V1.2 in OpenSuse
For those who are wondering how to run the FHTTP, here's how to install units in openSUSE 11.3:
(Obviously as root) cpan-i
Gtk2 cpan-i Net:: SSLeay cpan-i
IO:: Socket: : SSL cpan-i
IO:: Uncompress:: Inflate
cpan-i IO:: Uncompress:: Gunzip
and that's it xD ...
Bytez
Saturday, May 21, 2011
Wednesday, May 18, 2011
How To Install Pl-2303 Driver
FHTTP Design rules for Evader Proxy (FHTTP v1.2)
Let's start by explaining what options FHTTP gives us to "design rules" for evading the FHTTP proxy v1.2.
To start we have 2 methods:
reglas.txt structure is as follows:
All this has to be on one line (no line breaks)
"where" would be part of the story was edited, the options accepted are:
the pattern is a perl regex ordinary with the difference that if you use html tags must be replaced by their respective value "html entitites", if used: \\ r \\ n you have to add an additional escape (\\ \\ r \\ \\ n), ie
is different
\\ r \\ n which become FHTTP CRLF in a real (and not regex).
\\ \\ r \\ \\ n which FHTTP become \\ r \\ n (and be used in the regex).
there are slight differences between the use of either xD ...
The replacement as in the classic perl regex you can use "groups" such as:
(rule to break the "only HTTPS" xD twitter ...)
is using the where "rcontenido: nossl" which is only going to use when activated the "delete SSL."
As you can see is really easy to build a proxy rule for evading the FHTTP v1.2. We will now quickly
on proxymodulos.pm.
uricall
sub {
return $ uri;}
Navy
this subroutine add it to proxymodulos.pm and add it to their respective "callback list" (@ uricallbacks).
my @ uricallbacks = (
uricall,
Bytez!
Let's start by explaining what options FHTTP gives us to "design rules" for evading the FHTTP proxy v1.2.
To start we have 2 methods:
- reglas.txt
- proxymodulos.pm
reglas.txt structure is as follows:
where: pattern => replacement \u0026lt;! - Comment
All this has to be on one line (no line breaks)
"where" would be part of the story was edited, the options accepted are:
- url - The url of the consultation
- reqline - The line of query (for example: GET / HTTP/1.1).
- header - Each of the headers of an individual (for example: Host: hackingtelevision.blogspot.com).
- postscript - The Post's sent data (data sent in POST).
- Rhead - All headers (including reqline) response but not individually.
- rcontenido - All content of the reply (obviously excluding headers)
the pattern is a perl regex ordinary with the difference that if you use html tags must be replaced by their respective value "html entitites", if used: \\ r \\ n you have to add an additional escape (\\ \\ r \\ \\ n), ie
is different
\\ r \\ n which become FHTTP CRLF in a real (and not regex).
\\ \\ r \\ \\ n which FHTTP become \\ r \\ n (and be used in the regex).
there are slight differences between the use of either xD ...
The replacement as in the classic perl regex you can use "groups" such as:
reqline: GET ^ (\\ s rcontenido: nossl: window \\. location \\. replace \\ (([\\ s \\ \\ r \\ \\ n] *) "https: \\ / \\ / ([\\ s \\ \\ r \\ \\ n] *) \\ + ( [\\ s \\ \\ r \\ \\ n] *) window \\. location \\. hostname ([\\ s \\ \\ r \\ \\ n] *) \\ + ([\\ s \\ \\ r \\ \\ n] *) window \\. location \\. pathname ([\\ s \\ \\ r \\ \\ n] *) \\ + ([\\ s \\ \\ r \\ \\ n] *) window \\. location \\. hash ([\\ s \\ \\ r \\ \\ n] *) \\) => window.location.replace ("http://" + window.location.pathname window.location.hostname + + "? & 08dae2760be9fe48274a74c31fba5b0f" + window.location.hash) \u0026lt;! - Twitter and others: P (rule to break the "only HTTPS" xD twitter ...)
is using the where "rcontenido: nossl" which is only going to use when activated the "delete SSL."
As you can see is really easy to build a proxy rule for evading the FHTTP v1.2. We will now quickly
on proxymodulos.pm.
uricall
sub {
my $ uri = $ _ [0];$ uri = "/". $ uri if ($ uri! ~ / ^ \\ / /);
$ uri = ~ s / ^ http: \\ / \\ / ([\\ /]+)// g;
return $ uri;}
Navy
this subroutine add it to proxymodulos.pm and add it to their respective "callback list" (@ uricallbacks).
my @ uricallbacks = (
uricall,
)
and ready, our subroutine is executed for each uri (url).
the moment we leave here, I hope you find it useful and will soon see more videos and papers published more uses of this tool: P. ..
Bytez!
How Many Members Gym Have
K9 Web Protection Bypass with FHTTP
to Bypass Rule:
header: Host: ([^ \\ \\ r \\ \\ n] +) => Host: $ 1 \\ r \\ nHost: 127.0.0.1:2372 \u0026lt;! - K9 Bypass
to Bypass Rule:
header: Host: ([^ \\ \\ r \\ \\ n] +) => Host: $ 1 \\ r \\ nHost: 127.0.0.1:2372 \u0026lt;! - K9 Bypass
Friday, May 13, 2011
H-t Art Nouveau Jewellery
FHTTP v1.2 v1.2 - The HTTP Fucker: P
Well I think it is time to release this tool as promised, first of all I want to clarify that this "tool" was never intended as such, only began as a PoC but now is a "framework for attack HTTP protocol "of more than 2000 lines
xD First of all let me clarify that it is only a" tool "designed to study and testing of the protocol by which the responsibility to use that you will be placed entirely on the user. Scheduled
for providing your Alien for this xD ... attentive to their web
soon publishes patches to limit potential damage that may cause the tool xD) within 1 second using a aspire one (the notebook is commonly use xD).
has many more options when I can think of at least 100 practical uses, how it happen to you?
Currently only post the tool, when you have time I will publish documentation about it,
Happy Hacks! : P http://www.mediafire.com/?3rzxh7l5k28rcjs Pass: eaeaeaeaea
Edit:
added as. Tar.gz: http://www.mediafire.com/? 5r7s4kd82fre2a5
Bytez!
Well I think it is time to release this tool as promised, first of all I want to clarify that this "tool" was never intended as such, only began as a PoC but now is a "framework for attack HTTP protocol "of more than 2000 lines
entirely in Perl (in GTK GUI) is a tool that among other things is a proxy engine exclusively designed for testing IDS's but also serves to evade captive portals, for debugging, and questions and answers are few things could happen: P.
Another thing is a module that integrates stress test (aka DoS Tool xD), which according to the evidence (as you have seen those who participated in the conference in FreeSecurity tuxtepec gave in xD) easily denied a server with 8 cores and 8 GB's of ram (thank you very much to @
NataSHell666 for providing your Alien for this xD ... attentive to their web
soon publishes patches to limit potential damage that may cause the tool xD) within 1 second using a aspire one (the notebook is commonly use xD).
has many more options when I can think of at least 100 practical uses, how it happen to you?
Currently only post the tool, when you have time I will publish documentation about it,
Happy Hacks! : P http://www.mediafire.com/?3rzxh7l5k28rcjs Pass: eaeaeaeaea
Edit:
added as. Tar.gz: http://www.mediafire.com/? 5r7s4kd82fre2a5
Bytez!
Subscribe to:
Comments (Atom)