<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong><ahref="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
Njia nyingine za kusaidia HackTricks:
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa muundo wa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**swag rasmi wa PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PR kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
</details>
## **Kudhibiti Mzigo wa gRPC-Web**
gRPC-Web hutumia Content-Type: `application/grpc-web-text` katika maombi ambayo ni aina ya protobuf iliyosimbwa kwa msingi wa base64, unaweza kutumia zana ya [gprc-coder](https://github.com/nxenon/grpc-pentest-suite), na unaweza pia kusakinisha [Kifaa cha Burp Suite](https://github.com/nxenon/grpc-pentest-suite).
### **Mwongozo wa kufanya kwa mkono na Kifaa cha Burp Suite cha gRPC-Web Coder**
Unaweza kutumia Kifaa cha Burp Suite cha gRPC-Web Coder katika [gRPC-Web Pentest Suite](https://github.com/nxenon/grpc-pentest-suite) ambayo ni rahisi. Unaweza kusoma maelekezo ya ufungaji na matumizi katika repo yake.
## **Uchambuzi wa Faili za Javascript za gRPC-Web**
Kuna angalau faili moja ya Javascript katika kila programu ya gRPC-Web. Unaweza kuchambua faili ili kupata ujumbe, vituo vya mwisho, na huduma mpya. Jaribu kutumia zana ya [gRPC-Scan](https://github.com/nxenon/grpc-pentest-suite).
1. Pakua Faili ya Javascript ya gRPC-Web
2. Iipime na grpc-scan.py:
```bash
python3 grpc-scan.py --file main.js
```
3. Tathmini matokeo na jaribu vipengele vipya na huduma mpya:
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong><ahref="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
Njia nyingine za kusaidia HackTricks:
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa muundo wa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**swag rasmi wa PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) za kipekee
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwenye** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.