Skip to content

Instantly share code, notes, and snippets.

@0x48piraj
Created August 15, 2019 19:07
Show Gist options
  • Select an option

  • Save 0x48piraj/d4ae9aa38a03e6a20e4523920f6eec3f to your computer and use it in GitHub Desktop.

Select an option

Save 0x48piraj/d4ae9aa38a03e6a20e4523920f6eec3f to your computer and use it in GitHub Desktop.
Vulnerable HTTP Request made by I-ON Captive Portal (https://wifilogin.myion.in)
GET /?login=1&mac=B2_Hostel&page=status&link-login-only=http://10.163.0.1/login&link-logout=http://10.163.0.1/logout&uname=MM:MM:MM:SS:SS:SS&mac=B2_Hostel&interface-name=B2_Hostel HTTP/1.1
Host: wifilogin.myion.in
Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36
Sec-Fetch-Mode: navigate
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site: cross-site
Referer: http://10.163.0.1/status
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: ASP.NET_SessionId=wemmofc33i0jipubiqb5jy3n; hotspotgroup=; hid=10161; RedParams=login=1&mac=B2_Hostel&page=status&link-login-only=http://10.163.0.1/login&link-logout=http://10.163.0.1/logout&uname=MM:MM:MM:SS:SS:SS&interface-name=B2_Hostel
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment