Skip to content
/ wcde Public

Implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!"

License

Notifications You must be signed in to change notification settings

Golim/wcde

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Web Cache Deception Escalates

Python implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!" published at USENIX Security '22: Web Cache Deception Escalates!.

Detect WCD vulnerabilities in websites in a black-box manner.

Usage

On a Single Target

usage: wcde.py -t example.com

For more information about the options, please see the help page.

On a List of Targets

usage: launcher.py -s sites.txt

For more information about the options, please see the help page.

DE with Authentication

Requires an account to be manually created on the website so that the attack URL is requested with valid authentication cookies, simulating a logged-in victim clicking on the malicious link.

The JSON cookies file contains a list of cookies and can be generated using the browser extension Cookie-Editor for Firefox or Chrome.

usage: wcde.py -t example.com -c example.com-cookies.json

Adding more Path Confusion Techniques

The --path-confusion option allows adding more path confusion techniques from a JSON file structured as follows:

{
  "EXAMPLE_ONE": "%2E%2E",
  "EXAMPLE_TWO": "%2E%2E%3F%2E%2E"
}

Using different file extensions

The --extensions option allows adding more file extensions separated by commas.

usage: wcde.py -t example.com --extensions ".pdf, .png, .jpg, .js, .css"

Setup

pip install -r requirements.txt

Screenshots

DE testing a vulnerable target with authentication.

Screenshot

Notice

  • The code is provided as-is and is not guaranteed to detect all WCD vulnerabilities.
    • If the script does not find any vulnerabilities, it does not necessarily mean that the website is not vulnerable.
  • You should use this script only against websites that you own or control, or for which you have permission to perform security analysis.

About

Implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!"

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages