Request_Smuggler - Http Request Smuggling Vulnerability Scanner


Based on the amazing research by James Kettle. The tool can help to find servers that may be vulnerable to request smuggling vulnerability.


Usage

USAGE:    request_smuggler [OPTIONS] --url <url>FLAGS:    -h, --help       Prints help information    -V, --version    Prints version informationOPTIONS:        --amount-of-payloads <amount-of-payloads>    low/medium/all [default: low]    -t, --attack-types <attack-types>            [ClTeMethod, ClTePath, ClTeTime, TeClMethod, TeClPath, TeClTime] [default: "ClTeTime" "TeClTime"]        --file <file>            send request from a file            you need to explicitly pass \r\n at the end of the lines    -H, --header <headers>                           Example: -H 'one:one' 'two:two'    -X, --method <method>                             [default: POST]    -u, --url <url>    -v, --verbose <verbose>            0 - print dete   cted cases and errors only,            1 - print first line of server responses            2 - print requests [default: 0]        --verify <verify>                            how many times verify the vulnerability [default: 2]

Installation

  • Linux

    • from releases
    • from source code (rust should be installed)
      git clone https://github.com/Sh1Yo/request_smugglercd request_smugglercargo build --release
    • using cargo install
      cargo install request_smuggler --version 0.1.0-alpha.2
  • Mac

    • from source code (rust should be installed)
      git clone https://github.com/Sh1Yo/request_smugglercd request_smugglercargo build --release
    • using cargo install
      cargo install request_smuggler --version 0.1.0-alpha.2
  • Windows

    • from releases



Source: www.kitploit.com
Request_Smuggler - Http Request Smuggling Vulnerability Scanner Request_Smuggler - Http Request Smuggling Vulnerability Scanner Reviewed by Anonymous on 1:40 PM Rating: 5