2.0.5 • Published 5 years ago
hejhog v2.0.5
hejhog
A simple browser forwarding proxy cli tool useful for analysing web applications.
usage
- Create some self signed certificates* in the current working directory,
- install hejhog globally (npm i hejhog -g) and run the
hejhogcommand. - Configure your browser to use
localhost:8080as the http and https proxy. - Add a self signed certificate authority to the browser.
> hejhog --help
> hejhog --just-urlsYou will then see the throughput when connecting to duckduckgo.com in the browser...
<hejhog> listening @ 8080intercepting https *
You must set up a self signed cryptographic key and certificate to intercept https traffic. This tool has only been tested in https intercepting mode.
Place self signed certificate and keys in the working directory to automatically use them, or alternatively
provide the key and cert parameters directly.
create a self signed certificate with OpenSSL
# create the key
openssl genrsa -out ./key.pem 2048
# create the cert
openssl req -x509 -new -nodes -key ./key.pem -days 1024 -out crt.pem -subj "/C=US/ST=Utah/L=Provo/O=ACME Signing Authority Inc/CN=example.com"add the certificate to the browser
Go to browser preferences / privacy / certificates... add your self signed certificate to the "authorities" tab and select the checkboxes.configure the browser using hejhog as a proxy server
Go to browser preferences / networks / proxy settings: configure http & https proxy to the portsaving a session
Hejhog works as a ut8 encoded text stream so you can easily store the output of hejhog to a text file for later analysis.
hejhog -v > ./log.txtissues
Please report any issues.
install
npm i hejhog -g