<head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>kali工具箱</title>
<script src="./static/bootstrap.min.js"></script>
<link rel="stylesheet" href="./static/main.css">
<link rel="stylesheet" href="./static/bootstrap.min.css">
<style type="text/css" id="syntaxhighlighteranchor"></style>
</head>
<main class="main-container ng-scope" ng-view="">
<div class="main receptacle post-view ng-scope">
<article class="entry ng-scope" ng-controller="EntryCtrl" ui-lightbox="">
<section class="entry-content ng-binding" ng-bind-html="postContentTrustedHtml">
<section class="l-section"><div class="l-section-h i-cf"><h2>ProxyStrike Package Description</h2>
<p style="text-align: justify;">ProxyStrike is an active Web Application Proxy. It’s a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web scanners did it good in this stage, so we came with this proxy.</p>
<p>Right now it has available Sql injection and XSS plugins. Both plugins are designed to catch as many vulnerabilities as we can, it’s that why the SQL Injection plugin is a Python port of the great DarkRaver “Sqlibf”.</p>
<p>The process is very simple, ProxyStrike runs like a proxy listening in port 8008 by default, so you have to browse the desired web site setting your browser to use ProxyStrike as a proxy, and ProxyStrike will analyze all the paremeters in background mode. For the user is a passive proxy because you won’t see any different in the behaviour of the application, but in the background is very active. :)</p>
<p>Some features:</p>
<ul>
<li>Plugin engine (Create your own plugins!)</li>
<li>Request interceptor</li>
<li>Request diffing</li>
<li>Request repeater</li>
<li>Automatic crawl process</li>
<li>Http request/response history</li>
<li>Request parameter stats</li>
<li>Request parameter values stats</li>
<li>Request url parameter signing and header field signing</li>
<li>Use of an alternate proxy (tor for example ;D )</li>
<li>Sql attacks (plugin)</li>
<li>Server Side Includes (plugin)</li>
<li>Xss attacks (plugin)</li>
<li>Attack logs</li>
<li>Export results to HTML or XML</li>
</ul>
<p>Source: http://www.edge-security.com/proxystrike.php<br>
<a href="http://www.edge-security.com/proxystrike.php" variation="deepblue" target="blank">ProxyStrike Homepage</a> | <a href="http://git.kali.org/gitweb/?p=packages/proxystrike.git;a=summary" variation="deepblue" target="blank">Kali ProxyStrike Repo</a></p>
<ul>
<li>Author: Carlos del ojo Elias</li>
<li>License: GPLv2</li>
</ul>
<h3>Tools included in the proxystrike package</h3>
<h5>proxystrike – Active web application proxy</h5>
<p>An active Web Application Proxy.</p>
<h3>ProxyStrike Usage Example(s)</h3>
<code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="aedcc1c1daeec5cfc2c7">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:~# proxystrike</code>
<p><a href='full/83171d217c818b93b51de68c448667dfde5712ef.jpg'><img src='full/83171d217c818b93b51de68c448667dfde5712ef.jpg' alt="proxystrike" width="920" class="aligncenter size-full wp-image-3653"></a></p>
</div></section><div style="display:none">
<script src="//s11.cnzz.com/z_stat.php?id=1260038378&web_id=1260038378" language="JavaScript"></script>
</div>
</main></body></html>
