{"id":1601,"date":"2009-03-25T08:37:47","date_gmt":"2009-03-25T08:37:47","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1601"},"modified":"2015-09-09T19:38:09","modified_gmt":"2015-09-09T11:38:09","slug":"proxystrike-v21-released-active-web-application-proxy-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2009\/03\/proxystrike-v21-released-active-web-application-proxy-tool\/","title":{"rendered":"ProxyStrike v2.1 Released – Active Web Application Proxy Tool"},"content":{"rendered":"

[ad]<\/p>\n

In April last year we wrote about ProxyStrike<\/a>, recently the developer has released a couple of new versions – the latest being v2.1.<\/p>\n

ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web scanners did it good in this stage, so we came with this proxy.<\/p>\n

Right now it has available SQL injection<\/a> and XSS<\/a> modules. Both modules are designed to catch as many vulnerabilities as we can, it’s that why the SQL Injection module is a Python port of the great DarkRaver “Sqlibf”.<\/p>\n

The process is very simple, ProxyStrike runs like a passive proxy listening in port 8008 by default, so you have to browse the desired web site setting your browser to use ProxyStrike as a proxy, and ProxyStrike will analyze all the paremeters in background mode. For the user is a passive proxy because you won’t see any different in the behaviour of the application, but in the background is very active.<\/p>\n

Features<\/strong><\/p>\n