text stringlengths 1 93.6k |
|---|
except:
|
retval[HTML] = ""
|
retval[RAW] = "%s %s %s\n%s\n%s" % (httplib.HTTPConnection._http_vsn_str, retval[HTTPCODE] or "", getattr(ex, "msg", ""), str(ex.headers) if hasattr(ex, "headers") else "", retval[HTML])
|
for encoding in re.findall(r"charset=[\s\"']?([\w-]+)", retval[RAW])[::-1] + ["utf8"]:
|
encoding = ENCODING_TRANSLATIONS.get(encoding, encoding)
|
try:
|
retval[HTML] = retval[HTML].decode(encoding, errors="replace")
|
break
|
except:
|
pass
|
match = re.search(r"<title>\s*(?P<result>[^<]+?)\s*</title>", retval[HTML], re.I)
|
retval[TITLE] = match.group("result") if match and "result" in match.groupdict() else None
|
retval[TEXT] = re.sub(r"(?si)<script.+?</script>|<!--.+?-->|<style.+?</style>|<[^>]+>|\s+", " ", retval[HTML])
|
match = re.search(r"(?im)^Server: (.+)", retval[RAW])
|
retval[SERVER] = match.group(1).strip() if match else ""
|
return retval
|
def calc_hash(value, binary=True):
|
value = value.encode("utf8") if not isinstance(value, bytes) else value
|
result = zlib.crc32(value) & 0xffff
|
if binary:
|
result = struct.pack(">H", result)
|
return result
|
def single_print(message):
|
if message not in seen:
|
print(message)
|
seen.add(message)
|
def check_payload(payload, protection_regex=GENERIC_PROTECTION_REGEX % '|'.join(GENERIC_PROTECTION_KEYWORDS)):
|
global chained
|
global heuristic
|
global intrusive
|
global locked_code
|
global locked_regex
|
time.sleep(options.delay or 0)
|
if options.post:
|
_ = "%s=%s" % ("".join(random.sample(string.ascii_letters, 3)), quote(payload))
|
intrusive = retrieve(options.url, _)
|
else:
|
_ = "%s%s%s=%s" % (options.url, '?' if '?' not in options.url else '&', "".join(random.sample(string.ascii_letters, 3)), quote(payload))
|
intrusive = retrieve(_)
|
if options.lock and not payload.isdigit():
|
if payload == HEURISTIC_PAYLOAD:
|
match = re.search(re.sub(r"Server:|Protected by", "".join(random.sample(string.ascii_letters, 6)), WAF_RECOGNITION_REGEX, flags=re.I), intrusive[RAW] or "")
|
if match:
|
result = True
|
for _ in match.groupdict():
|
if match.group(_):
|
waf = re.sub(r"\Awaf_", "", _)
|
locked_regex = DATA_JSON["wafs"][waf]["regex"]
|
locked_code = intrusive[HTTPCODE]
|
break
|
else:
|
result = False
|
if not result:
|
exit(colorize("[x] can't lock results to a non-blind match"))
|
else:
|
result = re.search(locked_regex, intrusive[RAW]) is not None and locked_code == intrusive[HTTPCODE]
|
elif options.string:
|
result = options.string in (intrusive[RAW] or "")
|
elif options.code:
|
result = options.code == intrusive[HTTPCODE]
|
else:
|
result = intrusive[HTTPCODE] != original[HTTPCODE] or (intrusive[HTTPCODE] != 200 and intrusive[TITLE] != original[TITLE]) or (re.search(protection_regex, intrusive[HTML]) is not None and re.search(protection_regex, original[HTML]) is None) or (difflib.SequenceMatcher(a=original[HTML] or "", b=intrusive[HTML] or "").quick_ratio() < QUICK_RATIO_THRESHOLD)
|
if not payload.isdigit():
|
if result:
|
if options.debug:
|
print("\r---%s" % (40 * ' '))
|
print(payload)
|
print(intrusive[HTTPCODE], intrusive[RAW])
|
print("---")
|
if intrusive[SERVER]:
|
servers.add(re.sub(r"\s*\(.+\)\Z", "", intrusive[SERVER]))
|
if len(servers) > 1:
|
chained = True
|
single_print(colorize("[!] multiple (reactive) rejection HTTP 'Server' headers detected (%s)" % ', '.join("'%s'" % _ for _ in sorted(servers))))
|
if intrusive[HTTPCODE]:
|
codes.add(intrusive[HTTPCODE])
|
if len(codes) > 1:
|
chained = True
|
single_print(colorize("[!] multiple (reactive) rejection HTTP codes detected (%s)" % ', '.join("%s" % _ for _ in sorted(codes))))
|
if heuristic and heuristic[HTML] and intrusive[HTML] and difflib.SequenceMatcher(a=heuristic[HTML] or "", b=intrusive[HTML] or "").quick_ratio() < QUICK_RATIO_THRESHOLD:
|
chained = True
|
single_print(colorize("[!] multiple (reactive) rejection HTML responses detected"))
|
if payload == HEURISTIC_PAYLOAD:
|
heuristic = intrusive
|
return result
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.