man spikeproxy (Commandes) - web application auditing tool

NAME

spikeproxy - web application auditing tool

SYNOPSIS

spkproxy [port]

DESCRIPTION

This manual page documents briefly the spikeproxy command. This manual page was written for the Debian distribution because the original program does not have a manual page.

SPIKE proXY functions as an HTTP and HTTPS proxy, and allows web developers or web application auditors low level access to the entire web application interface, while also providing a number of automated tools and techniques for discovering common problems. These automated tools include:

1.Automated SQL Injection Detection

2.Web Site Crawling (guaranteed not to crawl sites other than the one being tested)

3.Login form brute forcing

4.Automated overflow detection

5.Automated directory traversal detection

In addition to automated analysis, SPIKE proXy allows the user to penetrate into the internals of the web application by viewing and changing all variables, cookies, headers, or other parts of the request and resubmit them. SPIKE proXy maintains a careful record of each request made - saving both each request, and the entire response. The user can later go back and replace any request or view any response.

OPTIONS

This program has only one optional argument: the port the proxy will listen on (it defaults to 8080 if not provided).

SEE ALSO



The program provides inline documentation in the user interface when connected to it through a web client. If you are trying to audit a web application you might want to read OWASP Guide to Building Secure Web Applications and Web Services, Application Security Attack Components project, Application Security Testing Framework, and the OWASP Web Application Security TopTen available at http://www.owasp.org and the World Wide Web Security FAQ available at http://www.w3.org/Security/Faq/

AUTHOR

This manual page was written by Javier Fernandez-Sanguino Pen~a <jfs@computer.org>, for the Debian GNU/Linux system (but may be used by others).