kali信息收集工具之Cookie Cadger

Cookie Cadger helps identify information leakage from applications that utilize insecure HTTP GET requests.

Web providers have started stepping up to the plate since Firesheep was released in 2010. Today, most major websites can provide SSL/TLS during all transactions, preventing cookie data from leaking over wired Ethernet or insecure Wi-Fi. But the fact remains that Firesheep was more of a toy than a tool. Cookie Cadger is the first open-source pen-testing tool ever made for intercepting and replaying specific insecure HTTP GET requests into a browser.

Cookie Cadgers Request Enumeration Abilities

Cookie Cadger is a graphical utility which harnesses the power of the Wireshark suite and Java to provide a fully cross-platform, entirely open- source utility which can monitor wired Ethernet, insecure Wi-Fi, or load a packet capture file for offline analysis.

一款抓包工具,可以這麼說~~~

GUI工具

Tools included in the cookie-cadger package

cookie-cadger – Cookie auditing tool for wired and wireless networks

root@kali:~# cookie-cadger –help
Cookie Cadger, version 1.06
Example usage:
java -jar CookieCadger.jar
–tshark=/usr/sbin/tshark
–headless=on
–interfacenum=2 (requires –headless=on)
–detection=on
–demo=on
–update=on
–dbengine=mysql (default is ‘sqlite’ for local, file-based storage)
–dbhost=localhost (requires –dbengine=mysql)
–dbuser=user (requires –dbengine=mysql)
–dbpass=pass (requires –dbengine=mysql)
–dbname=cadgerdata (requires –dbengine=mysql)
–dbrefreshrate=15 (in seconds, requires –dbengine=mysql, requires –headless=off)
Cookie Cadger Usage Example

root@kali:~# cookie-cadger

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章