Kali Linux

Cdb : Automate Common Chrome Debug Protocol Tasks To Help Debug Web Applications

CDB is a Chrome Debug Protocol utility. The main goal of the tool is to automate common tasks to help debug web applications from the command-line and actively monitor and intercept HTTP requests and responses. This is particularly useful during penetration tests and other types of security assessments and investigations.

Quickstart

This tool is meant to be used as part of Pown.js but it can be invoked separately as an independent tool.

Install Pown first as usual:

$ npm install -g pown@latest

Invoke directly from Pown:

$ pown cdb

Library Use

Install this module locally from the root of your project:

$ npm install @pown/cdb –save

Once done, invoke pown cli:

$ POWN_ROOT=. ./node_modules/.bin/pown-cli cdb

Usage

pown cdb
Chrome Debug Protocol Tool
Commands:
pown cdb launch Launch server application such as chrome, firefox, opera and edge [aliases: start]
pown cdb navigate Go to the specified url [aliases: goto, go]
pown cdb network Chrome Debug Protocol Network Monitor [aliases: net, sniff, proxy, mon, monitor]
pown cdb cookies Dump current page cookies [aliases: cookie]
pown cdb screenshot Screenshot the current page [aliases: capture, shoot, shot]
Options:
–version Show version number [boolean]
–help Show help [boolean]

pown cdb navigate

pown cdb navigate
Go to the specified url
Options:
–version Show version number [boolean]
–help Show help [boolean]
–host, -H Remote debugging host [string] [default: “localhost”]
–port, -p Remote debugging port [number] [default: 9222]
–secure, -s HTTPS/WSS frontend [boolean] [default: false]

pown cdb network

pown cdb network
Chrome Debug Protocol Network Monitor
Options:
–version Show version number [boolean]
–help Show help [boolean]
–host, -H Remote debugging host [string] [default: “localhost”]
–port, -p Remote debugging port [number] [default: 9222]
–secure, -s HTTPS/WSS frontend [boolean] [default: false]
–output, -o Output directory/file [array] [default: []]
–blessed, -b Start with blessed ui [boolean] [default: false]

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago