OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
 
CAU - New Tool: hcraft - HTTP Vuln Request Crafter

From: I)ruid (druidcaughq.org)
Date: Mon Apr 18 2005 - 17:04:50 CDT


                       ,o0S$S0o, ,o0S$S0o, $, ,$
                       $$$'`$$' $$' `$$$ $$o o$$
                       $$$ $' `$ $$$ $$$ $$$
                       $$$ $$$ $$$ $$$
               ,o0$0' $$$ ,o0S$0$$$ $$$ $$$ `0$0o,
                       $$$ $, $$$' `$$$ $$$ $$$
                       $$$,,$$o, $$$, ,$$$ $$$,,$$$
                       `0S$S0' `0S$S0$$, `0SS0'

                          - -- Tools Release -- -

                     hcraft - HTTP Vuln Request Crafter

     hcraft is a HTTP systems penetration testing tool designed to make
exploitation of known vulnerabilities in HTTP systems a dynamic, simple
process. hcraft is intended to help take the details out of executing
HTTP- based attacks that require you to specially craft an HTTP request.
By defining a modeline for a given vulnerability in the modes file you
can instruct hcraft in how the HTTP request should be constructed, then
use the tool to select the appropriate mode and include the dynamic
parts of the attack such as target host, port, and the filename to
retrieve or the command to execute.

     hcraft was originally designed to be primarily used for arbitrary
file disclosure or command execution vulnerabilities, however it can
also be used for cross-site-scripting and sql-injection attacks if the
modeline for the vulnerability is carefully designed.

     You can find the debut version of hcraft at the following URL:

     http://druid.caughq.org/projects/hcraft/

--
I)ruid, CISSP
druidcaughq.org
http://druid.caughq.org

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQBCZC8CnMFU55olWl8RAglXAJ9S7TYc40fBheFzXBY+a5iuBXnF/gCfTiPQ
d89SGg2cXTsHZE0wZI+IXlE=
=rGAJ
-----END PGP SIGNATURE-----