def test_from_conn(self): fr = FuzzRequest() fr.update_from_raw_http(raw_req, 'https', raw_response_header, raw_response_body) self.assertEqual(fr.code, 404) self.assertEqual(fr.content.count("\n"), 11)
def parse_burp_log(self, burp_log): burp_file = None try: burp_file = open(self.find_file(burp_log), 'rb') history = 'START' rl = burp_file.readline() while rl != "": if history == "START": if rl == DELIMITER: history = "HEADER" elif history == "HEADER": if rl == DELIMITER: raw_request = "" history = "REQUEST" else: matched = HEADER.match(rl) ctime, host, ip_address = matched.group(1, 3, 5) elif history == "REQUEST": if rl == DELIMITER: history = "DELIM1" else: raw_request += rl elif history == "DELIM1": if rl == CRLF: raw_response = "" history = "DELIM3" else: raw_response = rl history = "RESPONSE" elif history == "RESPONSE": if rl == DELIMITER: history = "DELIM2" else: raw_response += rl elif history == "DELIM2": if rl == CRLF: history = "DELIM3" elif history == "DELIM3": if rl == CRLF: history = "DELIM4" elif history == "DELIM4": if rl == CRLF: fr = FuzzRequest() fr.update_from_raw_http(raw_request, host[:host.find("://")], raw_response) frr = FuzzResult(history=fr) yield frr.update() history = "START" rl = burp_file.readline() except IOError as e: raise FuzzExceptBadFile("Error opening burp log file. %s" % str(e)) finally: if burp_file is not None: burp_file.close()
def _gen_burpitem(self, output_fn): try: tree = ET.parse(self.find_file(output_fn)) for item in tree.getroot().iter('item'): fr = FuzzRequest() fr.update_from_raw_http( raw=b64decode(item.find('request').text or "").decode('utf-8'), scheme=item.find('protocol').text, raw_response=b64decode(item.find('response').text or "")) fr.wf_ip = { 'ip': item.find('host').attrib.get('ip', None) or item.find('host').text, 'port': item.find('port').text } frr = FuzzResult(history=fr) yield frr.update() return except IOError as e: raise FuzzExceptBadFile( "Error opening Burp items payload file. %s" % str(e)) except EOFError: return
def test_parse_raw_multi_response(self): fr = FuzzRequest() fr.update_from_raw_http(http_multi_request, "https", http_follow_response) self.assertEqual(fr.content, "LINE_1") self.assertEqual(fr.code, 200)
def test_parse_multi_raw_request(self): fr = FuzzRequest() fr.update_from_raw_http(http_multi_request, "https", http_response) self.assertEqual(fr.params.post.id, "561358470665569") self.assertEqual(fr.params.post.rqm, "SB") self.assertEqual(fr.content, "LINE_1")
def parse_burp_log(self, burp_log): burp_file = None try: burp_file = open(self.find_file(burp_log), 'rb') history = 'START' rl = burp_file.readline() while rl != "": if history == "START": if rl == DELIMITER: history = "HEADER" elif history == "HEADER": if rl == DELIMITER: raw_request = "" history = "REQUEST" else: matched = HEADER.match(rl) ctime, host, ip_address = matched.group(1, 3, 5) elif history == "REQUEST": if rl == DELIMITER: history = "DELIM1" else: raw_request += rl elif history == "DELIM1": if rl == CRLF: raw_response = "" history = "DELIM3" else: raw_response = rl history = "RESPONSE" elif history == "RESPONSE": if rl == DELIMITER: history = "DELIM2" else: raw_response += rl elif history == "DELIM2": if rl == CRLF: history = "DELIM3" elif history == "DELIM3": if rl == CRLF: history = "DELIM4" elif history == "DELIM4": if rl == CRLF: fr = FuzzRequest() fr.update_from_raw_http(raw_request, host[:host.find("://")], raw_response) frr = FuzzResult(history=fr) yield frr.update() history = "START" rl = burp_file.readline() except IOError, e: raise FuzzExceptBadFile("Error opening burp log file. %s" % str(e))
def test_location(self): fr = FuzzRequest() fr.update_from_raw_http(raw_req, "http", raw_resp, b"Some line\n and words\nasdsdas") fuzz_res = FuzzResult(history=fr) ffilter = FuzzResFilter(filter_string="r.headers.response.Location") ffilter.is_visible(fuzz_res) self.assertEqual('https://wfuzz.readthedocs.io/en/latest/', ffilter.is_visible(fuzz_res))
