Request Grabber

During pentesting activies, we may want to catch HTTP requests, such as during a CSRF attack or a XSS attack.

If our machine is within the same network, we can use nc:

$ nc -lnvp PORT
<send request to YOUR_PUBLIC_IP:PORT>

πŸ“š We can use responder for Windows Authentication Requests.

⚠️ Remember to use a SSH backdoor when available (CTFs, etc.).

We may use online public solutions such as API Testing Platforms:

  • requestbin (HTTP 🌍)
  • postbin (HTTP 🌍)
  • ngrok (HTTP 🌍 and TCP ⭐, credit card required for free plan πŸ’΅)
  • pinggy (TCP ⭐, account required ☠️)
  • requestinspector (HTTP 🌍)
  • beeceptor (HTTP 🌍, custom replies 🐐)
  • pastebin (HTTP + UPLOAD 🌍, use URL to raw file after upload)
  • github.io (HTTP + UPLOAD 🌍, account required πŸͺ¦)
  • ...

πŸ‘» To-do πŸ‘»

Stuff that I found, but never read/used yet.

To use pinggy, create an account to get your SSH command. Run it with localhost:4444 the final destination of the forwarded traffic.

$ ssh -p 443 -R0:localhost:4444 -o StrictHostKeyChecking=no -o ServerAliveInterval=30 {secret}+tcp@a.pinggy.io
You will see here the DOMAIN and the PORT to use

It's often a reverse shell catcher such as netcat.

$ nc -lnvp 4444