def __init__(self): baseAttackPlugin.__init__(self) # Internal variables self._exploit_url = None # User configured variables self._url = "" self._generateOnlyOne = True
def __init__(self): baseAttackPlugin.__init__(self) # User configured parameter self._change_to_post = True self._url = '' self._separator = ';' self._data = '' self._inj_var = '' self._method = 'GET'
def __init__(self): baseAttackPlugin.__init__(self) # Internal variables self._path_name = '' self._file_name = '' # User configured variables ( for fastExploit ) self._url = '' self._method = 'POST' self._data = '' self._fileVars = '' self._fileDest = ''
def __init__(self): baseAttackPlugin.__init__(self) # Internal variables self._shell_code = None # User configured variables self._changeToPost = True self._url = '' self._method = 'GET' self._data = '' self._inj_var = '' self._generateOnlyOne = True
def __init__(self): baseAttackPlugin.__init__(self) # Internal variables self._shell = None self._xss_vuln = None self._exploit_dc = None # User configured variables self._listen_port = w3afPorts.REMOTEFILEINCLUDE_SHELL self._listen_address = get_local_ip() self._use_XSS_vuln = True self._generateOnlyOne = True
def __init__(self): baseAttackPlugin.__init__(self) # Internal variables self._already_tested = [] # User configured variables self._changeToPost = True self._url = '' self._method = 'GET' self._data = '' self._file_pattern = '' self._generateOnlyOne = True
def __init__(self): baseAttackPlugin.__init__(self) # User configured parameter self._change_to_post = True self._url = "" self._data = "" self._inj_var = "" self._method = "GET" # Internal variables self.use_difflib = None self.rnum = randint(1, 100)
def __init__(self): baseAttackPlugin.__init__(self) # Internal variables self._vuln = None # User configured variables self._beefPasswd = 'BeEFConfigPass' # without the hook dir ! self._beefURL = 'http://localhost/beef/' # A message to the user self._message = 'You can start interacting with the beEF server at: ' self._message += urlParser.urlJoin( self._beefURL, 'ui/' )
def __init__(self): baseAttackPlugin.__init__(self) # Internal variables self._vuln = None self._driver = None # User configured options for fastExploit self._url = '' self._method = 'GET' self._data = '' self._injvar = '' # User configured variables self._eq_limit = 0.9 self._goodSamaritan = True self._generateOnlyOne = True
def __init__( self ): baseAttackPlugin.__init__(self) w3afThread.__init__( self ) self._proxyAddress = '127.0.0.1' self._proxyPort = w3afPorts.RFIPROXY self._rfiConnGenerator = '' self._httpdPort = w3afPorts.RFIPROXY2 self._proxy = None self._wS = None self._go = True self._url = None self._method = None self._exploitQs = None self._proxyPublicIP = cf.cf.getData( 'localAddress' )
def __init__(self): baseAttackPlugin.__init__(self) # Internal variables self._vuln = None self._driver = None # User configured options for fastExploit self._url = "" self._method = "GET" self._data = "" self._injvar = "" # User configured variables self._equalLimit = 0.9 self._equAlgorithm = "setIntersection" self._goodSamaritan = True self._generateOnlyOne = True