def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._analyzed_dirs = [] self._fuzzable_requests_to_return = [] self._compile_gitRE()
def __init__(self): baseDiscoveryPlugin.__init__(self) self._run = True # User variables self._resultLimit = 300 # Internal variables self._fuzzableRequests = []
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._analyzed_dirs = [] self._has_audited = 0 self._new_fuzzable_requests = []
def __init__(self): baseDiscoveryPlugin.__init__(self) # Some internal variables self._run = True self._proxy_header_list = ['Via', 'Reverse-Via', 'X-Forwarded-For', 'Proxy-Connection', 'Max-Forwards', 'X-Forwarded-Host', 'X-Forwarded-Server']
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._run = True self._accounts = [] # User configured self._resultLimit = 300
def __init__(self): baseDiscoveryPlugin.__init__(self) self._first_time = True self._fuzzImages = False self._headers = {} self._seen = scalable_bloomfilter()
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._exec = True self._already_tested = scalable_bloomfilter() self._bad_codes = [ httpConstants.UNAUTHORIZED, httpConstants.NOT_IMPLEMENTED, httpConstants.METHOD_NOT_ALLOWED, httpConstants.FORBIDDEN] # Methods self._dav_methods = [ 'DELETE', 'PROPFIND', 'PROPPATCH', 'COPY', 'MOVE', 'LOCK', 'UNLOCK', 'MKCOL'] self._common_methods = [ 'OPTIONS', 'GET', 'HEAD', 'POST', 'TRACE', 'PUT'] self._uncommon_methods = ['*', 'SUBSCRIPTIONS', 'NOTIFY', 'DEBUG', 'TRACK', 'POLL', 'PIN', 'INVOKE', 'SUBSCRIBE', 'UNSUBSCRIBE'] # Methods taken from http://www.w3.org/Protocols/HTTP/Methods.html self._proposed_methods = [ 'CHECKOUT', 'SHOWMETHOD', 'LINK', 'UNLINK', 'CHECKIN', 'TEXTSEARCH', 'SPACEJUMP', 'SEARCH', 'REPLY'] self._extra_methods = [ 'CONNECT', 'RMDIR', 'MKDIR', 'REPORT', 'ACL', 'DELETE', 'INDEX', 'LABEL', 'INVALID'] self._version_control = [ 'VERSION_CONTROL', 'CHECKIN', 'UNCHECKOUT', 'PATCH', 'MERGE', 'MKWORKSPACE', 'MKACTIVITY', 'BASELINE_CONTROL'] self._supported_methods = self._dav_methods + self._common_methods + self._uncommon_methods self._supported_methods += self._proposed_methods + self._extra_methods self._supported_methods += self._version_control # User configured variables self._exec_one_time = True self._report_dav_only = True
def __init__(self): baseDiscoveryPlugin.__init__(self) # internal variables self._exec = True self._already_visited = scalable_bloomfilter() self._first_time = True self._show_remote_server = True # User configured parameters self._db_file = 'plugins' + os.path.sep + 'discovery' + os.path.sep + 'pykto' self._db_file += os.path.sep + 'scan_database.db' self._extra_db_file = 'plugins' + os.path.sep + 'discovery' + os.path.sep self._extra_db_file += 'pykto' + os.path.sep + 'w3af_scan_database.db' self._cgi_dirs = ['/cgi-bin/'] self._admin_dirs = ['/admin/', '/adm/'] self._users = ['adm', 'bin', 'daemon', 'ftp', 'guest', 'listen', 'lp', 'mysql', 'noaccess', 'nobody', 'nobody4', 'nuucp', 'operator', 'root', 'smmsp', 'smtp', 'sshd', 'sys', 'test', 'unknown'] self._nuke = ['/', '/postnuke/', '/postnuke/html/', '/modules/', '/phpBB/', '/forum/'] self._mutate_tests = False self._generic_scan = False self._update_scandb = False self._source = ''
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._run = True # User configured settings self._result_limit = 300
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._already_visited = scalable_bloomfilter() # User configured parameters self._max_depth = 3
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._first_exec = True self._already_queried = scalable_bloomfilter() self._can_resolve_domain_names = False self._non_existant_response = None
def __init__(self): baseDiscoveryPlugin.__init__(self) # Control flow self._runned_hmap = False self._exec = True # User configured parameters self._genFpF = False
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._version = None # User configured parameters self._db_file = 'plugins' + os.path.sep + 'discovery' + os.path.sep + 'favicon' self._db_file += os.path.sep + 'favicon-md5'
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._exec = True self._x_powered = True # User configured variables self._exec_one_time = True
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._ghdb_file = os.path.join('plugins', 'discovery', 'ghdb', 'GHDB.xml') self._fuzzableRequests = [] # User configured variables self._result_limit = 300
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._exec = True self._version = None # User configured parameters self._db_file = "plugins" + os.path.sep + "discovery" + os.path.sep + "favicon" self._db_file += os.path.sep + "favicon-md5"
