Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add feature load http headers from file #46

Closed
wants to merge 1 commit into from

Conversation

minight
Copy link

@minight minight commented May 28, 2017

Allows the user to specify http headers to send with dirbusting requests using a file. Useful when testing thick client web APIs that require some proprietary headers. Was unsure of whether to use cmdline arguments (like curl) or an arbitrary file.

Usage:

gobuster -u http://google.com/ -hf /tmp/header.file -w ~/wordlist/Filenames_or_Directories_All.wordlist -e

header.file:

Host: google.com
Accept: */*
User-Agent: foo
X-Proprietary-Header: bar
Authorization: Bearer <some jwt>

@OJ
Copy link
Owner

OJ commented May 28, 2017

Great idea, thank you for the submission! I will aim to get this locked away with a couple of other PRs very soon. Cheers 👍

@OJ OJ self-assigned this May 28, 2017
@OJ OJ added the enhancement label May 28, 2017
@OJ OJ added this to the Version 1.4 milestone May 28, 2017
@OJ
Copy link
Owner

OJ commented Jan 14, 2018

Hi @minight would you please do me a favour and rebase this against master? I've landed the 1.4 branch now, and so the project is structured very differently. Thank you!

@OJ OJ modified the milestones: Version 1.4, Version 1.5 Jan 14, 2018
@0xdevalias
Copy link
Contributor

Potentially related, may be relevant to consider with regards to this PR:

@codingo
Copy link

codingo commented Jun 28, 2018

@minight nudging you on this one. I've been tunneling through burp for this on various bounty programs which enforce headers, which isn't ideal. Definitely has value!

@OJ
Copy link
Owner

OJ commented Aug 27, 2018

Apologies for the delay on this, can I please request that you rebase your changes on 2.0.0 now that I've finally landed #79? Thank you so much.

firefart added a commit that referenced this pull request May 21, 2019
@OJ
Copy link
Owner

OJ commented Jun 20, 2019

I think this is superceded by the new -H flag. It doesn't load headers from file but at least you can wire them in on the command line.

Feel free to adjust and reopen if you think I'm wrong, but I'm going to close this one up for now. Cheers!

@OJ OJ closed this Jun 20, 2019
@OJ
Copy link
Owner

OJ commented Jun 20, 2019

Hmm.. I realise that CLI means you can blow command line length limits with big JWTs.

So yeah, might need to have this in a file. Are you happy to rebase this on master as it currently stands please? There's been a lot of changes recently. Thank you!

@OJ OJ reopened this Jun 20, 2019
@OJ OJ removed this from the Version 1.5 milestone Oct 1, 2019
@firefart
Copy link
Collaborator

firefart commented Jan 5, 2021

Closing because of no response. If you want to rebase it feel free to reopen the PR

@firefart firefart closed this Jan 5, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants