[TOOL] ProxyStrike - Active Web Application Proxy
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 9 Apr 2008 16:32:02 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
ProxyStrike - Active Web Application Proxy
ProxyStrike is an active Web Application Proxy, is a tool designed to find
vulnerabilities while browsing an application. It was created because the
problems we faced in the pentests of web applications that depends heavily
with this proxy.
Right now it has available Sql injection and XSS modules. Both modules are
designed to catch as many vulnerabilities as we can, it's that why the SQL
Injection module is a Python port of the great DarkRaver "Sqlibf". The XSS
module is made by us, using our library Gazpacho (soon will be released as
The process is very simple, ProxyStrike runs like a passive proxy
listening in port 8008 by default, so you have to browse the desired web
site setting your browser to use ProxyStrike as a proxy, and ProxyStrike
will analyze all the paremeters in background mode. For the user is a
passive proxy because you won't see any different in the behavior of the
application, but in the background is very active.
The information has been provided by <mailto:laramies2k@xxxxxxxxxxxx>
To keep updated with the tool visit the project's homepage at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NEWS] Adobe Flash Player DeclareFunction2 Invalid Object Use Vulnerability
- Next by Date: [NT] Vulnerability in Windows Kernel Allows Elevation of Privilege (MS08-025)
- Previous by thread: [NEWS] Adobe Flash Player DeclareFunction2 Invalid Object Use Vulnerability
- Next by thread: [NT] Vulnerability in Windows Kernel Allows Elevation of Privilege (MS08-025)