ProxyStrike – Active Web Application Proxy


ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while browsing an application. It was created because the problems faced in the pentests of web applications that depends heavily on Javascript, not many web scanners did it good in this stage, so ProxyStrike was born.

Right now it has available SQL injection and XSS modules. Both modules are designed to catch as many vulnerabilities as they can, it’s that why the SQL Injection module is a Python port of the great “SQLibf“.

The process is very simple, ProxyStrike runs like a passive proxy listening in port 8008 by default, so you have to browse the desired web site setting your browser to use ProxyStrike as a proxy, and ProxyStrike will analyze all the paremeters in background mode. For the user is a passive proxy because you won’t see any different in the behaviour of the application, but in the background is very active.

Features:

  • HTTP request/response history
  • Request parameter stats
  • Request parameter values stats
  • Request URL parameter signing and header field signing
  • Use of an alternate proxy (tor for example)
  • SQL attacks
  • XSS attacks
  • Export results to HTML or XML
  • Console version (python proxystrike.py -c / proxystrike.exe -c)

You can download ProxyStrike here:

ProxyStrike v1.0 (Windows) (26/03/2008)
ProxyStrike v1.0 (Linux/OSX) (26/03/2008)

Or read more here.

Posted in: Hacking Tools, Networking Hacking Tools, Web Hacking

, , , , , ,


Latest Posts:


Socialscan - Command-Line Tool To Check For Email And Social Media Username Usage Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
socialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username,
CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.


6 Responses to ProxyStrike – Active Web Application Proxy

  1. Raf April 5, 2008 at 1:55 am #

    That’s another great tool. Be careful though, the recent legislation in the UK could make distributing this tool ILLEGAL! That’s just scarry – reference here: http://blog.ivanristic.com/2008/04/changes-to-brit.html

  2. mumble April 6, 2008 at 1:44 pm #

    That was already covered here in great detail. Essentially the community here has decided that not only is this an awful piece of legislation, it’s effectively unenforceable.

    This tool looks decent, but I haven’t dug into it enough to tell whether it has any functionality that webscarab doesn’t.

  3. Bogwitch April 7, 2008 at 11:48 am #

    Amendments to the Computer Misuse Act to allow prosecutions under s3A were due to come in in April this year. Does anyone have any exact date or further information about this?

  4. fever April 8, 2008 at 6:33 pm #

    you might as well make computers themselves illegal. the only way to stop “misuse” is to eliminate “use” altogether.

  5. Laramies April 9, 2008 at 10:15 am #

    The difference with other proxies is that ProxyStrike has a better SQL Injection and XSS engines for the attacks, it detects more vulnerabilities than the others. Hope it helps :)

  6. gtanuel April 24, 2008 at 5:27 am #

    Looks like a good app although I’m not too successful to see how it helps “the problems faced in the pentests of web applications that depends heavily on _Javascript_”, e.g. compared to WebScarab + Proxmon.