htrace.sh simple shell script to debugging http/https traffic tracing, response headers and mixed-content. Scanning domain using Nmap NSE Library. Support external security tools: Mozilla Observatory and SSL Labs API.
htrace.sh is a shell script that allows you to validate your domain configuration and catch any errors (e.g. redirect loops). It also displays basic information about the ssl configuration (if available), response headers, checks for mixed content and performs security scans using Nmap scripts and great external tools such as Ssllabs or Mozilla Observatory.
Also Read WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques
It is useful for:
Note: Before use htrace.sh please see Requirements.
It’s simple:
# Clone this repository
git clone https://github.com/trimstray/htrace.sh
# Go into the repository
cd htrace.sh
# Install
./setup.sh install
# Run the app
htrace.sh --domain https://google.com
- symlink to
bin/htrace.sh
is placed in/usr/local/bin
- man page is placed in
/usr/local/man/man8
htrace.sh support external tools for security scans:
--format=report --rescan --zero --quiet
-quiet -grade
-user-agent \"$_user_agent\" --no-check-certificate
If you don’t know how to install these tools and where they should be placed, please see in Dockerfile where exactly every step is described.
Note: When scanning for mixed content and nmap scripting engine, remember that it may take a long time before the entire site is checked.
If you want to generate a report in html format, use the ansi2html.sh tool. A detailed description of use:
htrace.sh -d https://nmap.org -s -h | ansi2html --bg=dark > report.html
cd htrace.sh/build
docker build --rm -t htrace.sh -f Dockerfile .
docker run --rm -it --name htrace.sh htrace.sh -d http://nmap.org -h
Provides the following options:
htrace.sh v1.0.6
Usage:
htrace.sh <option|long-option>
Examples:
htrace.sh --domain https://example.com
htrace.sh --domain https://example.com -s -h --scan ssllabs
Options:
--help show this message
-d|--domain <domain_name> set domain name
-s|--ssl show ssl server/connection params
-h|--headers show response headers
--scan <all|observatory|ssllabs> scan domain with external security tools
--mixed-content scan website for mixed content
--nse scan website with nmap nse library
--user-agent <val> set 'User-Agent' header
--max-redirects <num> set max redirects (default: 10)
--timeout <num> set max timeout (default: 15)
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…