aboutsummaryrefslogtreecommitdiffstats
path: root/web/src/js/components/FlowTable/FlowRow.jsx
blob: 71a30e398d9d6ab815a49be6fb16bdf623da8878 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
55'>55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211
{% extends "docframe.html" %} {% block body %}
<div class="page-header">
    <h1>
        pathoc
        <small>A perverse HTTP client.</small>
    </h1>
</div>

<p>
    Pathoc is a perverse HTTP daemon designed to let you craft almost any conceivable
    HTTP request, including ones that creatively violate the standards. HTTP requests
    are specified using a
    <a href="/docs/language">small, terse language</a>, which pathod shares with
    its server-side twin <a href="/docs/pathod">pathod</a>. To view pathoc's complete
    range of options, use the command-line help:
</p>

<pre class="terminal">pathoc --help</pre>

<section>
    <div class="page-header">
        <h1>Getting Started</h1>
    </div>

    <p>The basic pattern for pathoc commands is as follows: </p>

    <pre class="terminal">pathoc hostname request [request ...]</pre>

    <p>
        That is, we specify the hostname to connect to, followed by one or more requests.
        Lets start with a simple example:
    </p>

    <pre class="terminal">
        &gt; pathoc google.com get:/ &lt;&lt; 301 Moved Permanently: 219 bytes
    </pre>

    <p>
        Here, we make a GET request to the path / on port 80 of google.com. Pathoc's output
        tells us that the server responded with a 301. We can tell pathoc to connect
        using SSL, in which case the default port is changed to 443 (you can over-ride
        the default port with the <b>-p</b> command-line option):
    </p>

    <pre class="terminal">
        &gt; pathoc -s google.com get:/ &lt;&lt; 301 Moved Permanently: 219 bytes
    </pre>
</section>


<section>
    <div class="page-header">
        <h1>Multiple Requests</h1>
    </div>

    <p>
        There are two ways to tell pathoc to issue multiple requests. The first is to specify
        them on the command-line, like so:
    </p>

    <pre class="terminal">
        &gt; pathoc google.com get:/ get:/ &lt;&lt; 301 Moved Permanently: 219 bytes &lt;&lt;
        301 Moved Permanently: 219 bytes
    </pre>

    <p>
        In this case, pathoc issues the specified requests over the same TCP connection -
        so in the above example only one connection is made to google.com
    </p>

    <p>The other way to issue multiple requets is to use the <b>-n</b> flag:</p>

    <pre class="terminal">
        &gt; pathoc -n 2 google.com get:/ &lt;&lt; 301 Moved Permanently: 219 bytes &lt;&lt; 301
        Moved Permanently: 219 bytes
    </pre>

    <p>
        The output is identical, but two separate TCP connections are made to the upstream
        server. These two specification styles can be combined:
    </p>

    <pre class="terminal">
        &gt; pathoc -n 2 google.com get:/ get:/ &lt;&lt; 301 Moved Permanently: 219 bytes &lt;&lt;
        301 Moved Permanently: 219 bytes &lt;&lt; 301 Moved Permanently: 219 bytes &lt;&lt;
        301 Moved Permanently: 219 bytes
    </pre>

    <p>Here, two distinct TCP connections are made, with two requests issued over each.</p>
</section>


<section>
    <div class="page-header">
        <h1>Basic Fuzzing</h1>
    </div>

    <p>
        The combination of pathoc's powerful request specification language and a few of
        its command-line options makes for quite a powerful basic fuzzer. Here's
        an example:
    </p>

    <pre class="terminal">
        &gt; pathoc -e -I 200 -t 2 -n 1000 localhost get:/:b@10:ir,@1
    </pre>

    <p>
        The request specified here is a valid GET with a body consisting of 10 random bytes,
        but with 1 random byte inserted in a random place. This could be in the headers,
        in the initial request line, or in the body itself. There are a few things
        to note here:
    </p>

    <ul>
        <li>
            Corrupting the request in this way will often make the server enter a state where
            it's awaiting more input from the client. This is where the
            <b>-t</b> option comes in, which sets a timeout that causes pathoc to
            disconnect after two seconds.
        </li>

        <li>
            The <b>-n</b> option tells pathoc to repeat the request 1000 times.
        </li>

        <li>
            The <b>-I</b> option tells pathoc to ignore HTTP 200 response codes.
            You can use this to fine-tune what pathoc considers to be an exceptional
            condition, and therefore log-worthy.
        </li>

        <li>
            The <b>-e</b> option tells pathoc to print an explanation of each logged
            request, in the form of an expanded pathoc specification with all random
            portions and automatic header additions resolved. This lets you precisely
            replay a request that triggered an error.
        </li>
    </ul>
</section>


<section>
    <div class="page-header">
        <h1>Interacting with Proxies</h1>
    </div>

    <p>
        Pathoc has a reasonably sophisticated suite of features for interacting with proxies.
        The proxy request syntax very closely mirrors that of straight HTTP, which
        means that it is possible to make proxy-style requests using pathoc without
        any additional syntax, by simply specifying a full URL instead of a simple
        path:
    </p>

    <pre class="terminal">&gt; pathoc -p 8080 localhost "get:'http://google.com'"</pre>

    <p>
        Another common use case is to use an HTTP CONNECT request to probe remote servers
        via a proxy. This is done with the <b>-c</b> command-line option,
        which allows you to specify a remote host and port pair:
    </p>

    <pre class="terminal">&gt; pathoc -c google.com:80 -p 8080 localhost get:/</pre>

    <p>
        Note that pathoc does <b>not</b> negotiate SSL without being explictly instructed
        to do so. If you're making a CONNECT request to an SSL-protected resource,
        you must also pass the <b>-s</b> flag:
    </p>

    <pre class="terminal">&gt; pathoc -sc google.com:443 -p 8080 localhost get:/</pre>
</section>


<section>
    <div class="page-header">
        <h1>Embedded response specification</h1>
    </div>

    <p>
        One interesting feature of the Request sppecification language is that you can embed
        a response specifcation in it, which is then added to the request path. Here's
        an example:
    </p>

    <pre class="terminal">&gt; pathoc localhost:9999 "get:/p/:s'401:ir,@1'"</pre>

    <p>
        This crafts a request that connects to the pathod server, and which then crafts a
        response that generates a 401, with one random byte embedded at a random
        point. The response specification is parsed and expanded by pathoc, so you
        see syntax errors immediately. This really becomes handy when combined with
        the <b>-e</b> flag to show the expanded request:
    </p>

    <pre class="terminal">
        &gt; > pathoc -e localhost:9999 "get:/p/:s'401:ir,@1'" >> Spec: get:/p/:s'401:i15,\'o\':h\'Content-Length\'=\'0\'':h'Content-Length'='0'
        << 401 Unoauthorized: 0 bytes </pre>

    <p>
        Note that the embedded response has been resolved <i>before</i> being sent
        to the server, so that "ir,@1" (embed a random byte at a random location)
        has become "i15,\'o\'" (embed the character "o" at offset 15). You now have
        a pathoc request specification that is precisely reproducable, even with
        random components. This feature comes in terribly handy when testing a proxy,
        since you can now drive the server repsonse completely from the client, and
        have a complete log of reproducible requests to analyse afterwards.
    </p>
</section>
{% endblock %}