Skip to content

Commit f6a6a00

Browse files
Made README more accurate
1 parent db7ccd6 commit f6a6a00

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ Upon loading the sonar.js payload in a modern web browser the following will hap
66
* sonar.js will use WebRTC to enumerate what internal IPs the user loading the payload has.
77
* sonar.js then attempts to find live hosts on the internal network via WebSockets.
88
* If a live host is found, sonar.js begins to attempt to fingerprint the host by linking to it via ```<img src="x">``` and ```<link rel="stylesheet" type="text/css" href="x">``` and hooking the ```onload``` event. If the expected resources load successfully it will trigger the pre-set JavaScript callback to start the user-supplied exploit.
9-
* If the user changes networks, sonar.js starts the process all over again on the newly joined network.
109

1110
## Fingerprints
1211
sonar.js works off of a database of fingerprints. A fingerprint is simply a list of known resources on a device that can be linked to and detected via ```onload```. Examples of this include images, CSS stylesheets, and even external JavaScript.

0 commit comments

Comments
 (0)