@natecull @popefucker @mala @Shamar
You can see the code without running it in the @rain's article.
But note, these are just two of the possible attacks.
If your browser authenticate automatically to a service on your LAN (imagine through windows authentication), with a #DNS rebinding attack a malicious #JavaScript might access to such service.
It's true you can't frame an arbitrary #TCP packet in the browser, but how many services run over HTTP today?