{% extends "docframe.html" %} {% block body %}

Pathoc is a perverse HTTP daemon designed to let you craft almost any conceivable HTTP request, including ones that creatively violate the standards. HTTP requests are specified using a small, terse language, which pathod shares with its server-side twin pathod. To view pathoc's complete range of options, use the command-line help:

pathoc --help

The basic pattern for pathoc commands is as follows:

pathoc hostname request [request ...]

That is, we specify the hostname to connect to, followed by one or more requests. Lets start with a simple example:

> pathoc google.com get:/
<< 301 Moved Permanently: 219 bytes

Here, we make a GET request to the path / on port 80 of google.com. Pathoc's output tells us that the server responded with a 301. We can tell pathoc to connect using SSL, in which case the default port is changed to 443 (you can over-ride the default port with the -p command-line option):

> pathoc -s google.com get:/
<< 301 Moved Permanently: 219 bytes

There are two ways to tell pathoc to issue multiple requests. The first is to specify them on the command-line, like so:

> pathoc google.com get:/ get:/
<< 301 Moved Permanently: 219 bytes
<< 301 Moved Permanently: 219 bytes

In this case, pathoc issues the specified requests over the same TCP connection - so in the above example only one connection is made to google.com

The other way to issue multiple requets is to use the -n flag:

> pathoc -n 2 google.com get:/
<< 301 Moved Permanently: 219 bytes
<< 301 Moved Permanently: 219 bytes

The output is identical, but two separate TCP connections are made to the upstream server. These two specification styles can be combined:

> pathoc -n 2 google.com get:/ get:/
<< 301 Moved Permanently: 219 bytes
<< 301 Moved Permanently: 219 bytes
<< 301 Moved Permanently: 219 bytes
<< 301 Moved Permanently: 219 bytes

Here, two distinct TCP connections are made, with two requests issued over each.

The combination of pathoc's powerful request specification language and a few of its command-line options makes for quite a powerful basic fuzzer. Here's an example:

> pathoc -e -I 200 -t 2 -n 1000 localhost get:/:b@10:ir,@1

The request specified here is a valid GET with a body consisting of 10 random bytes, but with 1 random byte inserted in a random place. This could be in the headers, in the initial request line, or in the body itself. There are a few things to note here:

Pathoc has a reasonably sophisticated suite of features for interacting with proxies. The proxy request syntax very closely mirrors that of straight HTTP, which means that it is possible to make proxy-style requests using pathoc without any additional syntax, by simply specifying a full URL instead of a simple path::

> pathoc -p 8080 localhost "get:'http://google.com'"

Another common use case is to use an HTTP CONNECT request to probe remote servers via a proxy. This is done with the -c command-line option, which allows you to specify a remote host and port pair:

> pathoc -c google.com:80 -p 8080 localhost get:/

Note that pathoc does not negotiate SSL without being explictly instructed to do so. If you're making a CONNECT request to an SSL-protected resource, you must also pass the -s flag:

> pathoc -sc google.com:443 -p 8080 localhost get:/
{% endblock %}