Skip to content

dsopas/rfd-checker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

RFD Checker

GPL3 Go Report Card

Command line security tool to check whether a given URL is vulnerable to RFD - Reflected File Download. This tool was developed by David Sopas @dsopas and Paulo Silva @pauloasilva_com with the main purpose of validating and automating the search for the RFD web attack vector.

Usage

$ rfd-checker -h
RFD Checker (by @dsopas and @pauloasilva_com)

Usage: rfd-checker -target=URL
Options:
  -header value
        Request header e.g. "Cookie: SESSID=a16fb"
  -target string
        Target URL
  -h --help
        Prints this help

Examples

$ go run rfd-checker.go -target="https://0xhack.com/webminar_rfd/json.php?callback=jQuery" -header="User-Agent: RFD-Checker" -header="Cookie: PHPSESSID=123"
Target URL: https://0xhack.com/webminar_rfd/json.php?callback=jQuery
Permissive query parameters: callback
Permissive URL: https://0xhack.com/webminar_rfd/json.php.bat?callback=jQuery

If you want to test a batch of URLs, exported from Burp, for example, you can place them, one per line, on a text file and run

$ cat inputs.txt | xargs -I url go run ./rfd-checker.go -target=url

Or

$ cat inputs.txt | xargs -I url ./rfd-checker -target=url

RFD checker diagram

Build

$ go build rfd-checker.go

Resources

About

RFD Checker - security CLI tool to test Reflected File Download issues

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages