text stringlengths 1 93.6k |
|---|
exit(colorize("[x] response not changing without JS challenge solved"))
|
if options.fast and not non_blind:
|
exit(colorize("[x] fast exit because of missing non-blind match"))
|
if not intrusive[HTTPCODE]:
|
print(colorize("[i] rejected summary: RST|DROP"))
|
else:
|
_ = "...".join(match.group(0) for match in re.finditer(GENERIC_ERROR_MESSAGE_REGEX, intrusive[HTML])).strip().replace(" ", " ")
|
print(colorize(("[i] rejected summary: %d ('%s%s')" % (intrusive[HTTPCODE], ("<title>%s</title>" % intrusive[TITLE]) if intrusive[TITLE] else "", "" if not _ or intrusive[HTTPCODE] < 400 else ("...%s" % _))).replace(" ('')", "")))
|
found = non_blind_check(intrusive[RAW] if intrusive[HTTPCODE] is not None else original[RAW])
|
if not found:
|
print(colorize("[-] non-blind match: -"))
|
for item in DATA_JSON["payloads"]:
|
info, payload = item.split("::", 1)
|
counter += 1
|
if IS_TTY:
|
sys.stdout.write(colorize("\r[i] running payload tests... (%d/%d)\r" % (counter, len(DATA_JSON["payloads"]))))
|
sys.stdout.flush()
|
if counter % VERIFY_OK_INTERVAL == 0:
|
for i in xrange(VERIFY_RETRY_TIMES):
|
if not check_payload(str(random.randint(1, 9)), protection_regex):
|
break
|
elif i == VERIFY_RETRY_TIMES - 1:
|
exit(colorize("[x] host '%s' seems to be misconfigured or rejecting benign requests%s" % (hostname, (" (%d: '<title>%s</title>')" % (intrusive[HTTPCODE], intrusive[TITLE].strip())) if intrusive[TITLE] else "")))
|
else:
|
time.sleep(5)
|
last = check_payload(payload, protection_regex)
|
non_blind_check(intrusive[RAW])
|
signature += struct.pack(">H", ((calc_hash(payload, binary=False) << 1) | last) & 0xffff)
|
results += 'x' if last else '.'
|
if last and info not in blocked:
|
blocked.append(info)
|
_ = calc_hash(signature)
|
signature = "%s:%s" % (_.encode("hex") if not hasattr(_, "hex") else _.hex(), base64.b64encode(signature).decode("ascii"))
|
print(colorize("%s[=] results: '%s'" % ("\n" if IS_TTY else "", results)))
|
hardness = 100 * results.count('x') // len(results)
|
print(colorize("[=] hardness: %s (%d%%)" % ("insane" if hardness >= 80 else ("hard" if hardness >= 50 else ("moderate" if hardness >= 30 else "easy")), hardness)))
|
if blocked:
|
print(colorize("[=] blocked categories: %s" % ", ".join(blocked)))
|
if not results.strip('.') or not results.strip('x'):
|
print(colorize("[-] blind match: -"))
|
if re.search(r"(?i)captcha", original[HTML]) is not None:
|
exit(colorize("[x] there seems to be an activated captcha"))
|
else:
|
print(colorize("[=] signature: '%s'" % signature))
|
if signature in SIGNATURES:
|
waf = SIGNATURES[signature]
|
print(colorize("[+] blind match: '%s' (100%%)" % format_name(waf)))
|
elif results.count('x') < MIN_MATCH_PARTIAL:
|
print(colorize("[-] blind match: -"))
|
else:
|
matches = {}
|
markers = set()
|
decoded = base64.b64decode(signature.split(':')[-1])
|
for i in xrange(0, len(decoded), 2):
|
part = struct.unpack(">H", decoded[i: i + 2])[0]
|
markers.add(part)
|
for candidate in SIGNATURES:
|
counter_y, counter_n = 0, 0
|
decoded = base64.b64decode(candidate.split(':')[-1])
|
for i in xrange(0, len(decoded), 2):
|
part = struct.unpack(">H", decoded[i: i + 2])[0]
|
if part in markers:
|
counter_y += 1
|
elif any(_ in markers for _ in (part & ~1, part | 1)):
|
counter_n += 1
|
result = int(round(100.0 * counter_y / (counter_y + counter_n)))
|
if SIGNATURES[candidate] in matches:
|
if result > matches[SIGNATURES[candidate]]:
|
matches[SIGNATURES[candidate]] = result
|
else:
|
matches[SIGNATURES[candidate]] = result
|
if chained:
|
for _ in list(matches.keys()):
|
if matches[_] < 90:
|
del matches[_]
|
if not matches:
|
print(colorize("[-] blind match: - "))
|
print(colorize("[!] probably chained web protection systems"))
|
else:
|
matches = [(_[1], _[0]) for _ in matches.items()]
|
matches.sort(reverse=True)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.