All Projects → khast3x → flaskbomb

khast3x / flaskbomb

Licence: other
GZip HTTP Bombing in Python for everyone

Programming Languages

shell
77523 projects
python
139335 projects - #7 most used programming language
HTML
75241 projects

Projects that are alternatives of or similar to flaskbomb

1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+12283.33%)
Mutual labels:  poc, infosec
Pentesting
Misc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-20%)
Mutual labels:  poc, infosec
Proof Of Concepts
A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (+393.33%)
Mutual labels:  poc, infosec
pentest-reports
Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Stars: ✭ 111 (+270%)
Mutual labels:  infosec
S3Scan
Script to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-30%)
Mutual labels:  infosec
Resources-for-Application-Security
Some good resources for getting started with application security
Stars: ✭ 97 (+223.33%)
Mutual labels:  infosec
PocOrExp in Github
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
Stars: ✭ 544 (+1713.33%)
Mutual labels:  poc
Android-Task-Injection
Task Hijacking in Android (somebody call it also StrandHogg vulnerability)
Stars: ✭ 52 (+73.33%)
Mutual labels:  poc
urldedupe
Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+593.33%)
Mutual labels:  infosec
pitch
The initial conversation slides and menu of scenarios
Stars: ✭ 37 (+23.33%)
Mutual labels:  infosec
wildpwn
unix wildcard attacks
Stars: ✭ 119 (+296.67%)
Mutual labels:  infosec
chmod-stego
A PoC on passing data through UNIX file privilege bits (RWX Triplets)
Stars: ✭ 23 (-23.33%)
Mutual labels:  poc
ronin-support
A support library for Ronin. Like activesupport, but for hacking!
Stars: ✭ 23 (-23.33%)
Mutual labels:  infosec
CVE-2020-11651
CVE-2020-11651: Proof of Concept
Stars: ✭ 41 (+36.67%)
Mutual labels:  poc
EDRHunt
Scan installed EDRs and AVs on Windows
Stars: ✭ 406 (+1253.33%)
Mutual labels:  infosec
CSGO-Offset-Scanner
Java Based Cross-Platform CSGO Offset and Netvar Scanner
Stars: ✭ 28 (-6.67%)
Mutual labels:  offensive
bundle
An online tool to quickly bundle & minify your projects, while viewing the compressed gzip/brotli bundle size, all running locally on your browser.
Stars: ✭ 475 (+1483.33%)
Mutual labels:  gzip
vnf-asterisk
Documentation, configuration, reference material and other information around an Asterisk-based VNF
Stars: ✭ 38 (+26.67%)
Mutual labels:  poc
Jiraffe
One stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+423.33%)
Mutual labels:  infosec
pwn-pulse
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+320%)
Mutual labels:  infosec

b191ba7c6456d71b25cb65bbdfd20303.png

Abstract

  • Using the famous zip bomb concept (Silicon Valley S3E07), we can send a compressed web-page to the client.
  • The browser will unzip the small compressed page into a very big file, potentially crashing it.
  • This aims to disrupt or crash bots that scan websites to find vulnerabilities.

tldr - Python GZIP-Bomb HTTP Server

GZip HTTP Bombing in Python for everyone.

Uses Python Flask framework

Docker friendly

It even has it's own low effort logo.

Please keep in mind this is a counter-measure.

Based on this excellent piece by Christian Haschek

Flask Bomb

This repository contains the necessary files to:

  • Host a quick & dirty Flask web server that responds to web requests with a GZip archive as a response page.

  • The recommended way to use FlaskBomb is by deploying it with Docker. You can try it here:
    Try with Play-with-Docker


Features:

  • Quick and easy
  • Fast deployment using Docker
  • Lightweight Alpine based Docker container
  • Generic code
    • Implement your own rules or payloads !
  • (next)User-Agent evasion based on original work
  • Choose classic payload generation or faster append generation method

Usage:

docker run -it -p 80:5000 khanon/flaskbomb <normal|fast> <X> # X is the final payload's size in GB  
# Example:  
docker run -it -p 80:5000 khanon/flaskbomb fast 20

Default deployment sets options to normal 1

Demo - 20G Payloads

Standard docker build from git, demo with cURL

asciicast

Standard deploy from docker hub, demo with Nikto

asciicast

Details & Notes

  • Gzip's algorithm enables the possibility to append archives
    • normal method generates the payload in one single dd command
    • fast method generates a 1GB payload and appends itself n times. The final payload is bigger but generates much faster.
  • Python 3
  • Since this uses Flask's built-in web server, internal port is 5000
  • The payload is generated using gzip and dd on Docker entrypoint.
    • *NIX based for now
    • Full python payload is up for next release
  • Flask development server is used. It is recommended to deploy the application on a WGSI + HTTPD
  • For those not using docker, generate the payload using the bash commands in entrypoint.sh and save it as ./static/cake.gzip
    • The python GZip implementation should make this easier in the future

Roadmap

  • Evasion
  • Python gzip implementation
  • Load evasion URIs from DirBuster
  • Fingerprinting JS before payload delivery
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].