reconftw
reconftw copied to clipboard
Add HTTP Request Smuggling
Nice tools! it helped me a lot when doing penetration testing. I have an idea to add HTTP request smuggling scan into reconftw using this tool
https://github.com/defparam/smuggler
What do you think? Thank you!
Yeah sure! I will add this check in the next release :) Thanks for the suggestion
I was analyzing the request and the only thing that sticks is how to decide which URLs will be sent to the tool, i.e. it depends on subjective decisions which URLs could be interesting to access by exploiting HTTP request smuggling, do you have any suggestion?
I think list of domains can be inputted into the tools, for example
https://admin.example.com
https://pay.example.com
https://example.com
Ref: https://twitter.com/MeAsHacker_HNA/status/1538862580684443649
Could do something like
cat Recon/Recon.com/webs/webs.txt | while read line; do python3 smuggler.py -u $line -q; done
Any detected issues would then be piped into the payloads folder of smuggler.py although worth noting this wont loko for http2 based smuggling
fixed with https://github.com/six2dez/reconftw/commit/716fcf09ecf95ff6c9b884ee9c54f1ca91ded437