Request_Smuggler - Http Request Smuggling Vulnerability Scanner

2 years ago 160
BOOK THIS SPACE FOR AD
ARTICLE AD

Based on the amazing research by James Kettle. The tool can help to find servers that may be vulnerable to request smuggling vulnerability.

Usage

USAGE:
request_smuggler [OPTIONS] --url <url>

FLAGS:
-h, --help Prints help information
-V, --version Prints version information

OPTIONS:
--amount-of-payloads <amount-of-payloads> low/medium/all [default: low]
-t, --attack-types <attack-types>
[ClTeMethod, ClTePath, ClTeTime, TeClMethod, TeClPath, TeClTime] [default: "ClTeTime" "TeClTime"]

--file <file>
send request from a file
you need to explicitly pass \r\n at the end of the lines
-H, --header <headers> Example: -H 'one:one' 'two:two'
-X, --method <method> [default: POST]
-u, --url <url>
-v, --verbose <verbose>
0 - print dete cted cases and errors only,
1 - print first line of server responses
2 - print requests [default: 0]
--verify <verify> how many times verify the vulnerability [default: 2]

Installation

Linux

from releases from source code (rust should be installed)
git clone https://github.com/Sh1Yo/request_smuggler
cd request_smuggler
cargo build --release
using cargo install
cargo install request_smuggler --version 0.1.0-alpha.2

Mac

from source code (rust should be installed)
git clone https://github.com/Sh1Yo/request_smuggler
cd request_smuggler
cargo build --release
using cargo install
cargo install request_smuggler --version 0.1.0-alpha.2

Windows

from releases

Request_Smuggler - Http Request Smuggling Vulnerability Scanner Request_Smuggler - Http Request Smuggling Vulnerability Scanner Reviewed by Zion3R on 5:30 PM Rating: 5

Read Entire Article