def test_lwh(self): fr = FuzzRequest() fr.update_from_raw_http(raw_req, "http", raw_resp, b"Some line\n and words\nasdsdas") fuzz_res = FuzzResult(history=fr) ffilter = FuzzResFilter(filter_string="h=28 or w=6 or l=2") ffilter.is_visible(fuzz_res) self.assertEqual(True, ffilter.is_visible(fuzz_res))
def get_filtered_fuzzrequest(self, filter_str): fr = FuzzRequest() fr.update_from_raw_http(raw_req, "http", raw_resp, b"") fuzz_res = FuzzResult(history=fr) ffilter = FuzzResFilter(filter_string=filter_str) ffilter.is_visible(fuzz_res) return fuzz_res
def burp_to_xml(self, filename): '''Unzip Burp's file, remove non-printable characters, CDATA any HTML, include a valid XML header and trailer, and return a valid XML string.''' z = zipfile.ZipFile(self.find_file(filename)) # Open Burp's zip file burp = z.read('burp', 'rb') # Read-in the main burp file m = TAG.match(burp, 0) # Match a tag at the start of the string while m: index = m.end() etag = m.group().replace('<', '</') # Matching tag m = TAG.match(burp, index) # Attempt to get the next tag if not m: # Data folows # Read the type of data using Burp's binary data headers value, length = self.burp_binary_field(burp, index) if value is None: break index += length + len(etag) # Point our index to the next tag m = TAG.match(burp, index) # And retrieve it if self.params[ "checkversion"] and etag == "</version>" and value not in [ "65", "67" ]: raise FuzzExceptBadFile("Unknown burp log version %s" % value) if etag == "</https>": https_tag = value == "True" if etag in self.request_tags: raw_request = self.strip_cdata(value) if etag in self.response_tags: fr = FuzzRequest() fr.update_from_raw_http( raw_request, "http" if not https_tag else "https", self.strip_cdata(value)) frr = FuzzResult(history=fr) raw_request = "" https_tag = "" yield frr.update()
def burp_to_xml(self, filename): '''Unzip Burp's file, remove non-printable characters, CDATA any HTML, include a valid XML header and trailer, and return a valid XML string.''' z = zipfile.ZipFile(self.find_file(filename)) # Open Burp's zip file burp = z.read('burp', 'rb') # Read-in the main burp file m = TAG.match(burp, 0) # Match a tag at the start of the string while m: index = m.end() etag = m.group().replace('<', '</') # Matching tag m = TAG.match(burp, index) # Attempt to get the next tag if not m: # Data folows # Read the type of data using Burp's binary data headers value, length = self.burp_binary_field(burp, index) if value is None: break index += length + len(etag) # Point our index to the next tag m = TAG.match(burp, index) # And retrieve it if self.params["checkversion"] and etag == "</version>" and value not in ["65", "67"]: raise FuzzExceptBadFile("Unknown burp log version %s" % value) if etag == "</https>": https_tag = value == "True" if etag in self.request_tags: raw_request = self.strip_cdata(value) if etag in self.response_tags: fr = FuzzRequest() fr.update_from_raw_http(raw_request, "http" if not https_tag else "https", self.strip_cdata(value)) frr = FuzzResult(history=fr) raw_request = "" https_tag = "" yield frr.update()
def test_2_ways_of_parsing_content(self): fr = FuzzRequest() fr.update_from_raw_http(http_multi_request, "https", http_response) fr2 = FuzzRequest() fr2.update_from_raw_http(http_multi_request, "https", http_response_no_content, b"LINE_1") # raw content takes precedence fr3 = FuzzRequest() fr3.update_from_raw_http(http_multi_request, "https", http_response, b"LINE_0") self.assertEqual(fr.content, fr2.content) self.assertEqual(fr3.content, "LINE_0")
def test_parse_crlf_post_request(self): fr = FuzzRequest() fr.update_from_raw_http(http_post_request, "https", "\n\n\n") self.assertEqual(fr.method, "POST") self.assertEqual(fr.params.post, {'a': '1'})
def test_parse_get_crlf_request(self): fr = FuzzRequest() fr.update_from_raw_http(http_get_request, "https", "\n\n\n") self.assertEqual(fr.method, "GET") self.assertEqual(fr.params.raw_post, None)