Example #1
0
    def __init__(self):
        baseAttackPlugin.__init__(self)

        # Internal variables
        self._exploit_url = None

        # User configured variables
        self._url = ""
        self._generateOnlyOne = True
Example #2
0
 def __init__(self):
     baseAttackPlugin.__init__(self)
     
     # User configured parameter
     self._change_to_post = True
     self._url = ''
     self._separator = ';'
     self._data = ''
     self._inj_var = ''
     self._method = 'GET'
Example #3
0
 def __init__(self):
     baseAttackPlugin.__init__(self)
     
     # Internal variables
     self._path_name = ''
     self._file_name = ''
     
     # User configured variables ( for fastExploit )
     self._url = ''
     self._method = 'POST'
     self._data = ''
     self._fileVars = ''
     self._fileDest = ''
Example #4
0
 def __init__(self):
     baseAttackPlugin.__init__(self)
     
     # Internal variables
     self._shell_code = None
     
     # User configured variables
     self._changeToPost = True
     self._url = ''
     self._method = 'GET'
     self._data = ''
     self._inj_var = ''
     self._generateOnlyOne = True
 def __init__(self):
     baseAttackPlugin.__init__(self)
     
     # Internal variables
     self._shell = None
     self._xss_vuln = None
     self._exploit_dc = None
     
     # User configured variables
     self._listen_port = w3afPorts.REMOTEFILEINCLUDE_SHELL
     self._listen_address = get_local_ip()
     self._use_XSS_vuln = True
     self._generateOnlyOne = True
Example #6
0
 def __init__(self):
     baseAttackPlugin.__init__(self)
     
     # Internal variables
     self._already_tested = []
     
     # User configured variables
     self._changeToPost = True
     self._url = ''
     self._method = 'GET'
     self._data = ''
     self._file_pattern = ''
     self._generateOnlyOne = True
Example #7
0
    def __init__(self):
        baseAttackPlugin.__init__(self)

        # User configured parameter
        self._change_to_post = True
        self._url = ""
        self._data = ""
        self._inj_var = ""
        self._method = "GET"

        # Internal variables
        self.use_difflib = None
        self.rnum = randint(1, 100)
Example #8
0
 def __init__(self):
     baseAttackPlugin.__init__(self)
     
     # Internal variables
     self._vuln = None
     
     # User configured variables
     self._beefPasswd = 'BeEFConfigPass'
     # without the hook dir !
     self._beefURL = 'http://localhost/beef/'
     
     # A message to the user
     self._message = 'You can start interacting with the beEF server at: '
     self._message += urlParser.urlJoin( self._beefURL, 'ui/' )
Example #9
0
 def __init__(self):
     baseAttackPlugin.__init__(self)
     
     # Internal variables
     self._vuln = None
     self._driver = None
     
     # User configured options for fastExploit
     self._url = ''
     self._method = 'GET'
     self._data = ''
     self._injvar = ''
     
     # User configured variables
     self._eq_limit = 0.9
     self._goodSamaritan = True
     self._generateOnlyOne = True
Example #10
0
 def __init__( self ):
     baseAttackPlugin.__init__(self)
     w3afThread.__init__( self )
     
     self._proxyAddress = '127.0.0.1'
     self._proxyPort = w3afPorts.RFIPROXY
     self._rfiConnGenerator = ''
     self._httpdPort = w3afPorts.RFIPROXY2
     
     self._proxy = None
     self._wS = None
     self._go = True
     
     self._url = None
     self._method = None
     self._exploitQs = None
     self._proxyPublicIP = cf.cf.getData( 'localAddress' )
Example #11
0
    def __init__(self):
        baseAttackPlugin.__init__(self)

        # Internal variables
        self._vuln = None
        self._driver = None

        # User configured options for fastExploit
        self._url = ""
        self._method = "GET"
        self._data = ""
        self._injvar = ""

        # User configured variables
        self._equalLimit = 0.9
        self._equAlgorithm = "setIntersection"
        self._goodSamaritan = True
        self._generateOnlyOne = True