Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/etherdream/mitm-http-cache-poisoning
HTTP Cache Poisoning Demo
https://github.com/etherdream/mitm-http-cache-poisoning
javascript mitm-attacks web-security
Last synced: about 1 month ago
JSON representation
HTTP Cache Poisoning Demo
- Host: GitHub
- URL: https://github.com/etherdream/mitm-http-cache-poisoning
- Owner: EtherDream
- Created: 2015-04-29T14:25:14.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2016-06-21T09:19:18.000Z (over 8 years ago)
- Last Synced: 2024-08-04T09:06:27.393Z (4 months ago)
- Topics: javascript, mitm-attacks, web-security
- Language: JavaScript
- Size: 104 KB
- Stars: 88
- Watchers: 9
- Forks: 61
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-network-stuff - **66**星
README
## Install
```
npm install
```## Run
```
node index.js
```## Test
浏览器代理 HTTP -> 127.0.0.1:8080
访问任意 HTTP 页面即可触发。
关闭代理。打开 http://www.163.com 若弹出对话框,感染成功。
## 更新缓存列表
进入 tool 文件夹,执行 ``run.cmd``。需安装 [phantomjs](http://phantomjs.org/)
该脚本会访问 ``url.txt`` 中的网站列表,分析出易感染的脚本文件,同时保存。