Merge remote-tracking branch 'origin/main' into refactor-fastapi
This commit is contained in:
29
README.md
29
README.md
@@ -109,7 +109,7 @@ services:
|
|||||||
- "5000:5000"
|
- "5000:5000"
|
||||||
environment:
|
environment:
|
||||||
- CONFIG_LOCATION=config.yaml
|
- CONFIG_LOCATION=config.yaml
|
||||||
- "TZ=Europe/Rome"
|
- TZ=Europe/Rome
|
||||||
volumes:
|
volumes:
|
||||||
- ./config.yaml:/app/config.yaml:ro
|
- ./config.yaml:/app/config.yaml:ro
|
||||||
# bind mount for firewall exporters
|
# bind mount for firewall exporters
|
||||||
@@ -308,6 +308,31 @@ The `/api/xml` and `/api/parser` endpoints accept XML input and are designed to
|
|||||||
|
|
||||||
### Command Injection Detection
|
### Command Injection Detection
|
||||||
Pages like `/api/exec`, `/api/run`, and `/api/system` simulate command execution endpoints vulnerable to **command injection**. When attackers attempt to inject shell commands using patterns like `; whoami`, `| cat /etc/passwd`, or backticks, Krawl responds with realistic command outputs. For example, `whoami` returns fake usernames like `www-data` or `nginx`, while `uname` returns fake Linux kernel versions. Network commands like `wget` or `curl` simulate downloads or return "command not found" errors, creating believable responses that delay and confuse automated exploitation tools.
|
Pages like `/api/exec`, `/api/run`, and `/api/system` simulate command execution endpoints vulnerable to **command injection**. When attackers attempt to inject shell commands using patterns like `; whoami`, `| cat /etc/passwd`, or backticks, Krawl responds with realistic command outputs. For example, `whoami` returns fake usernames like `www-data` or `nginx`, while `uname` returns fake Linux kernel versions. Network commands like `wget` or `curl` simulate downloads or return "command not found" errors, creating believable responses that delay and confuse automated exploitation tools.
|
||||||
|
## Example usage behind reverse proxy
|
||||||
|
|
||||||
|
You can configure a reverse proxy so all web requests land on the Krawl page by default, and hide your real content behind a secret hidden url. For example:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
location / {
|
||||||
|
proxy_pass https://your-krawl-instance;
|
||||||
|
proxy_pass_header Server;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /my-hidden-service {
|
||||||
|
proxy_pass https://my-hidden-service;
|
||||||
|
proxy_pass_header Server;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Alternatively, you can create a bunch of different "interesting" looking domains. For example:
|
||||||
|
|
||||||
|
- admin.example.com
|
||||||
|
- portal.example.com
|
||||||
|
- sso.example.com
|
||||||
|
- login.example.com
|
||||||
|
- ...
|
||||||
|
|
||||||
|
Additionally, you may configure your reverse proxy to forward all non-existing subdomains (e.g. nonexistent.example.com) to one of these domains so that any crawlers that are guessing domains at random will automatically end up at your Krawl instance.
|
||||||
|
|
||||||
## Customizing the Canary Token
|
## Customizing the Canary Token
|
||||||
To create a custom canary token, visit https://canarytokens.org
|
To create a custom canary token, visit https://canarytokens.org
|
||||||
@@ -317,7 +342,7 @@ and generate a “Web bug” canary token.
|
|||||||
This optional token is triggered when a crawler fully traverses the webpage until it reaches 0. At that point, a URL is returned. When this URL is requested, it sends an alert to the user via email, including the visitor’s IP address and user agent.
|
This optional token is triggered when a crawler fully traverses the webpage until it reaches 0. At that point, a URL is returned. When this URL is requested, it sends an alert to the user via email, including the visitor’s IP address and user agent.
|
||||||
|
|
||||||
|
|
||||||
To enable this feature, set the canary token URL [using the environment variable](#configuration-via-environment-variables) `CANARY_TOKEN_URL`.
|
To enable this feature, set the canary token URL [using the environment variable](#configuration-via-environment-variables) `KRAWL_CANARY_TOKEN_URL`.
|
||||||
|
|
||||||
## Customizing the wordlist
|
## Customizing the wordlist
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user