ronin-listener-http is a DNS server for receiving exfiltrated data sent via HTTP requests. ronin-listener-http can be used to test for Server-Side Request Forgery (SSRF) or XML external entity (XXE) injection.
- Supports receiving HTTP requests.
- Supports filtering HTTP requests by path or
Host
header.
require 'ronin/listener/http'
Ronin::Listener::HTTP.listen(host: '127.0.0.1', port: 8080) do |request|
puts "#{request.method} #{request.path} #{request.version}"
request.headers.each do |name,value|
puts "#{name}: #{value}"
end
puts request.body if request.body
puts
end
- Ruby >= 3.0.0
- async-http ~> 1.0
$ gem install ronin-listener-http
gem 'ronin-listener-http', '~> 0.1'
gem.add_dependency 'ronin-listener-http', '~> 0.1'
- Fork It!
- Clone It!
cd ronin-listener-http/
bundle install
git checkout -b my_feature
- Code It!
bundle exec rake spec
git push origin my_feature
Copyright (c) 2023-2024 Hal Brodigan ([email protected])
ronin-listener-http is free software: you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
ronin-listener-http is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with ronin-listener-http. If not, see https://www.gnu.org/licenses/.