Scan event updated: form submit & open page urlbar
parent
e7729e74c6
commit
6bc3910d60
|
@ -85,26 +85,31 @@ function send_target(server, url, deep, impact, cookies){
|
||||||
// Set a clean local storage
|
// Set a clean local storage
|
||||||
chrome.storage.sync.set({'rce':0, 'xss': 0, 'sql': 0, 'lfi': 0, 'work': 0, 'list':'' })
|
chrome.storage.sync.set({'rce':0, 'xss': 0, 'sql': 0, 'lfi': 0, 'work': 0, 'list':'' })
|
||||||
|
|
||||||
// Launch a scan when the tab change
|
|
||||||
chrome.tabs.onActivated.addListener(function(activeInfo) {
|
|
||||||
chrome.tabs.get(activeInfo.tabId, function(tab){
|
|
||||||
|
|
||||||
// Handle start/stop button
|
// Launch a scan when the tab change - Submit a form / Open new URL from bar
|
||||||
chrome.storage.sync.get(['work'], function(items) {
|
chrome.tabs.onUpdated.addListener(function(tabId,changeInfo, tab) {
|
||||||
if(items['work'] == 1){
|
|
||||||
|
if(changeInfo.status == 'complete'){
|
||||||
|
chrome.tabs.get(tabId, function(tab){
|
||||||
|
|
||||||
// Extract cookies from the domain
|
// Handle start/stop button
|
||||||
var cookies_string = "";
|
chrome.storage.sync.get(['work'], function(items) {
|
||||||
chrome.cookies.getAll({ 'domain': extract_domain(tab.url)}, function(cookies) {
|
if(items['work'] == 1){
|
||||||
for (var i = 0; i < cookies.length; i++) {
|
|
||||||
cookies_string += ("name:" + cookies[i].name + "|value:" + cookies[i].value+"\n");
|
|
||||||
}
|
|
||||||
|
|
||||||
// Start a scan with the url and the cookies
|
// Extract cookies from the domain
|
||||||
send_target(config_server, escape(tab.url), 0, 0, escape((cookies_string)) );
|
var cookies_string = "";
|
||||||
});
|
chrome.cookies.getAll({ 'domain': extract_domain(tab.url)}, function(cookies) {
|
||||||
}
|
for (var i = 0; i < cookies.length; i++) {
|
||||||
|
cookies_string += ("name:" + cookies[i].name + "|value:" + cookies[i].value+"\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
// Start a scan with the url and the cookies
|
||||||
|
send_target(config_server, escape(tab.url), 0, 0, escape((cookies_string)) );
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
});
|
||||||
});
|
});
|
||||||
});
|
}
|
||||||
|
|
||||||
});
|
});
|
|
@ -46,11 +46,11 @@ You can try the Error SQL, Blind SQL, LFI with Damn Vulnerable Web App
|
||||||
- New logo for the extension
|
- New logo for the extension
|
||||||
- Re-use your cookies and user-agent to get access to page with cookie-authentication
|
- Re-use your cookies and user-agent to get access to page with cookie-authentication
|
||||||
- Export vulnerabilities into a CSV file
|
- Export vulnerabilities into a CSV file
|
||||||
|
- Launch scan when a form is submitted or a page is opened via the URL bar
|
||||||
|
|
||||||
## TODO - Work in progress
|
## TODO - Work in progress
|
||||||
- Should detect target in source code.. (list of targets, then launch scan)
|
- Should detect target in source code.. (list of targets, then launch scan)
|
||||||
- Should detect and work with POST requests
|
- Should detect and work with POST requests
|
||||||
- Launch scan when a button is clicked/ form submitted / page opened via URL - chrome.tabs.onActivated.addListener onFormSubmit?
|
|
||||||
|
|
||||||
## Thanks
|
## Thanks
|
||||||
- Polyglot vector for SQL injections [The Ultimate SQL Injection Payload](https://labs.detectify.com/2013/05/29/the-ultimate-sql-injection-payload/)
|
- Polyglot vector for SQL injections [The Ultimate SQL Injection Payload](https://labs.detectify.com/2013/05/29/the-ultimate-sql-injection-payload/)
|
||||||
|
|
Loading…
Reference in New Issue