Concuss is a tool for banging against a url with a bunch of different headers to look for potential vulnerabilities.
It works by sending a custom or a random string to a webserver for a specific url in a variety of headers to see if it's able to get that string to appear on the page. If so, you'll get a HIT and you can evaluate that header to see if it's useful for some kind of XSS, cache poisoning, or some other form of injection from malformed headers.
Often times web app and framework developers assume that headers from the client are not malicious or manipulated and will just write them out to the page in one form or another. This project is a specialized tool to find instances of this so that they can be fixed before they are abused.
Concuss is not a tool for automating vulnerabilities, nor should it be used to certify that a page is safe from vulnerabilities. It should not be used on applications or website that you do not personally have permission to scan.
Sending malformed headers to a site can potentially cause errors, crashing, and other damage that I am not responsible for as a result of any usage of this tool. You agree to use this tool at your own risk.
Install the gem and add to the application's Gemfile by executing:
$ bundle add concuss
If bundler is not being used to manage dependencies, install the gem by executing:
$ gem install concuss
Primarily, you'll want to use it as a CLI like so:
concuss http://localhost:4567
concuss http://localhost:4567 -h non_standard
See concuss --help
for more usage details.
While concuss is designed to be used as a command line tool, you can also include it in your own custom application like so:
require 'concuss'
concuss = Concuss.new(url: 'http://localhost:4567', file: 'header_file.txt', header_set: :standard, test_string: "OOGABOOGA")
report = concuss.attack!
From there, you'll get a Concuss::Report
object that contains the raw data as well as filters for hits
, misses
, headers
, and the url
in the event you've done a bunch of these.
There is a sample app with a vulnerability to test with in the vuln_app
directory. It takes the contents of X-CSRF-Token
and spits them out blindly.
Here's some steps to get going with that:
docker-compose build
docker-compose run console bash
# You should see the vuln_app container boot up and
# then you'll land in bash on the console container
bin/concuss http://vuln_app:4567 -h non_standard
Primarily, you'll want to use Docker to do debugging and development. To get into the console, just run docker-compose run console bash
and from there you can run bin/concuss
against the sample vulnerable app, or you can run rspec
to run the specs.
If you prefer to develop without docker, after checking out the repo, run bundle install
to install dependencies. Then, run rspec
to run the tests.
When developing using docker or on your bare machine you can also run script/console
for an interactive prompt that will allow you to experiment. This will give you access to the underlying classes and let you experiment outside the confines of the CLI.
If you add features or fix bugs, please write specs and open up a PR.
Note: Concuss was designed to easily install on most systems with ruby 3+. As such, its only dependencies are in the ruby standard library.
Bug reports and pull requests are welcome on GitHub at https://github.com/patricktulskie/concuss
The gem is available as open source under the terms of the MIT License.