Skip to content

dadevel/bruteproxy

Repository files navigation

bruteproxy

During internal pentests you often encounter a myriad of login portals with potentially weak passwords. This repo contains a few scripts to automate password brute forcing with mitmproxy and ffuf

Warning: This is just a proof of concept and may be unstable 🚧

Setup & Usage

Clone the repository.

git clone --depth 1 https://github.com/dadevel/bruteproxy.git
cd ./bruteproxy
poetry install

Start the HTTP proxy.

poetry run mitmdump -s ./proxy.py --no-rawtcp --no-http2 --ssl-insecure --listen-host 127.0.0.1 --listen-port 8080

Configure http://127.0.0.1:8080 as proxy in your browser.

Submit a specific username or the string FUZZUSER and the password FUZZPASS on every login portal you encounter. The proxy will recognize this requests and dump them into the ./logins folder.

Generate ffuf commands for the collected requests with ffufgen.sh.

./ffufgen.sh -c -w ./common-usernames.txt:FUZZUSER -w ./common-usernames.txt:FUZZPASS -mode pitchfork -ac
./ffufgen.sh -c -w ./common-usernames.txt:FUZZUSER -w ./common-passwords.txt:FUZZPASS -mode clusterbomb -ac

Or build the commands manually.

ffuf -request ./logins/https-example.com-443.req.txt -request-proto https -of csv -o ./logins/https-example.com-443.ffuf.csv -c -w ./common-usernames.txt:FUZZUSER -w ./common-passwords.txt:FUZZPASS -ac

About

Automated brute forcing of web logins

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published