Transmission DNS Rebinding Testcase

This testcase assumes you have transmission running in the default configuration.

Use this calculator to find rbndr hostnames.

Note that this attack can take up to five minutes to work, this would be happening while you read a website in the background and you would see nothing on the screen.
This could be sped up with more frames (as you can see, this demo only uses two). Open the console (F12) to see debugging data. It would also be possible to scan the RFC1918 space in JavaScript to find vulnerable Transmission servers (NAS devices, for example), but this demo doesn't implement that.

Rebinding Host URL
Rebinding Host A (Transmission Server, usually 127.0.0.1 but RFC1918 works)
Rebinding Host B (Attack Server)
How long to wait between attempts (seconds, 20 works best for chrome)
Command to run on success