OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions.
Project description
Quick links
- Website.
- OWASP page.
- Documentation.
- Installation.
- FAQ.
- Getting started.
- Architecture.
- Discussions.
- Issues.
- Twitter.
- Fediverse.
What is Raider
OWASP Raider was developed with the goal to improve web authentication testing. By now it has evolved and can be used for all kinds of stateful HTTP processes. It abstracts the client-server information exchange as a finite state machine. Each step comprises one request with inputs, one response with outputs, arbitrary actions to do on the response, and conditional links to other stages. Thus, a graph-like structure is created. Raider allows you to simulate complex systems while allowing you to control each piece of data you get in and out of the system.
Graph-like architecture
Raider defines a DSL to describe the information flow between the client and the server for HTTP processes. Each step of the process is described by a Flow, which contains the Request with inputs, Response with outputs, and arbitrary actions including links to other Flows:
Chaining several Flows together can be used to simulate any stateful HTTP process. FlowGraphs indicate the starting point. They can be placed on any Flow. A FlowGraphs runs all Flows in the link until Success/Failure is returned or if there are no more links.
Configuration
Raider's configuration is inspired by Emacs. Hylang is used, which is LISP on top of Python. LISP is used because of its "Code is Data, Data is Code" property. With the magic of LISP macros generating configuration automatically becomes easy. Flexibility is in its DNA, meaning it can be infinitely extended with actual code. You can use it for example to create, store, reproduce, and share proof-of-concepts easily for HTTP attacks. With Raider you can also search through your Projects, filter by hyfile, Flows, FlowGraphs, etc... Then you run either just one step, or a chain of steps, so you can automate and run tests on any HTTP process.
Command line interface
You can use it for example to create, store, reproduce, and share proof-of-concepts easily for HTTP attacks. With Raider you can also search through your Projects, filter by hyfile, Flows, FlowGraphs, etc... Then you run either just one step, or a chain of steps, so you can automate and run tests on any HTTP process.
You can also search through your Projects, filter by hyfile, Flows, FlowGraphs, etc… Then you run either just one step, or a chain of steps, so you can automate and run tests the HTTP process.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file raider-0.3.3.tar.gz
.
File metadata
- Download URL: raider-0.3.3.tar.gz
- Upload date:
- Size: 11.4 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.3.1 CPython/3.10.8 Linux/6.0.12-arch1-1
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 81fd8055692d8860578f2e54b1e42e1285cfc71e60cb56ef5d8a71e468ed55af |
|
MD5 | 77e789507ac2b7ae63038adfe24ae88b |
|
BLAKE2b-256 | f942be61844549b0596edbf6e56f622c0a7715b47b4b9c369b8791ad61f88fdd |
File details
Details for the file raider-0.3.3-py3-none-any.whl
.
File metadata
- Download URL: raider-0.3.3-py3-none-any.whl
- Upload date:
- Size: 96.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.3.1 CPython/3.10.8 Linux/6.0.12-arch1-1
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | fe6e329ee00bee07c63f186d7b085eda598d3c9d32580a0450948abcefdcb578 |
|
MD5 | e24a80c4f093c47d26f93aed9b240e1e |
|
BLAKE2b-256 | bd02a1933b7cec999e5db7eb5729fc56bc612233d8fcfb6a233c36cfbfc72180 |