ProxyStrike – Active Web Application Proxy

Use Netsparker


ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while browsing an application. It was created because the problems faced in the pentests of web applications that depends heavily on Javascript, not many web scanners did it good in this stage, so ProxyStrike was born.

Right now it has available SQL injection and XSS modules. Both modules are designed to catch as many vulnerabilities as they can, it’s that why the SQL Injection module is a Python port of the great “SQLibf“.

The process is very simple, ProxyStrike runs like a passive proxy listening in port 8008 by default, so you have to browse the desired web site setting your browser to use ProxyStrike as a proxy, and ProxyStrike will analyze all the paremeters in background mode. For the user is a passive proxy because you won’t see any different in the behaviour of the application, but in the background is very active.

Features:

  • HTTP request/response history
  • Request parameter stats
  • Request parameter values stats
  • Request URL parameter signing and header field signing
  • Use of an alternate proxy (tor for example)
  • SQL attacks
  • XSS attacks
  • Export results to HTML or XML
  • Console version (python proxystrike.py -c / proxystrike.exe -c)

You can download ProxyStrike here:

ProxyStrike v1.0 (Windows) (26/03/2008)
ProxyStrike v1.0 (Linux/OSX) (26/03/2008)

Or read more here.

Posted in: Hacking Tools, Networking Hacking, Web Hacking

, , , , , ,


Latest Posts:


Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.


6 Responses to ProxyStrike – Active Web Application Proxy

  1. Raf April 5, 2008 at 1:55 am #

    That’s another great tool. Be careful though, the recent legislation in the UK could make distributing this tool ILLEGAL! That’s just scarry – reference here: http://blog.ivanristic.com/2008/04/changes-to-brit.html

  2. mumble April 6, 2008 at 1:44 pm #

    That was already covered here in great detail. Essentially the community here has decided that not only is this an awful piece of legislation, it’s effectively unenforceable.

    This tool looks decent, but I haven’t dug into it enough to tell whether it has any functionality that webscarab doesn’t.

  3. Bogwitch April 7, 2008 at 11:48 am #

    Amendments to the Computer Misuse Act to allow prosecutions under s3A were due to come in in April this year. Does anyone have any exact date or further information about this?

  4. fever April 8, 2008 at 6:33 pm #

    you might as well make computers themselves illegal. the only way to stop “misuse” is to eliminate “use” altogether.

  5. Laramies April 9, 2008 at 10:15 am #

    The difference with other proxies is that ProxyStrike has a better SQL Injection and XSS engines for the attacks, it detects more vulnerabilities than the others. Hope it helps :)

  6. gtanuel April 24, 2008 at 5:27 am #

    Looks like a good app although I’m not too successful to see how it helps “the problems faced in the pentests of web applications that depends heavily on _Javascript_”, e.g. compared to WebScarab + Proxmon.