Provided by: ratproxy_1.58+dfsg-3build1_amd64 bug

NAME

       ratproxy - a passive web application security assessment tool

SYNOPSIS

       ratproxy   [-w   logfile]   [-v   logdir]   [-p   port]   [-d   domain]   [-P   host:port]
       [-xtifkgmjscael2XCr]

DESCRIPTION

       Ratproxy is a semi-automated, largely passive web application security audit tool.  It  is
       meant  to  complement active crawlers and manual proxies more commonly used for this task,
       and is optimized specifically for an  accurate  and  sensitive  detection,  and  automatic
       annotation,  of  potential  problems  and  security-relevant  design patterns based on the
       observation of existing, user-initiated traffic in complex web 2.0 environments.

OPTIONS

       -w logfile    - write results to a specified file (default: stdout)

       -v logdir     - write HTTP traces to a specified directory (default: none)

       -p port       - listen on a custom TCP port (default: 8080)

       -d domain     - analyze requests to specified domains only (default: all)

       -P host:port  - use upstream proxy for all requests (format host:port)

       -r            - accept remote connections (default: 127.0.0.1 only)

       -l            - use response length, not checksum, for identity check

       -2            - perform two, not one, page identity check

       -e            - perform pedantic caching headers checks

       -x            - log all XSS candidates

       -t            - log all directory traversal candidates

       -i            - log all PNG files served inline

       -f            - log all Flash applications for analysis (add -v to decompile)

       -s            - log all POST requests for analysis

       -c            - log all cookie setting URLs for analysis

       -g            - perform XSRF token checks on all GET requests

       -j            - report on risky Javascript constructions

       -m            - log all active content referenced across domains

       -X            - disruptively validate XSRF, XSS protections

       -C            - try to auto-correct persistent side effects of -X

       -k            - flag HTTP requests as bad (for HTTPS-only applications)

       -a            - indiscriminately report all visited URLs

EXAMPLES

       Example settings suitable for most tests:

       1) Low verbosity  : -v <outdir> -w <outfile> -d <domain> -lfscm

       2) High verbosity : -v <outdir> -w <outfile> -d <domain> -lextifscgjm

       3) Active testing : -v <outdir> -w <outfile> -d <domain> -XClfscm

       Multiple -d options are allowed. Consult the documentation for more.

AUTHOR

       ratproxy is written and maintained by Michal Zalewski <lcamtuf@google.com>

       This manual page was generated via help2man by Iustin Pop <iusty@k1024.org> for the Debian
       project (but may be used by others).

SEE ALSO

       ratproxy-report(1)