applications handle file requests.
- Examples: PDF, DOC(X), RTF, WMF.
"""
},
{
"title": "Malvertising",
"content": """
- Injecting malicious code into trusted websites.
"""
},
{
"title": "Phishing",
"content": """
- Goals: Click a link, open an attachment.
- Vectors: Emails with malicious attachments (e.g., PDF, DOC(X), WMF).
"""
}
]