Commit Graph

33 Commits (master)

Author SHA1 Message Date
Swissky b2eef12b15 Fix JSON and headers for raw data 2024-06-09 00:52:09 +02:00
Swissky 92146f2bcd Fix XML inject + example 4 2024-06-08 23:29:47 +02:00
Swissky febd5df763 Injection in headers 2024-06-08 21:53:36 +02:00
Konstantinos Xynos 36ee7d1f9f
Check if param is null
Fixes issue #36, POST body without param
2023-03-29 00:21:59 +02:00
Daniel Corbett 592af1d187 BUG/MINOR: requester: fix GET param replacement
The specified "param" value should be entirely replaced by the payload.
This seems to work as expected when using POST values as it is entirely
reset. However, the GET value is replaced using regex, which was not
matching the entire value causing the original value to be appended to
the payload. For example, assuming the following value request:

```
GET /?url=https%3A%2F%2Fgoogle.com
```

A sample payload from the readfile module would become:

```
file:///etc/passwd://google.com
```

This is mostly due to the existing regex using a word (\w) match, which
prevents it from parsing "://" (%3A%2F%2F). Generally, query string
params should be properly urlencoded so we should be able to replace
anything after `param=` up until the default delimeter (&).

This is less of an issue if you just set the starting param to a string
(the example in data/request3.txt uses SSRF. However, based on the
provided example within the README, this may not be obvious to new users
and having consistency between starting payloads could be helpful.

This commit switches the regex from a word match (\w) to a negated
character class, matching everything up to the next ampersand (&).
2023-02-10 13:23:30 -05:00
MBharanya bb368088f4 Add HTTP proxy support 2022-03-23 11:45:34 +01:00
Mili-NT 908775e397 - Added logging to file for better troubleshooting
- Swapped instances of format() to use fstrings for readability, as some of the format calls were convoluted:
    - "".join("%{0:0>2}".format(format(ord(char), "x")) for char in string) => "".join([f"%{ord(char):0>2x}" for char in string])
    - logging.info("Original file length: {}".format('{0:0{1}X}'.format(len(webshell_data),8))) => logging.info(f"Original file length: {len(webshell_data):08X}")

- Added missing 'module launched' message for SMTP
2022-03-16 14:27:30 -04:00
Mashaz eb6f676848 BUGFIX - fix bug when handling `Content-Type` 2021-01-27 22:51:09 +08:00
xyzkab 394df12bb9 move up content.split, use content[0] on regex.findall 2020-01-28 20:00:04 +07:00
xyzkab 2ffa7985b9 Check handler must have -lport option specified 2020-01-09 09:58:40 +07:00
xyzkab 3d737a7e72 Update handlers: move cmd execution to :listen_command method 2020-01-08 23:44:41 +07:00
xyzkab 9f620d4f33 Update handlers: add default and load_handler method execution 2020-01-08 23:42:52 +07:00
xyzkab a8cb5999d3 Fix missing header: iterate all items, skip if name/value is empty 2020-01-06 02:23:34 +07:00
xyzkab 453e1b2a2c Fix nested post params
- use urllib.parse.unquote on form data name and value
2019-12-28 03:00:48 +07:00
Swissky b7b0f76afe BUGFIX - Fix for #17 application/json 2019-12-19 20:48:02 +01:00
Swissky 7ec9a6b1d0 BUGFIX - SSL warnings + https wrapper 2019-07-07 22:05:31 +02:00
Swissky 8d5e31db5c Fix for #10 2019-04-21 12:15:52 +02:00
Swissky 5943a6c157 INFRA - 127.1 and 127.0.1, short IP added 2019-04-20 20:22:22 +02:00
Swissky 34c79755ff MySQL - Arbitratry command 2019-04-08 11:37:17 +02:00
swisskyrepo adfef02124 INFRA - SSL for HTTPS + UserAgent parameter 2019-02-18 13:33:24 +01:00
swisskyrepo 0792c541ff INFRA - XML requests + ssrf4 endpoint 2019-02-18 11:53:57 +01:00
Swissky e8751bb51e MODULE - Tomcat module - bruteforce attack against manager 2018-12-29 22:14:55 +01:00
Swissky aec8eaa935 MODULE - docker : extracting name, commands from the containers/images 2018-10-18 18:07:05 +02:00
Swissky baac471a09 MODULE - smbhash : force an SMB auth via UNC path 2018-10-18 13:37:28 +02:00
Swissky 37b1ddc990 MODULE - SOCKS4 Proxy via gopher:// 2018-10-18 02:11:43 +02:00
ttffdd 150049c79b Fix broken unicode 2018-10-17 20:31:34 +03:00
ttffdd ba5a8be181 Add some new ip representations for level 5 2018-10-17 20:14:44 +03:00
Swissky 7f3822b67f INFRA - example.py with a GET SSRF 2018-10-17 17:12:08 +02:00
Swissky 7e7b61d1a2 BUGFIX - gen_ip_list's level was incorrect 2018-10-17 14:58:29 +02:00
Swissky df96b080c7 README - Template and usage updated + bypass in readfiles 2018-10-17 14:52:25 +02:00
Swissky ee74058eda MODULE - "--level" added and portscan improved 2018-10-17 14:03:43 +02:00
Swissky bea0fc8a1a INFRA - Handling JSON in request + example SSRF2 (json data) 2018-10-16 12:18:00 +02:00
Swissky fc08b46214 MODULE - core + redis + fastcgi + portscan + readfile 2018-10-15 21:22:04 +02:00