Running Interactsh
Learn about running Interactsh with examples and detailed output
For all of the flags and options available for Interactsh be sure to check out the Usage page.
Basic Usage
The command interact-client
generates a unique payload that can be used for Out-Of-Band (OOB) testing with minimal interactin in the output.
Session File
interactsh-client
with -sf, -session-file
flag can be used to store/read the current session information from user defined file. This functionality is useful to resume the same session to poll the interactions even after the client gets stopped or closed.
Verbose Mode
Running the interactsh-client
in verbose mode (v) allows you to to see the whole request and response, along with an output file to analyze afterwards.
Using a Self-Hosted Server
Using the server
flag, interactsh-client
can be configured to connect with a self-hosted Interactsh server, this flag accepts single or multiple server separated by comma.
We maintain a list of default Interactsh servers to use with interactsh-client
:
- oast.pro
- oast.live
- oast.site
- oast.online
- oast.fun
- oast.me
Default servers are subject to change/rotate/down at any time, thus we recommend using a self-hosted interactsh server if you are experiencing issues with the default server.
Using a Protected Self-Hosted Server
Using the token
flag, interactsh-client
can connect to a self-hosted Interactsh server that is protected with authentication.
Using with Notify
If you are away from your terminal, you may use notify to send a real-time interaction notification to any supported platform.
Interactsh Web Client
Interactsh-web is a free and open-source web client that displays Interactsh interactions in a well-managed dashboard in your browser. It uses the browser’s local storage to store and display all incoming interactions. By default, the web client is configured to use interact.sh as default interactsh server, and supports other self-hosted public/authencaited interactsh servers as well.
A hosted instance of interactsh-web client is available at https://app.interactsh.com
Interactsh Docker Client
A Docker image is also provided with interactsh client that is ready to run and can be used in the following way:
Burp Suite Extension
interactsh-collaborator is Burp Suite extension developed and maintained by @wdahlenb
- Download latest JAR file from releases page.
- Open Burp Suite → Extender → Add → Java → Select JAR file → Next
- New tab named Interactsh will be appeared upon successful installation.
- See the interactsh-collaborator project for more info.
OWASP ZAP Add-On
Interactsh can be used with OWASP ZAP via the OAST add-on for ZAP. With ZAP’s scripting capabilities, you can create powerful out-of-band scan rules that leverage Interactsh’s features. A standalone script template has been provided as an example (it is added automatically when you install the add-on).
- Install the OAST add-on from the ZAP Marketplace.
- Go to Tools → Options → OAST and select Interactsh.
- Configure the options for the client and click on “New Payload” to generate a new payload.
- OOB interactions will appear in the OAST Tab and you can click on any of them to view the full request and response.
- You can set Interactsh as the default for ActiveScan in the
Options
>OAST
>General
menu. - When checking the
Use Permanent Database
option, you can review interactions that occurred after ZAP was terminated. - See the OAST add-on documentation for more info.
Interactsh in ZAP
Interactsh Server
Interactsh server runs multiple services and captures all the incoming requests. To host an instance of interactsh-server, you are required to setup:
- Domain name with custom host names and nameservers.
- Basic droplet running 24/7 in the background.
Interactsh Usage
This will display help for the tool. Here are all the switches it supports.
We are using GoDaddy for domain name and DigitalOcean droplet for the server, a basic $5 droplet should be sufficient to run self-hosted Interactsh server. If you are not using GoDaddy, follow your registrar’s process for creating / updating DNS entries.
Configuring Interactsh domain
— Navigate to https://dcc.godaddy.com/manage/{{domain}}/dns/hosts
- Advanced Features → Host names → Add → Submit
ns1
,ns2
with yourSERVER_IP
as value
- Navigate to
https://dns.godaddy.com/{{domain}}/nameservers
- I’ll use my own nameservers → Submit
ns1.INTERACTSH_DOMAIN
,ns2.INTERACTSH_DOMAIN
Configuring Interactsh server
Install interactsh-server
on your VPS
Considering domain name setup is completed, run the below command to run interactsh-server
Following is an example of a successful installation and operation of a self-hosted server:
A number of needed flags are configured automatically to run interactsh-server
with default settings. For example, ip
and listen-ip
flags set with the Public IP address of the system when possible.
Running Interactsh Server
Interactsh Server with Multiple Domain
Multiple domain names can be given in the same way as above to run the same interactsh server across multiple configured domains.
There are more useful capabilities supported by interactsh-server
that are not enabled by default and are intended to be used only by self-hosted servers.
