BREACH ATTACK Configuration ?

Feb 10, 2015 02:39 PM
635591471126885432.jpg

I saw on Youtube (https://www.youtube.com/watch?v=pIKIXQNFplY&hd=1) a TUTORIAL on "BREACH ATTACK" and frankly, I admit that this is very interesting but I do not understand configuration.

I downloaded the script BREACH on the same video on http://breachattack.com site.

So I'd like a little kindness on your part that you help me configuer the script or rather to explain to me how to make the configuration script BREACH I discovered on http://breachattack.com/ .

While the README file that I downloaded BREACH say

### How to customize:

  1. Edit your hosts file entry with your new target.
  2. Edit in `` TargetIP` address SSLProxy.cs`.
  3. Edit in `` KeySpace` BREACH Basic.cs` to Reflect the target's secret alphabet.
  4. Edit in `` TargetURL` BREACH Basic.cs`.
  5. Edit `canary` to specify your bootstrapping sequence in 'BREACH Basic.cs'.
  6. Compile & Run.

However, I would understand the above requirements:

Number 3: (how to find and edit the ideal keyspace for the vulnerable site in question)?

Number 5: (What is a "Canary" and how to specify it for it to match the vulnerable site)?

Number 6: (Can I compile all of these files modified with VISUAL STUDIO before running)?

Advance thank you kindly explain to me because it is unclear to me and I do not understand absolutely nothing?

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!