Find and replace substitution definitions. Used to single out special section names for specific markup. Macro syntax definitions. Heading, section and block title definitions. Install Vim Color Scheme Linux Distributions' title='Install Vim Color Scheme Linux Distributions' />Paragraph element definitions. Delimited. Block element definitions. List element definitions. List element tag definitions. Table element definitions. Table element tag definitions. Each line of text in these sections is a section entry. Section. entries share the following syntax. The entry value is set to value. The entry value is set to a zero length string. The entry is undefined deleted from the configuration. This. syntax only applies to attributes and miscellaneous. Section entry behavior. All equals characters inside the name must be escaped with a. Attribute names, tag entry names and markup template section names. Names should not begin or end with a dash. A blank configuration file section one without any entries deletes. Miscellaneous section. The optional miscellaneous section specifies the following. Output file line termination characters. Can include any. valid Python string escape sequences. The default value is. Should not be quoted or. For example. asciidoc a newlinen b docbook mydoc. The default extension for the output file, for example. Defaults to backend name. The number of spaces to expand tab characters, for example. Defaults to 8. A tabsize of zero suppresses tab. Included files can override this option using the. These global table related options are documented in the. Table Configuration File Definitions sub section. Titles section. Two line section title pattern. The entry value is a Python. A comma separated list of document and section title underline. The default setting is. One line section title patterns. The entry value is a Python. Block. Title element pattern. The entry value is a. Python regular expression containing the named group title. A comma separated list of substitutions that are performed on. Defaults to normal. The tags section contains backend tag definitions one per. Tags are used to translate Ascii. Doc elements to backend. An Ascii. Doc tag definition is formatted like. For example In this example asciidoc1 replaces the character with the. Ascii. Doc input file and writes the result to. Use the brvbar attribute reference if you need to include a pipe. Attributes section. The optional attributes section contains predefined attributes. If the attribute value requires leading or trailing spaces then the. To delete a attribute insert a name Special Characters section. The specialcharacters section specifies how to escape characters. Each translation is specified on a. Special characters are normally confined to those that resolve. HTML and XML markups the ampersand. The following example causes. Quoted Text section. Quoting is used primarily for text formatting. The quotes section. Ascii. Doc quoting characters and their corresponding backend. Each section entry value is the name of a of a tags. The entry name is the character or characters that. The following examples are taken from Ascii. Doc. configuration files tags. You can specify the left and right quote strings separately by. Omitting the tag will disable quoting, for example, if you dont want. Unconstrained quotes are differentiated from constrained. Quoted text behavior. Quote characters must be non alphanumeric. To minimize quoting ambiguity try not to use the same quote. Special Words section. The specialwords section is used to single out words and phrases. The name of. each entry corresponds to a markup template section and the entry. For. example specialwords. NOTE IMPORTANTstrongwords. The examples specifies that any occurrence of NOTE or IMPORTANT. Words and word phrases are treated as Python regular expressions for. NOTE would only match NOTE if appeared at. Ascii. Doc comes with three built in Special Word types. Edit the. configuration files to customize existing Special Words and to add new. Special word behavior. Word list entries must be separated by space characters. Word list entries with embedded spaces should be enclosed in quotation. A specialwords section entry of the form. A specialwords section entry of the form name undefines. Since word list entries are processed as Python regular expressions. By default Special Words are substituted before Inline Macros, this. For example the special word. A possible solution is to emphasize. If the first matched character of a special word is a backslash then. For example. the special word bTtenb will mark up the words Ten and. Replacements sectionreplacements, replacements. The find text can be a Python regular expression the replace text can. Python regular expression group references. Use Replacement shortcuts for often used macro references, for. NEWimage. imagessmallnew. New. NEWNEWThe only difference between the three replacement types is how they. By default replacements and replacements. Replacement behavior. The built in replacements can be escaped with a backslash. If the find or replace text has leading or trailing spaces then the. Since the find text is processed as a regular expression you need to. Replacements are performed in the same order they appear in the. Markup Template Sections. Markup template sections supply backend markup for translating. Ascii. Doc elements. Since the text is normally backend dependent. Template sections differ from other sections in that they. A markup template section body can contain. Attribute references. System macro calls. A document content placeholder. The document content placeholder is a single character and is. Use the brvbar. Configuration file names, precedence and locations. Configuration files have a. The directory containing the asciidoc executable. If there is no asciidoc. Ascii. Doc configuration files are installed in the same directory as. This allows both a system wide copy and. Ascii. Doc to coexist on the same host PC. The users HOME. The directory containing the Ascii. Doc source file. Explicit configuration files specified using. The conf files attribute one or more file names separated by a. These files are loaded in the order they are. The asciidoc1 conf file command line option. The. conf file option can be specified multiple times, in which. Backend plugin configuration files are loaded from. Filter configuration files are loaded from subdirectories. Configuration files from the above locations are loaded in the. The attributes section only from. Files from location 5. This first pass makes locally set attributes available in the global. Tools for Pentesters. Compilation. Toxy. HTTP proxy. failure scenarios. It was mainly designed for fuzzingevil testing purposes, when toxy becomes particularly useful to cover fault tolerance and resiliency capabilities of a system, especially in. Mit. M proxy among services. Download Adobe Acrobat Reader Completo Chile on this page. HTTP