ProxyStrike – Active Web Application Proxy


ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while browsing an application. It was created because the problems faced in the pentests of web applications that depends heavily on Javascript, not many web scanners did it good in this stage, so ProxyStrike was born.

Right now it has available SQL injection and XSS modules. Both modules are designed to catch as many vulnerabilities as they can, it’s that why the SQL Injection module is a Python port of the great “SQLibf“.

The process is very simple, ProxyStrike runs like a passive proxy listening in port 8008 by default, so you have to browse the desired web site setting your browser to use ProxyStrike as a proxy, and ProxyStrike will analyze all the paremeters in background mode. For the user is a passive proxy because you won’t see any different in the behaviour of the application, but in the background is very active.

Features:

  • HTTP request/response history
  • Request parameter stats
  • Request parameter values stats
  • Request URL parameter signing and header field signing
  • Use of an alternate proxy (tor for example)
  • SQL attacks
  • XSS attacks
  • Export results to HTML or XML
  • Console version (python proxystrike.py -c / proxystrike.exe -c)

You can download ProxyStrike here:

ProxyStrike v1.0 (Windows) (26/03/2008)
ProxyStrike v1.0 (Linux/OSX) (26/03/2008)

Or read more here.

Posted in: Hacking Tools, Networking Hacking Tools, Web Hacking

, , , , , ,


Latest Posts:


Quasar RAT - Windows Remote Administration Tool Quasar RAT – Windows Remote Administration Tool
Quasar is a fast and light-weight Windows remote administration tool coded in C#. Used for user support through day-to-day administrative work to monitoring.
Pingcastle - Active Directory Security Assessment Tool Pingcastle – Active Directory Security Assessment Tool
PingCastle is a Active Directory Security Assessment Tool designed to quickly assess the Active Directory security level based on a risk and maturity framework.
Second Order - Subdomain Takeover Scanner Tool Second Order – Subdomain Takeover Scanner Tool
Second Order Subdomain Takeover Scanner Tool scans web apps for second-order subdomain takeover by crawling the application and collecting URLs (and other data)
Binwalk - Firmware Security Analysis & Extraction Tool Binwalk – Firmware Security Analysis & Extraction Tool
Binwalk is a fast and easy to use Python-based firmware security analysis tool that allows for firmware analysis, reverse engineering & extracting of firmware.
zBang - Privileged Account Threat Detection Tool zBang – Privileged Account Threat Detection Tool
zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations & red teams can use it to identify attack vectors
Memhunter - Automated Memory Resident Malware Detection Memhunter – Automated Memory Resident Malware Detection
Memhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving threat hunter analysis process.


6 Responses to ProxyStrike – Active Web Application Proxy

  1. Raf April 5, 2008 at 1:55 am #

    That’s another great tool. Be careful though, the recent legislation in the UK could make distributing this tool ILLEGAL! That’s just scarry – reference here: http://blog.ivanristic.com/2008/04/changes-to-brit.html

  2. mumble April 6, 2008 at 1:44 pm #

    That was already covered here in great detail. Essentially the community here has decided that not only is this an awful piece of legislation, it’s effectively unenforceable.

    This tool looks decent, but I haven’t dug into it enough to tell whether it has any functionality that webscarab doesn’t.

  3. Bogwitch April 7, 2008 at 11:48 am #

    Amendments to the Computer Misuse Act to allow prosecutions under s3A were due to come in in April this year. Does anyone have any exact date or further information about this?

  4. fever April 8, 2008 at 6:33 pm #

    you might as well make computers themselves illegal. the only way to stop “misuse” is to eliminate “use” altogether.

  5. Laramies April 9, 2008 at 10:15 am #

    The difference with other proxies is that ProxyStrike has a better SQL Injection and XSS engines for the attacks, it detects more vulnerabilities than the others. Hope it helps :)

  6. gtanuel April 24, 2008 at 5:27 am #

    Looks like a good app although I’m not too successful to see how it helps “the problems faced in the pentests of web applications that depends heavily on _Javascript_”, e.g. compared to WebScarab + Proxmon.