web cache deception detect
Follow these steps to install wcDetect:
-
Clone the repository to your local machine:
git clone https://github.com/c0dejump/wcDetect.git
-
Change Directory
cd wcDetect -
Install the required dependencies:
pip install -r requirements.txt
-
Ensure wcDetect is running correctly:
./wcdetect.py -h # OR python3 wcdetect.py -h
usage: wcdetect.py [-h] [-u URL] [-f URL_FILE] [-H CUSTOM_HEADERS] [-p KNOWN_PATH] [-k KEYWORD] [-hu HUMAN]
[-ua UA_FORCE]
options:
-h, --help show this help message and exit
-u URL, --url URL URL to test [required]
-f URL_FILE, --file URL_FILE
File of URLs
-H CUSTOM_HEADERS, --header CUSTOM_HEADERS
Add a custom HTTP Header
-p KNOWN_PATH, --path KNOWN_PATH
If you know the path, Ex: -p my-account
-k KEYWORD, --keyword KEYWORD
If a keyword must be present in the poisoned response, Ex: -k codejump
-hu HUMAN, --human HUMAN
Performs a timesleep to reproduce human behavior (Default: 0s) value: 'r' or 'random'
-ua UA_FORCE, --ua UA_FORCE
If need a specific user-agent (Default: random)
# With multiple headers
» ./wcdetect.py -u https://0a4f00ae0447a9ce801a03a500ea0097.web-security-academy.net/ -H "Cookie: session=OocpsiwqB6XOUkBkBDuqEHUb2BxYEvbC" -H "x-forwarded-host: toto"
# With specific keyword and path
» ./wcdetect.py -u https://0a4f00ae0447a9ce801a03a500ea0097.web-security-academy.net/ -H "Cookie: session=OocpsiwqB6XOUkBkBDuqEHUb2BxYEvbC" -p my-account -k wiener- Path traversal confusion
- WCD Formatting (?format, ?query...)
- WCD tracking param (?utm_source...)
- Testing multiple payloads and extensions (modules/payloads.py)
If you want to test the script:
To retrieve the session cookie quickly and easily:
If you want to add payloads or other items
- modules/payloads.py

