hejhog

2.0.5 • Public • Published

hejhog

A simple browser forwarding proxy cli tool useful for analysing web applications.

usage

  • Create some self signed certificates* in the current working directory,
  • install hejhog globally (npm i hejhog -g) and run the hejhog command.
  • Configure your browser to use localhost:8080 as the http and https proxy.
  • Add a self signed certificate authority to the browser.
> hejhog --help
> hejhog --just-urls

You will then see the throughput when connecting to duckduckgo.com in the browser...

<hejhog> listening @ 8080

intercepting https *

You must set up a self signed cryptographic key and certificate to intercept https traffic. This tool has only been tested in https intercepting mode.

Place self signed certificate and keys in the working directory to automatically use them, or alternatively provide the key and cert parameters directly.

create a self signed certificate with OpenSSL

# create the key
openssl genrsa -out ./key.pem 2048
# create the cert
openssl req -x509 -new -nodes -key ./key.pem -days 1024 -out crt.pem -subj "/C=US/ST=Utah/L=Provo/O=ACME Signing Authority Inc/CN=example.com"

add the certificate to the browser

Go to browser preferences / privacy / certificates... add your self signed certificate to the "authorities" tab and select the checkboxes.

configure the browser using hejhog as a proxy server

Go to browser preferences / networks / proxy settings: configure http & https proxy to the port

saving a session

Hejhog works as a ut8 encoded text stream so you can easily store the output of hejhog to a text file for later analysis.

hejhog -v > ./log.txt

issues

Please report any issues.

install

npm i hejhog -g

Readme

Keywords

none

Package Sidebar

Install

npm i hejhog

Weekly Downloads

0

Version

2.0.5

License

MIT

Unpacked Size

53.2 kB

Total Files

4

Last publish

Collaborators

  • yaus