flow as you need, performing multiple evil actions in the middle of that process, such as limiting the bandwidth, delaying TCP packets, injecting network jitter latency or replying with a custom error or status code. It operates only at L7 application level. It was built on top of. HTTP proxy, and its also. Requires node. js 0. Full featured HTTPS proxy backed by. Hackable and elegant programmatic API inspired on connectexpress. Admin HTTP API for external management and dynamic configuration. Featured built in router with nested configuration. Hierarchical and composable poisoning with rule based filtering. Hierarchical middleware layer both global and route scopes. Easily augmentable via middleware based on connectexpress middleware. Supports both incoming and outgoing traffic poisoning. Built in poisons bandwidth, error, abort, latency, slow read. Rule based poisoning probabilistic, HTTP method, headers, body. Supports third party poisons and rules. Built in balancer and traffic interceptor via middleware. Inherits API and features from. Compatible with connectexpress and most of their middleware. Able to run as standalone HTTP proxy. Therere some other similar solutions like. Furthermore, the majority of the those solutions only operates at TCP L3 level stack instead of providing high level abstractions to cover common requirements in the specific domain and nature of the HTTP L7 protocol, like toxy tries to provide. HTTP protocol primitives easily. Via its built in hierarchical domain specific middleware layer you can easily augment toxy features to your own needs. HTTP transaction e. One HTTP transaction can be poisoned by one or multiple poisons, and those poisons can be also configured to infect both global or route level traffic. HTTP requestresponse in order to determine, given a certain rules, if the HTTP transaction should be poisioned or not e. Rules can be reused and applied to both incoming and outgoing traffic flows, including different scopes global, route or poison level. Incoming request. Toxy Router Match the incoming request. Incoming phase The proxy receives the request from the client. Exec Rules Apply configured rules for the incoming request. Exec Poisons If all rules passed, then poison the HTTP flow. HTTP dispatcher Forward the HTTP traffic to the target server, either poisoned or not. Outgoing phase Receives response from target server. Exec Rules Apply configured rules for the outgoing request. Exec Poisons If all rules passed, then poison the HTTP flow before send it to the client. Send to the client Finally, send the request to the client, either poisoned or not. Create a new toxy proxy. Default server to forward incoming traffic. Register global poisons and rules. Register multiple routes. Rulerules. headersAuthorization Bearer. Infect outgoing traffic only after the server replied properly. Poisonpoisons. bandwidth bps 5. Rulerules. methodGET. Rulerules. time. Threshold duration 1. Rulerules. response. Status range 2. Limit limit 1. Rulerules. methodPOST, PUT, DELETE. And use a different more permissive poison for GET requests. Limit limit 5. Rulerules. GET. Handle the rest of the traffic. Close delay 1. Read bps 1. Rulerules. probability5. Server listening on port, 3. Test it, http localhost 3. Poisons host specific logic which intercepts and mutates, wraps, modify andor cancel an HTTP transaction in the proxy server. Poisons can be applied to incoming or outgoing, or even both traffic flows. Poisons can be composed and reused for different HTTP scenarios. They are executed in FIFO order and asynchronously. Poisoning scopes. HTTP traffic received by the proxy server, regardless of the HTTP method or path. HTTP verb and URI path. Poisons can be plugged to both scopes, meaning you can operate with better accuracy and restrict the scope of the poisoning. Poisoning phases. Poisons can be plugged to incoming or outgoing traffic flows, or even both. This means, essentially, that you can plug in your poisons to infect the HTTP traffic. HTTP server or sent to the client. This allows you apply a better and more accurated poisoning based on the request or server response. For instance, given the nature of some poisons, like. Built in poisons. Poisoning Phase. incoming outgoing. Reaches the server. Infects the HTTP flow injecting a latency jitter in the response. Jitter value in miliseconds. Random jitter maximum value. Random jitter minimum value. Or alternatively using a random value. Inject response. Poisoning Phase. Reaches the server. Injects a custom response, intercepting the request before sending it to the target server. Useful to inject errors originated in the server. Response HTTP status code. Default. Optional headers to send. Optional body data to send. It can be a. Body encoding. Default to. toxy. Content Type applicationjson. Poisoning Phase. incoming outgoing. Reaches the server. Limits the amount of bytes sent over the network in outgoing HTTP traffic for a specific time frame. This poison is basically an alias to. Amount of chunk of bytes to send. Default. Packets time frame in miliseconds. Default. toxy. poisontoxy. Poisoning Phase. incoming outgoing. Reaches the server. Limits the amount of requests received by the proxy in a specific threshold time frame. Designed to test API limits. Exposes typical. X Rate. Limit Note that this is very simple rate limit implementation, indeed limits are stored in memory, therefore are completely volalite. Therere a bunch of featured and consistent rate limiter implementations in. You might be also interested in. Total amount of requests. Default to. Limit time frame in miliseconds. Default to. Optional error message when limit is reached. HTTP status code when limit is reached. Default to. toxy. Limit limit 5, threshold 1. Poisoning Phase. Reaches the server. Reads incoming payload data packets slowly. Only valid for non GET request. Packet chunk size in bytes. Default to. Limit threshold time frame in miliseconds. Default to. toxy. Read chunk 2. 04. Poisoning Phase. Reaches the server. Delays the HTTP connection ready state. Delay connection in miliseconds. Default to. toxy. Open delay 2. 00. Poisoning Phase. incoming outgoing. Reaches the server. Delays the HTTP connection close signal EOF. Delay time in miliseconds. Default to. toxy. Close delay 2. Poisoning Phase. Reaches the server. Restricts the amount of packets sent over the network in a specific threshold time frame. Packet chunk size in bytes. Default to. Data chunk delay time frame in miliseconds. Default to. toxy. Abort connection. Poisoning Phase. incoming outgoing. Reaches the server. Aborts the TCP connection. From the low level perspective, this will destroy the socket on the server, operating only at TCP level without sending any specific HTTP application level data. Aborts TCP connection after waiting the given miliseconds. Default to., the connection will be aborted if the target server takes more than the. Default to. Custom internal node.