Skip to content

Commit ae71144

Browse files
save file
1 parent 485571b commit ae71144

File tree

1 file changed

+17
-3
lines changed

1 file changed

+17
-3
lines changed

blog/25-12-04/bypass-csp/bypass-csp.html

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -367,13 +367,19 @@ <h3>
367367
</h3>
368368
<p>
369369
Well the test in question was on a webpage protected with a content-security-policy, create a websocket
370-
to a local server ( or other )<br>
370+
to a local server ( or other )
371+
<br>
371372
<div class=br></div>
372-
So i thought this would make for some interesting code<br>
373+
So i thought this would make for some interesting code
374+
<br>
373375
<div class=br></div>
374376
Its worth noting here that when a server uses a certificate not in the trsuted root store, self-signed or otherwise,
375377
it requires top-level navigation to get the browser to accept that certificate, any other form of navigation will
376-
fail silently<br>
378+
fail silently
379+
<br>
380+
Its also worth noting that often when extensions modify the headers, dev tools reports the original headers, if you
381+
look at the test-server, it provides a simepl webpage that 1. allows top level navigation to accept the self-signed
382+
( unrecognised ) certificate, 2. it also displays the page headers as received after the extension has modified them.
377383
<div class=br></div>
378384
Here is a minimal websocket server, supports text only, upto 125 bytes
379385
</p>
@@ -500,6 +506,7 @@ <h3>
500506

501507
$('[value="download firefox extension"]').onclick = btn.download['firefox-extension'];
502508
$('[value="download chrome extension"]').onclick = btn.download['chrome-extension'];
509+
$('[value="download websocket server"]').onclick = btn.download['websocket-server'];
503510
$('[value="download mitm proxy"]').onclick = btn.download['mitm-proxy'];
504511
$('[value="download test-server"]').onclick = btn.download['test-server'];
505512
$('[value="download js extension"]').onclick = btn.download['js-extension'];
@@ -526,6 +533,13 @@ <h3>
526533
}//chrome-extension
527534

528535

536+
btn.download['websocket-server'] = function(){
537+
538+
download.file('ws/websocket-server.js');
539+
540+
}//websocket-server
541+
542+
529543
btn.download['mitm-proxy'] = function(){
530544

531545
download.file('proxy/mitm-proxy.js');

0 commit comments

Comments
 (0)