Files
Bolt/README.md

77 lines
2.6 KiB
Markdown
Raw Normal View History

2018-12-30 03:09:25 +05:30
<h1 align="center">
<br>
<a href="https://github.com/s0md3v/Bolt"><img src="https://i.ibb.co/2tnkLvt/bolt.png" alt="Bolt"></a>
<br>
Bolt
<br>
</h1>
<h4 align="center">A dumb CSRF scanner</h4>
<p align="center">
<a href="https://github.com/s0md3v/Bolt/releases">
<img src="https://img.shields.io/github/release/s0md3v/Bolt.svg">
</a>
<a href="https://travis-ci.com/s0md3v/Bolt">
<img src="https://img.shields.io/travis/com/s0md3v/Bolt.svg">
</a>
<a href="https://github.com/s0md3v/Bolt/issues?q=is%3Aissue+is%3Aclosed">
<img src="https://img.shields.io/github/issues-closed-raw/s0md3v/Bolt.svg">
</a>
</p>
2018-12-30 03:15:25 +05:30
2018-12-30 03:53:30 +05:30
![demo](https://i.ibb.co/mTtHTGP/Screenshot-2018-12-30-03-42-26.png)
2018-12-30 03:15:25 +05:30
### Important
Bolt is in alpha phase of development which means it's full of bugs. Any production use of this tool discouraged.
2018-12-30 03:53:30 +05:30
Pull requests and issues are welcome. I also suggest you to put this repo on watch if you are interested in it.
2019-01-14 02:18:53 +05:30
### Workflow
#### Crawling
Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing.
#### Evaluating
In this phase, these three things are checked:
- Forms without CSRF protection
- Weak tokens
- Comparison of token with various hashes
##### Comparing
This phase focuses on detection on replay attack scenarios and hence checks if a token has been issued more than one time.
It also calculates the average [levenshtein distance](https://en.wikipedia.org/wiki/Levenshtein_distance) between all the tokens to see if they are similar.
##### Observing
In this phase, 100 simultaneous requests are made to a single webpage to see if same tokens are generated for the requests.
##### Testing
This phase is dedicated to active testing of the CSRF protection mechanism.
It performs the followings checks
- Mobile CSRF protection test
- Request without CSRF token parameter
- Request without CSRF token parameter value
- Request with a self generated token
##### Analysing
Various statistical checks are performed in this phase to see if the token is really random.
Following tests are performed during this phase
- Monobit test
2018-12-30 03:15:25 +05:30
### Usage
Scanning a website for CSRF using Bolt is as easy as doing
```
python3 bolt.py -u https://github.com -l 2
```
Where `-u` is used to supply the URL and `-l` is used to specify the depth of crawling.
Other options and switches:
- `-t` number of threads
- `--delay` delay between requests
- `--timeout` http request timeout
- `--headers` supply http headers
2018-12-30 03:53:30 +05:30
#### Credits
Regular Expressions for detecting hashes are taken from [hashID](https://github.com/psypanda/hashID).