You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-4Lines changed: 9 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ Khata is written in PHP (Yes, I said PHP) because PHP is easily available on all
14
14
For data security I am encrypting received request with AES-256-OFB and keeping them in a plain text file (Now don't be so melodramatic). From where C2 (index.php) picks up all the data decrypts it and present it in readable form. For C2 security I have tried to keep up with the security measures like Anti-CSRF, Captcha, Security Headers, and other stuff I can't remember. (If you have any suggestions to improve security put them in suggestion box).
15
15
16
16
# Demo
17
-
http://khata.getforge.io/
17
+
http://khata.mtk911.cf/
18
18
19
19
## Getting Started
20
20
Deploying khata is super easy you just need to have and do few things:
@@ -26,7 +26,7 @@ Done
26
26
## The necessary
27
27
1. Change Username and Password(Make sure it is SHA256) in configuration file
28
28
2. Change Key and IV in configuration file for encryption
29
-
3. Change file name in configuration file
29
+
3. Change file name of logs and responder in configuration file
30
30
4. Change random1 and random2 variable
31
31
5. Make sure catch.php has permission to write in directory
32
32
@@ -36,7 +36,7 @@ Done
36
36
3. For security reason log file size is limited to 1 GB you can change it to whatever you want
37
37
38
38
## Arming
39
-
Khata can be use to detect XSS and SSRF using Khata as a listener. For XSS place Khata in script tag source <scriptsrc="http://abc.xyz/catch.php"> in case of XSS vulnerability you will be able to see a log entry in C2. For SSRF visit following [blog](https://portswigger.net/web-security/ssrf).
39
+
Khata can be use to detect XSS and SSRF using Khata as a listener. For XSS place Khata in script tag source <scriptsrc="http://abc.xyz/catch.php"> in case of XSS vulnerability you will be able to see a log entry in C2. For SSRF visit following [blog](https://portswigger.net/web-security/ssrf). Using responder function you can define your own response which turns KHATA into multi-function tool and sky is the limit.
40
40
41
41
## File Facts
42
42
**index.php**: C2 where you view all data<br>
@@ -50,7 +50,7 @@ Khata can be use to detect XSS and SSRF using Khata as a listener. For XSS place
All the software/scripts/applications/things in this repository are provided as is, without warranty of any kind. Use of these software/scripts/applications/things is entirely at your own risk. Creator of these softwares/scripts/applications/things is not responsible for any direct or indirect damage to your own or defiantly someone else's property resulting from the use of these software/scripts/applications/things.
@@ -77,3 +77,8 @@ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
77
77
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
78
78
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
79
79
SOFTWARE.
80
+
81
+
# Changes
82
+
### Ver 2.0
83
+
+ Added responder functionality to display or execute custom payloads on catch.php response
0 commit comments