PERS - The Passive Expired Resource Scanner
A passive scanning tool for finding expired domain vulnerabilites while you browse.
O que é PERS - The Passive Expired Resource Scanner?
PERS - The Passive Expired Resource Scanner é uma extensão do Chrome desenvolvida por https://thehackerblog.com, e sua principal característica é "A passive scanning tool for finding expired domain vulnerabilites while you browse.".
Capturas de Tela da Extensão
Baixar o arquivo CRX da Extensão PERS - The Passive Expired Resource Scanner
Baixe arquivos de extensão PERS - The Passive Expired Resource Scanner no formato crx, instale manualmente as extensões do Chrome no navegador ou compartilhe os arquivos crx com amigos para instalar facilmente as extensões do Chrome.
Instruções de Uso da Extensão
A Chrome extension which detects expired domains in webpage resources (such as external images, CSS, and JavaScript) while you browse. Once detected it alerts you to the details and offers multiple ways to verify that the domain is expired. These vulnerabilities often allow for hijacking of the vulnerable webpage. Useful for penetration testers and auditors who wish to automatically identify these vulnerabilities passively while they browse. Reason for various permissions requested by extension: * webRequest: Required to hook the onErrorOcurred function in Chrome to detect when a resource load has resulted in a network error occurring (e.g. "net::ERR_NAME_NOT_RESOLVED"). * webRequestBlocking: Required to block and add headers for certain domain availability querying APIs (e.g. add Origin header). *: Required because we have to be able to detect failed network loads for resources from any domain/URL.
Informações Básicas da Extensão
Nome | PERS - The Passive Expired Resource Scanner |
ID | jenkmpdppepcfhjpfgbgehfklnoopeei |
URL Oficial | https://chromewebstore.google.com/detail/pers-the-passive-expired/jenkmpdppepcfhjpfgbgehfklnoopeei |
Descrição | A passive scanning tool for finding expired domain vulnerabilites while you browse. |
Tamanho do Arquivo | 695 KB |
Contagem de Instalações | 103 |
Versão Atual | 0.0.2 |
Última Atualização | 2016-10-09 |
Data de Publicação | 2016-10-08 |
Desenvolvedor | https://thehackerblog.com |
[email protected] | |
Tipo de Pagamento | free |
Site da Extensão | https://thehackerblog.com |
Idiomas Suportados | en |
manifest.json | |
{ "update_url": "https:\/\/clients2.google.com\/service\/update2\/crx", "name": "PERS - The Passive Expired Resource Scanner", "version": "0.0.2", "manifest_version": 2, "description": "A passive scanning tool for finding expired domain vulnerabilites while you browse.", "homepage_url": "https:\/\/thehackerblog.com\/", "content_security_policy": "default-src 'self' https:\/\/thehackerblog.com; style-src * https:\/\/fonts.googleapis.com; img-src *; font-src *; connect-src *;", "icons": { "16": "icons\/icon16.png", "48": "icons\/icon48.png", "128": "icons\/icon128.png" }, "default_locale": "en", "background": { "page": "src\/bg\/background.html", "persistent": true }, "permissions": [ "webRequest", "webRequestBlocking", " |