8000 GitHub - hugzug/stegosploit: IMAJS meet <img>
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

hugzug/stegosploit

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 

Repository files navigation

stegosploit

What is steganography?

The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files with bits of different, invisible information.

In this example we hide JavaScript code in the alpha channel of a PNG file then execute it when the image finishes loading.

What?

The original exploit was discovered by Saumil Shah and used an HTML5 <canvas> element to execute malicious code when the image was rendered. I decided to write a simple example of the same process but using an <img> element and Peter Eigenschink's steganography.js library.

A harmless demonstration can be found here. More information about "IMAJS" (the original exploit) can be found here.

Notes

The demonstration provided cannot be embedded by means of an <img> tag, though it is fully possible to move the decoding script into a document that does embed the potentially malicious image through an <img> tag.

About

IMAJS meet <img>

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • JavaScript 86.2%
  • HTML 13.4%
  • ApacheConf 0.4%
0