Headerpwn - A Fuzzer For Finding Anomalies And Analyzing How Servers Respond To Different HTTP Headers

AVvXsEjhw6Ly6CcuMkIDFVTdlCSSg_hS_Ot05XtP1sh51WCSNLrbW0nmqHBBBld8qI8GedEBtr-rtqUWOJnDG3L7gjOg7zL-5LbAdX5mhwkHgnilslZ9gtIOH_A6OXwp-KppmY1FnNKiPVjvmn1z_imEAVDPm53FMqnGjoMpfEWJ4TdR_-LJf3xfQ53prJ8UXf8=w640-h428

Install​

To install headerpwn, run the following command:
go install github.com/devanshbatham/[email protected]

Usage​

headerpwn allows you to test various headers on a target URL and analyze the responses. Here's how to use the tool:
  1. Provide the target URL using the -url flag.
  2. Create a file containing the headers you want to test, one header per line. Use the -headers flag to specify the path to this file.
Example usage:
headerpwn -url https://example.com -headers my_headers.txt
  • Format of my_headers.txt should be like below:
코드:
Proxy-Authenticate: foobar
Proxy-Authentication-Required: foobar
Proxy-Authorization: foobar
Proxy-Connection: foobar
Proxy-Host: foobar
Proxy-Http: foobar

Proxying requests through Burp Suite:​

Follow following steps to proxy requests through Burp Suite:
  • Export Burp's Certificate:
    • In Burp Suite, go to the "Proxy" tab.
    • Under the "Proxy Listeners" section, select the listener that is configured for 127.0.0.1:8080
    • Click on the "Import/ Export CA Certificate" button.
    • In the certificate window, click "Export Certificate" and save the certificate file (e.g., burp.der).
  • Install Burp's Certificate:
    • Install the exported certificate as a trusted certificate on your system. How you do this depends on your operating system.
    • On Windows, you can double-click the .cer file and follow the prompts to install it in the "Trusted Root Certification Authorities" store.
    • On macOS, you can double-click the .cer file and add it to the "Keychain Access" application in the "System" keychain.
    • On Linux, you might need to copy the certificate to a trusted certificate location and configure your system to trust it.
You should be all set:
headerpwn -url https://example.com -headers my_headers.txt -proxy 127.0.0.1:8080
AVvXsEgwVIpieddO9Sp0aDhvyQWCiz7eyYjWgq7UV1_Akew-cBYrmfefSRiB0WJd1jKFjqcTCWbjCKEE59XsXRwkn0BpZGOvrBlq0uxVy5kd1RuP2FQW9rjU05nVR5mXP8lIbZtOTTgxxhrIsRLAOY0yg0HVtwN-didGLeNmANksVP9IBPQd9MAMeeO-BFf14c4=s320

AVvXsEjELw64soIQatf8BVfeQfZu_Yzhp-MhlL8ni3HvEIZaAqi2kqJqaWYFzQIu_AqMbkZGfGlrGwGTPcTPCFIP6i2YX3pLVbngOV1fRZI68uSjzKtOEbhEUAky0iNC1lRQzhHz_aJVYV81gpTeQhMtTyVU7kxhr73MotMPoufK6hQX3E9f2elwLDpxVma_pvs=s320

Credits​

The headers.txt file is compiled from various sources, including the SecLists">Seclists project. These headers are used for testing purposes and provide a variety of scenarios for analyzing how servers respond to different headers.
 
뒤로
상단