Interactsh Server behind a reverse proxy
interactsh-server
might require custom ports for services if the default ones are already busy. If this is the case but still default ports are required as part of the payload, it’s possible to configure interactsh-server
behind a reverse proxy, by port-forwarding HTTP/TCP/UDP based services via http/stream
proxy directive (proxy_pass
).
Nginx
Assuming that interactsh-server
essential services run on the following ports:
- HTTP: 8080/TCP
- HTTPS: 8440/TCP
- SMTP: 8025/TCP
- DNS: 8053/UDP
- DNS: 8053/TCP
The nginx configuration file to forward the traffic would look like the following one:
Configured Domains
Custom Server Index
Index page for http server can be customized while running custom interactsh server using -http-index
flag.
{DOMAIN}
placeholder is also supported in index file to replace with server domain name.
Static File Hosting
Interactsh http server optionally enables file hosting to help in security testing. This capability can be used with a self-hosted server to serve files for common payloads for XSS, XXE, RCE and other attacks.
To use this feature, -http-directory
flag can be used which accepts diretory as input and files are served under /s/
directory.
Dynamic HTTP Response
Interactsh http server optionally enables responding with dynamic HTTP response by using query parameters. This feature can be enabled by using -dr
or -dynamic-resp
flag.
The following query parameter names are supported - body
, header
, status
and delay
. Multiple header
parameters can be specified to set multiple headers.
- body (response body)
- header (response header)
- status (response status code)
- delay (response time)
Note:
- Dynamic HTTP Response feature is disabled as default.
- By design, this feature lets anyone run client-side code / redirects using your interactsh domain / server
- Using this option with an isolated domain is recommended to avoid security impact on associated root/subdomains.
Wildcard Interaction
To enable wildcard
interaction for configured Interactsh domain wildcard
flag can be used with implicit authentication protection via the auth
flag if the token
flag is omitted.
LDAP Interaction
As default, Interactsh server support LDAP interaction for the payload included in search query, additionally ldap
flag can be used for complete logging.
Custom Payload Length
The length of the interactsh payload is 33 by default, consisting of 20 (unique correlation-id) + 13 (nonce token), which can be customized using the cidl
and cidn
flags to make shorter when required with self-hosted interacsh server.
Note: It is important and required to use same length on both side (client and server), otherwise co-relation will not work.
Custom SSL Certificate
The certmagic library is used by default by interactsh server to produce wildcard certificates for requested domain in an automatic way. To use your own SSL certificate with self-hosted interactsh server, cert
and privkey
flag can be used to provider required certificate files.
Note: To utilize all of the functionality of the SSL protocol, a wildcard certificate is mandatory.
Supported Protocols
FTP
FTP support can be enabled with the -ftp
flag and is recommended for self-hosted instances only. The FTP agent simulates a fully-functional FTP server agent with authentication that captures authentications with every file operation. By default, the agent listens on port 21 (this can be changed with the -ftp-port
flag) and lists in read-only mode the content of the OS default temporary directory (customizable with the -ftp-dir
option).
Example of starting the FTP daemon and capturing a login interaction:
External Supported Protocols
SMB
The -smb
flag enables the Samba protocol (only for self-hosted instances). The samba protocol uses impacket smbserver
class to simulate a samba daemon share listening on port 445
unless changed by the -smb-port
flag. When enabled, interactsh executes under the hoods the script smb_server.py
. Hence Python3 and impacket dependencies are required.
Example of enabling the samba server:
Responder
Responder is wrapped in a docker container exposing various service ports via docker port forwarding. The interactions are retrieved by monitoring the shared log file Responder-Session.log
in the temp folder. To use it on a self-hosted instance, it’s necessary first to build the docker container and tag it as interactsh
(docker daemon must be configured correctly and with port forwarding capabilities):
Then run the service with:
On default settings, the daemon listens on the following ports:
- UDP: 137, 138, 1434
- TCP: 21 (might collide with FTP daemon if used), 110, 135, 139, 389, 445, 1433, 3141, 3128
Interactsh Integration
Use as library
The examples uses interactsh client library to get external interactions for a generated URL by making a http request to the URL.
Nuclei - OAST
Nuclei vulnerability scanner utilize Interactsh for automated payload generation and detection of out of band based security vulnerabilities.
See Nuclei + Interactsh Integration blog and guide document for more information.
Cloud Metadata
Interactsh server supports DNS records for cloud metadata services, which is useful for testing SSRF-related vulnerabilities.
Currently supported metadata services:
Example:
- aws.interact.sh points to 169.254.169.254
- alibaba.interact.sh points to 100.100.100.200
Acknowledgements
Interactsh is inspired from Burp Collaborator.
License
Interactsh is distributed under MIT License and made with 🖤 by the projectdiscovery team.
Was this page helpful?