def __init__(self): baseDiscoveryPlugin.__init__(self) self._exec = True # User configured parameters self._wordlist = 'plugins' + os.path.sep + 'discovery' + os.path.sep + 'ria_enumerator' self._wordlist += os.path.sep + 'common_filenames.db' # This is a list of common file extensions for google gears manifest: self._extensions = ['', '.php', '.json', '.txt', '.gears']
def __init__(self): baseDiscoveryPlugin.__init__(self) self._exec = True # User configured parameters self._wordlist = "plugins" + os.path.sep + "discovery" + os.path.sep + "ria_enumerator" self._wordlist += os.path.sep + "common_filenames.db" # This is a list of common file extensions for google gears manifest: self._extensions = ["", ".php", ".json", ".txt", ".gears"]
def __init__(self): baseDiscoveryPlugin.__init__(self) # # Internal variables # self._exec = True # The results self._not_filtered = [] self._filtered = []
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._exec = True # User configured parameters self._input_csv = '' self._input_webscarab = '' self._input_burp = ''
def __init__(self): baseDiscoveryPlugin.__init__(self) self._run = True # Internal variables self._fuzzable_requests = [] # User defines variable self._phishtank_DB = 'plugins' + os.path.sep + 'discovery' self._phishtank_DB += os.path.sep + 'phishtank' + os.path.sep + 'index.xml' self._update_DB = False
def __init__(self): baseDiscoveryPlugin.__init__(self) self._already_visited = scalable_bloomfilter() self._first_time = True # This is for the Referer self._headers = {} # User options self._fuzz_images = False self._max_digit_sections = 4
def __init__(self): baseDiscoveryPlugin.__init__(self) self._exec = True # User configured parameters self._dir_list = 'plugins' + os.path.sep + 'discovery' + os.path.sep + 'dir_bruter' self._dir_list += os.path.sep + 'common_dirs_small.db' self._be_recursive = True # Internal variables self._fuzzable_requests = [] self._tested_base_url = False
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._exec = True self._fuzzable_requests_to_return = [] # # Could change in time, # self._xssed_url = url_object("http://www.xssed.com") self._fixed = "<img src='http://data.xssed.org/images/fixed.gif'> FIXED</th>"
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._run = True self._ghdb_file = 'plugins' + os.path.sep + 'discovery' + os.path.sep self._ghdb_file += 'ghdb' + os.path.sep + 'GHDB.xml' self._update_URL = 'http://johnny.ihackstuff.com/xml/schema.xml' self._fuzzableRequests = [] # User configured variables self._result_limit = 300 self._update_ghdb = False
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._run = True self._run_OS_ident = True self._run_app_ident = True # User configured variables self._identify_OS = True self._identify_applications = True # For testing self._do_fast_search = False
def __init__(self): baseDiscoveryPlugin.__init__(self) # User configured parameters self._wordlist = 'plugins' + os.path.sep + 'discovery' + os.path.sep + 'content_negotiation' self._wordlist += os.path.sep + 'common_filenames.db' # Internal variables self._exec = True self._already_tested_dir = scalable_bloomfilter() self._already_tested_resource = scalable_bloomfilter() self._is_vulnerable_result = None self._to_bruteforce = [] # I want to try 3 times to see if the remote host is vulnerable # detection is not thaaat accurate! self._tries_left = 3
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._compiled_ignore_re = None self._compiled_follow_re = None self._brokenLinks = [] self._fuzzableRequests = [] self._first_run = True self._already_crawled = disk_list() self._already_filled_form = ScalableBloomFilter() # User configured variables self._ignore_regex = "" self._follow_regex = ".*" self._only_forward = False self._compileRE()
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._compiled_ignore_re = None self._compiled_follow_re = None self._broken_links = disk_set() self._fuzzable_reqs = disk_set() self._first_run = True self._known_variants = variant_db() self._already_filled_form = scalable_bloomfilter() # User configured variables self._ignore_regex = '' self._follow_regex = '.*' self._only_forward = False self._compileRE()
def __init__(self): baseDiscoveryPlugin.__init__(self) # Internal variables self._run = True self._first = True self._start_path = None self._fuzzableRequests = [] self._not_eq = [] self._not_eq_content = [] self._eq = [] self._eq_content = [] # Configuration self._ban_url = ['asp', 'jsp', 'php'] self._content = True self._local_dir = '' self._remote_path = ''