Acquérir la mémoire vive avec Dumpit.
Acquiring memory with Dumpit
http://isc.sans.edu/diary/Acquiring+Memory+Images+with+Dumpit/17216
# mitmdump -w /var/log/mitmdump-$$.log -v -p 8080
192.168.2.109 GET http://www.jourzero.com/
Host: www.jourzero.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:25.0) Gecko/20100101 Firefox/25.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
If-Modified-Since: Wed, 13 Nov 2013 17:27:42 GMT
If-None-Match: "6f73caf0-aa84-4d81-a1e9-598d2369ecbc"
<< 304 Not Modified 0B
Expires: Wed, 13 Nov 2013 17:30:43 GMT
Date: Wed, 13 Nov 2013 17:30:43 GMT
Cache-Control: private, max-age=0
ETag: "6f73caf0-aa84-4d81-a1e9-598d2369ecbc"
Server: GSE
# mitmproxy -r /var/log/mitmdump-3099.log
>> GET http://www.jourzero.com/
← 304 [empty content]ENTER
2013-11-13 12:30:43 GET http://www.jourzero.com/
← 304 [empty content]
Request Response
Host: www.jourzero.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:25.0) Gecko/20100101 Firefox/25.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
If-Modified-Since: Wed, 13 Nov 2013 17:27:42 GMT
If-None-Match: "6f73caf0-aa84-4d81-a1e9-598d2369ecbc"
2013-11-13 12:30:43 GET http://www.jourzero.com/
← 304 [empty content]
TAB
Request Response
Expires: Wed, 13 Nov 2013 17:30:43 GMT
Date: Wed, 13 Nov 2013 17:30:43 GMT
Cache-Control: private, max-age=0
ETag: "6f73caf0-aa84-4d81-a1e9-598d2369ecbc"
Server: GSE
msf > use auxiliary/server/socks4a
msf auxiliary(socks4a) > info
Name: Socks4a Proxy Server
Module: auxiliary/server/socks4a
Version: 0
License: Metasploit Framework License (BSD)
Rank: Normal
Provided by:
sf
Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The address to listen on
SRVPORT 1080 yes The port to listen on.
Description:
This module provides a socks4a proxy server that uses the builtin
Metasploit routing to relay connections.
msf auxiliary(socks4a) > run
[*] Auxiliary module execution completed
[*] Starting the socks4a proxy server
msf auxiliary(socks4a) > jobs
Jobs
====
Id Name
-- ----
0 Auxiliary: server/socks4a
--
Here are the usable options I know to intercept HTTP traffic in headless mode. I've had to use that on an isolated Kali Linux (accessed via SSH without possibility for X/VNC and without Internet download capability):
There are other options on Kali but they are not as usable or simple to setup:
- Simple intercepting proxy in full-screen text mode (à la Kismet) mitmproxy -p 8080
- Simple intercepting proxy in log viewing mode simple (à la tcpdump) mitmdump -v -p 8080
- Zed Attack Proxy with the option "-daemon": zap.sh -daemon.
- Burp with the option -Djava.awt.headless=true. Scripts that use that option: sodapop.sh and bscan (to be tested)
- Proxystrike with the option -c (console) - not too sure that this option has any real use-case...
In order to perform an automatic scan of CSRF-protected sites, requests must be performed sequentially as each requests contains a new generated anti-CSRF token needed for the next request, forming a token chain.
A POC in the form of a Burp suite plugin has been developed to verify this approach, it can be downloaded at http://code.google.com/p/pysqlin/downloads/list. It should be noted however that this code is a POC and it requires further development in other to be able to work against real environments (any link of a webapp with this behavior is appreciated).
Original post origin: http://edge-security.blogspot.ca.
Thanks to Michu for the great tip... Initial text copied here for convenience...
Generating Excel files from web - line breaks in cells
...I needed to wrap text in cell, but when I put tag into HTML output, Excel interpreted it as a new row, not a line-break in existing cell. The solution I found is to add into a stylesheet:
br {mso-data-placement:same-cell;}