Rabid : Tool To Decode All Kind Of BigIP Cookies

Rabid is a CLI tool and library allowing to simply decode all kind of BigIP cookies.

Features

  • Support all 4 cookie formats
  • CLI tool & library
  • Hackable

Quick install

$ gem install rabid

Default usage: CLI

$ rabid ‘BIGipServer=1677787402.36895.0000’
Pool name:
Cookie type: IPv4 pool members
Raw cookie: BIGipServer=1677787402.36895.0000
Decoded cookie: 10.1.1.100:8080

Default usage: library

require ‘bigipcookie’
#IPv4 pool members, with pool name
bip = BigIPCookie::Decode.new(‘BIGipServer=1677787402.36895.0000’)
#Automatically decode
bip.auto_decode
#Print result
puts “Cookie: #{bip.decoded_cookie}”

Also Read – NekoBot : Auto Exploiter With 500+ Exploit 2000+ Shell

Installation

Production

Install from rubygems.org

$ gem install rabid

Gem: rabid

Install from BlackArch

From the repository:

#pacman -S rabid

From git:

#blackman -i rabid

PKGBUILD: rabid

Install from ArchLinux

Manually:

$ git clone https://aur.archlinux.org/rabid.git
$ cd rabid
$ makepkg -sic

With an AUR helper (Pacman wrappers), eg. pikaur:

$ pikaur -S rabid

AUR: rabid

Development

It’s better to use rbenv to have latests version of ruby and to avoid trashing your system ruby.

Install from rubygems.org

$ gem install –development rabid

Build from git

Just replace x.x.x with the gem version you see after gem build.

$ git clone https://github.com/Orange-Cyberdefense/rabid.git rabid
$ cd rabid
$ gem install bundler
$ bundler install
$ gem build bigipcookie.gemspec
$ gem install rabid-x.x.x.gem

Note: if an automatic install is needed you can get the version with $ gem build bigipcookie.gemspec | grep Version | cut -d’ ‘ -f4.
Run the library in irb without installing the gem

From local file:

$ irb -Ilib -rbigipcookie

From the installed gem:

$ rabid_console

Same for the CLI tool:

$ ruby -Ilib -rbigipcookie bin/rabid

Credit: Alexandre ZANNI (@noraj)

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

11 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

11 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

11 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

11 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

11 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

14 hours ago