ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web scanners did it good in this stage, so we came with this proxy.
Right now it has available Sql injection and XSS modules. Both modules are designed to catch as many vulnerabilities as we can, it's that why the SQL Injection module is a Python port of the great DarkRaver "Sqlibf". The XSS module is made by us, using our library Gazpacho (soon will be released as standalone tool).The process is very simple, ProxyStrike runs like a passive proxy listening in port 8008 by default, so you have to browse the desired web site setting your browser to use ProxyStrike as a proxy, and ProxyStrike will analyze all the paremeters in background mode. For the user is a passive proxy because you won't see any different in the behaviour of the application, but in the background is very active. :)
Features:
- Plugin engine (Create your own plugins!)
- Request interceptor
- Request diffing
- Request repeater
- Automatic crawl process
- Save/restore session
- Http request/response history
- Request parameter stats
- Request parameter values stats
- Request url parameter signing and header field signing
- Use of an alternate proxy (tor for example ;D )
- Sql attacks (plugin)
- Server Side Includes (plugin)
- Xss attacks (plugin)
- Attack logs
- Export results to HTML or XML
Showing posts with label web application. Show all posts
Showing posts with label web application. Show all posts
Wednesday, March 18, 2009
ProxyStrike!
Another tool to try out!
From the site:
Labels:
security,
TODO,
tools,
web application
Friday, January 16, 2009
Application Boundaries Enforcer (ABE)
This module enforces application boundaries at the browser end, and in the future possibly implemented as a web filtering proxy also.
This module is not out as yet, but I'll be waiting for its release to see whether it really is a good thing to push to end users.
Labels:
browser security,
security,
software,
web application
Saturday, July 26, 2008
GZip testing
A nifty online test tool for GZIP compression testing, along with some sample codes and methods to enable GZIP compression for your site/pages. ;)
http://www.gidnetwork.com/tools/gzip-test.php
http://www.desilva.biz/php/zlib.html
-------------------------------------
On Apache, if zlib is installed, we can use just a simple code snippet to enable GZIP compression:
Really simple right?
http://www.gidnetwork.com/tools/gzip-test.php
http://www.desilva.biz/php/zlib.html
-------------------------------------
On Apache, if zlib is installed, we can use just a simple code snippet to enable GZIP compression:
Really simple right?
Labels:
Apache,
PHP,
programming,
source code,
web application,
web development
Wednesday, July 02, 2008
Fiddler HTTP Debugger - A free web debugging tool
For those who want a transparent proxy extensible using .NET (rather than Java or BeanShell for WebScarab), here's Fiddler.
Labels:
security,
tools,
web application
Web Security: ratproxy tool
Interesting reporting done by this tool. May be worth checking out when this goes out of beta.
Google Code page
Screenshot
Source Code
Edit: Seems that Google uses it themselves
Google Code page
Screenshot
Source Code
Edit: Seems that Google uses it themselves
Labels:
security,
tools,
web application
Thursday, May 29, 2008
URI / URL Parsing Using RegExp in JavaScript
Sometime back when I was writing a web crawler in JavaScript, I had to parse URIs into their constituents. And for that task I modified Flog's URI Parser class for my needs.
Well, as part of the licensing, and for sharing of information, I thought I'd post the JavaScript code here.
function UriParser(uri){
//define class (for use with prototype.js) to do URI parsing
//modified from FlogUriParser found at http://www.flog.co.nz/index.php/journal/prototype-uri-parser-class/
this._regExp = /^((\w+):\/\/\/?)?((\w+):?(\w+)?@)?([^\/\?:]+):?(\d+)?(\/?[^\?#;\|]+)?([;\|])?([^\?#]+)?\??([^#]+)?#?(\w*)/;
this.username = "";
this.password = "";
this.port = "";
this.protocol = "";
this.host = "";
this.pathname = "";
this.url = "";
this.urlparamseparator = "";
this.urlparam = "";
this.querystring = {};
this.fragment = "";
this.results = null;
this._getVal = function(r, i) {
if(!r) return null;
return (typeof(r[i]) == 'undefined' ? "" : r[i]);
};
this.parse = function(uri) {
var r = this._regExp.exec(uri);
this.results = r;
this.url = this._getVal(r,0);
this.protocol = this._getVal(r,2);
this.username = this._getVal(r,4);
this.password = this._getVal(r,5);
this.host = this._getVal(r,6);
this.port = this._getVal(r,7);
this.pathname = this._getVal(r,8);
this.urlparamseparator = this._getVal(r,9);
this.urlparam = this._getVal(r,10);
this.querystring = this._getVal(r,11);
this.fragment = this._getVal(r,12);
return r;
}
if(uri) this.parse(uri);
}
Well, as part of the licensing, and for sharing of information, I thought I'd post the JavaScript code here.
function UriParser(uri){
//define class (for use with prototype.js) to do URI parsing
//modified from FlogUriParser found at http://www.flog.co.nz/index.php/journal/prototype-uri-parser-class/
this._regExp = /^((\w+):\/\/\/?)?((\w+):?(\w+)?@)?([^\/\?:]+):?(\d+)?(\/?[^\?#;\|]+)?([;\|])?([^\?#]+)?\??([^#]+)?#?(\w*)/;
this.username = "";
this.password = "";
this.port = "";
this.protocol = "";
this.host = "";
this.pathname = "";
this.url = "";
this.urlparamseparator = "";
this.urlparam = "";
this.querystring = {};
this.fragment = "";
this.results = null;
this._getVal = function(r, i) {
if(!r) return null;
return (typeof(r[i]) == 'undefined' ? "" : r[i]);
};
this.parse = function(uri) {
var r = this._regExp.exec(uri);
this.results = r;
this.url = this._getVal(r,0);
this.protocol = this._getVal(r,2);
this.username = this._getVal(r,4);
this.password = this._getVal(r,5);
this.host = this._getVal(r,6);
this.port = this._getVal(r,7);
this.pathname = this._getVal(r,8);
this.urlparamseparator = this._getVal(r,9);
this.urlparam = this._getVal(r,10);
this.querystring = this._getVal(r,11);
this.fragment = this._getVal(r,12);
return r;
}
if(uri) this.parse(uri);
}
Tuesday, March 18, 2008
Bridging the Designer-User Gap
From Jakob Nielson's Alertbox. A good read for anyone involved (even minimally) in user interface design.
Labels:
articles,
design,
links,
web application
Wednesday, February 20, 2008
Top-10 Application-Design Mistakes
For those who're involved in (web-related) design in any way, some really good tips here.
Labels:
design,
usability,
web application,
web development
Subscribe to:
Posts (Atom)