Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate and apply Bletchley usage to OWTF #46

Closed
7a opened this issue Aug 19, 2013 · 2 comments
Closed

Investigate and apply Bletchley usage to OWTF #46

7a opened this issue Aug 19, 2013 · 2 comments

Comments

@7a
Copy link
Member

7a commented Aug 19, 2013

Bletchley is a tool to assist exploitation of crypto issues in web applications, we should investigate how to apply this both from a PoC perspective (external plugins, which assist manual exploitation) as well as grep, semi_passive and active plugins:

https://code.google.com/p/bletchley/

@viyatb
Copy link
Member

viyatb commented May 20, 2015

External plugins may include passing obfuscated data to bletchley's analyzer and piping the output to report.

But the main thing that can be done is to use the Bletchley's script generator for efficient automation of HTTP requests --> replay HTTP requests that are passed through Bletchley to analyse target responses.

https://code.google.com/p/bletchley/source/browse/trunk/bin/bletchley-http2py

@viyatb viyatb removed this from the OWTF 0.40 Summer Storm III milestone May 20, 2015
@viyatb
Copy link
Member

viyatb commented Aug 15, 2017

Moved to owtf/community-plugins#1.

@viyatb viyatb closed this as completed Aug 15, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants