-
Notifications
You must be signed in to change notification settings - Fork 15
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add meta refresh and URL tampering test cases.
- Loading branch information
1 parent
3342bbe
commit 24e866d
Showing
10 changed files
with
144 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
<!DOCTYPE html> | ||
<html> | ||
|
||
<head> | ||
<meta charset="utf-8"> | ||
<meta http-equiv="refresh" content="0;url=/security/badware/phishing.html"> | ||
<title>Phishing page</title> | ||
</head> | ||
|
||
<body> | ||
<p><a href="./index.html">[Back]</a></p> | ||
|
||
<h1>Phishing Redirect via Meta Refresh</h1> | ||
|
||
<p>This is an example page that loads a phishing page via a meta refresh to test how the browser responds. If you arrive here by mistake; there's | ||
nothing to worry about, we just use this page to test if our client blocking is working.</p> | ||
|
||
</body> | ||
|
||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
<!DOCTYPE html> | ||
<html> | ||
|
||
<head> | ||
<meta charset="utf-8"> | ||
<meta http-equiv="refresh" content="0;url=/security/badware/phishing.html"> | ||
<title>Phishing page</title> | ||
</head> | ||
|
||
<body> | ||
<p><a href="./index.html">[Back]</a></p> | ||
|
||
<h1>Phishing Redirect via Meta Refresh</h1> | ||
|
||
<p>This is an example page that loads a phishing page via a meta refresh to test how the browser responds. If you arrive here by mistake; there's | ||
nothing to worry about, we just use this page to test if our client blocking is working.</p> | ||
|
||
</body> | ||
|
||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
<!DOCTYPE html> | ||
<html> | ||
|
||
<head> | ||
<meta charset="utf-8"> | ||
<title>Phishing Page via Popups</title> | ||
<script> | ||
// eslint-disable-next-line no-unused-vars | ||
function openPopup(target) { | ||
window.open('/security/badware/phishing.html', target); | ||
} | ||
</script> | ||
</head> | ||
|
||
<body> | ||
<p><a href="./index.html">[Back]</a></p> | ||
|
||
<h1>Phishing Page Opener via Popups</h1> | ||
|
||
<p>This is an example page that opens phishing pages via various pop-ups with different target types to test the in-browser phishing detection blocking. If you arrive here by mistake; there's nothing to worry about, we just use this page to test if our client blocking is | ||
working.</p> | ||
|
||
<h2>Test Popups</h2> | ||
<button onclick="openPopup('_blank')">Open Phishing Popup (_blank)</button> | ||
<button onclick="openPopup('_self')">Open Phishing Popup (_self)</button> | ||
<button onclick="openPopup('_parent')">Open Phishing Popup (_parent)</button> | ||
<button onclick="openPopup('_top')">Open Phishing Popup (_top)</button> | ||
<button onclick="openPopup('')">Open Phishing Popup (no target)</button> | ||
<button onclick="openPopup('invalid')">Open Phishing Popup (invalid target)</button> | ||
</body> | ||
|
||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,51 @@ | ||
<!DOCTYPE html> | ||
<html> | ||
<head> | ||
<meta charset="utf-8"> | ||
<title>Phishing Page with URL Tampering</title> | ||
<script> | ||
// eslint-disable-next-line no-unused-vars | ||
function injectedWhitespace() { | ||
// Inject tab (0x09), CR (0x0d), and LF (0x0a) characters into the URL to bypass phishing detection | ||
window.location = '/security/badware/phishing.html\t\r\n'; | ||
} | ||
|
||
function injectedMiddleWhitespace() { | ||
// Inject tab (0x09), CR (0x0d), and LF (0x0a) characters into the URL to bypass phishing detection | ||
window.location = '/security/badware/\t\r\n\tphishing.html'; | ||
} | ||
|
||
function injectedFragments() { | ||
// Inject #frags into the URL to bypass phishing detection | ||
window.location = '/security/badware/phishing.html#frags'; | ||
} | ||
|
||
function injectedDoublePaths() { | ||
// Inject "/../" in the path to bypass phishing detection | ||
window.location = '/security/../security/badware/phishing.html'; | ||
} | ||
|
||
function injectedSinglePaths() { | ||
// Inject /./ in the path to bypass phishing detection | ||
window.location = '/security/./badware/phishing.html'; | ||
} | ||
|
||
function percentEncodeURL() { | ||
window.location = "/%73%65%63%75%72%69%74%79/%62%61%64%77%61%72%65/%70%68%69%73%68%69%6e%67%2e%68%74%6d%6c" | ||
} | ||
</script> | ||
</head> | ||
<body> | ||
<p><a href="./index.html">[Back]</a></p> | ||
|
||
<h1>Phishing Opening via URL Tampering</h1> | ||
|
||
<p>This is an example malicious page that attempts to open phishing pages with tampered URLs to bypass the phishing detection logic. If you arrive here by mistake; there's nothing to worry about, we just use this page to test if our client blocking is working.</p> | ||
<button onclick="injectedWhitespace()">Injected Whitespace</button> | ||
<button onclick="injectedMiddleWhitespace()">Injected Middle Whitespace</button> | ||
<button onclick="injectedFragments()">Injected Fragments</button> | ||
<button onclick="injectedDoublePaths()">Injected Double Paths</button> | ||
<button onclick="injectedSinglePaths()">Injected Single Paths</button> | ||
<button onclick="percentEncodeURL()">Percent Encode URL</button> | ||
</body> | ||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters