Skip to content

Commit

Permalink
BACK!!!!!!
Browse files Browse the repository at this point in the history
  • Loading branch information
S-PScripts authored May 31, 2024
1 parent 0a00ece commit 7bd44d0
Showing 1 changed file with 33 additions and 0 deletions.
33 changes: 33 additions & 0 deletions Exploits/Incognito (v124)
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
The incognito exploit is BACK! (v124)

Instructions:
1. Go to chrome://flags/#captive-portal-popup-window.
2. If it doesn't exist, make sure to update chromeOS to the latest version.
3. Enable it.
4. Restart.
5. If the flag didn't reset, you can continue. Else you cannot.
6. Go to Settings.
7. Click Wifi in the Network section.
8. Click your wifi.
9. Click Network.
10. Set Name servers to Custom name servers.
11. Set the first box to detectportal.firefox.com.
12. A sign in pop up should appear from your wifi. Click Sign in.
13. Do CTRL+T - YOU'RE NOW IN INCOGNITO MODE!
14. Set Name servers back to what it was before.

Notes:
-> Extensions can't block you!
-> No search history!

Credits:
https://crbug.com/341245382
https://github.com/s0urce-c0de for finding the post

Weird thing:
I did this exploit and I noticed when I checked my windows that the OLD
sign in window exploit thing was there (v105). I had tried using its DNS
to get a captive window but it didn't work since it was down. But apparently
not. What was weird was that I hadn't even got a sign in pop up. I got one
when I used the firefox one, but that opened a different captive tab. That
tab wasn't there, so maybe the two DNS merged?

0 comments on commit 7bd44d0

Please sign in to comment.