Guest User

just some text

a guest
Sep 24th, 2020
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Attacker gains custody of an TLS certificate (wildcard preferred)
  2. Attacker begins deployment of malicious exit nodes
  3. Attacker intercepts the NoScript extension update traffic for
  4. Attacker returns a malicious update metadata file for NoScript to the requesting Tor Browser
  5. The malicious extension payload is downloaded and then silently installed without user interaction
  6. At this point remote code execution is gained
  7. The attacker may use an additional stage to further implant additional software on the machine or to cover any signs of exploitation
RAW Paste Data