Exemplo n.º 1
0
    def set_default_values(self):
        """
        Load all the default settings
        :return: None
        """
        cf.cf.save('fuzz_cookies', False)
        cf.cf.save('fuzz_form_files', True)
        cf.cf.save('fuzzed_files_extension', 'gif')
        cf.cf.save('fuzz_url_filenames', False)
        cf.cf.save('fuzz_url_parts', False)
        cf.cf.save('fuzzable_headers', [])

        cf.cf.save('form_fuzzing_mode', 'tmb')

        cf.cf.save('path_max_variants', PATH_MAX_VARIANTS)
        cf.cf.save('params_max_variants', PARAMS_MAX_VARIANTS)
        cf.cf.save('max_equal_form_variants', MAX_EQUAL_FORM_VARIANTS)

        cf.cf.save('max_discovery_time', 120)
        cf.cf.save('max_scan_time', 240)

        cf.cf.save('msf_location', '/opt/metasploit3/bin/')

        #
        # The network interface configuration (for advanced exploits)
        #
        ifname = get_net_iface()
        cf.cf.save('interface', ifname)

        #
        # This doesn't send any packets, and gives you a nice default
        # setting. In most cases, it is the "public" IP address, which will
        # work perfectly in all plugins that need a reverse connection
        # (rfi_proxy)
        #
        local_address = get_local_ip()
        if not local_address:
            local_address = '127.0.0.1'  # do'h!

        cf.cf.save('local_ip_address', local_address)
        cf.cf.save('stop_on_first_exception', False)

        # Blacklists
        cf.cf.save('blacklist_http_request', [])
        cf.cf.save('blacklist_audit', [])

        # Form exclusion via IDs
        cf.cf.save('form_id_list', FormIDMatcherList('[]'))
        cf.cf.save('form_id_action', EXCLUDE)

        # Language to use when reading from vulndb
        cf.cf.save('vulndb_language', DBVuln.DEFAULT_LANG)
Exemplo n.º 2
0
    def set_default_values(self):
        """
        Load all the default settings
        :return: None
        """
        cf.cf.save('fuzz_cookies', False)
        cf.cf.save('fuzz_form_files', True)
        cf.cf.save('fuzzed_files_extension', 'gif')
        cf.cf.save('fuzz_url_filenames', False)
        cf.cf.save('fuzz_url_parts', False)
        cf.cf.save('fuzzable_headers', [])

        cf.cf.save('form_fuzzing_mode', 'tmb')

        cf.cf.save('path_max_variants', PATH_MAX_VARIANTS)
        cf.cf.save('params_max_variants', PARAMS_MAX_VARIANTS)
        cf.cf.save('max_equal_form_variants', MAX_EQUAL_FORM_VARIANTS)

        cf.cf.save('max_discovery_time', 120)

        cf.cf.save('msf_location', '/opt/metasploit3/bin/')

        #
        # The network interface configuration (for advanced exploits)
        #
        ifname = get_net_iface()
        cf.cf.save('interface', ifname)

        #
        # This doesn't send any packets, and gives you a nice default
        # setting. In most cases, it is the "public" IP address, which will
        # work perfectly in all plugins that need a reverse connection
        # (rfi_proxy)
        #
        local_address = get_local_ip()
        if not local_address:
            local_address = '127.0.0.1'  # do'h!

        cf.cf.save('local_ip_address', local_address)
        cf.cf.save('non_targets', [])
        cf.cf.save('stop_on_first_exception', False)

        # Form exclusion via IDs
        cf.cf.save('form_id_list', FormIDMatcherList('[]'))
        cf.cf.save('form_id_action', EXCLUDE)

        # Language to use when reading from vulndb
        cf.cf.save('vulndb_language', DBVuln.DEFAULT_LANG)
Exemplo n.º 3
0
    def __init__(self):
        """
        Set the defaults and save them to the config dict.
        """
        #
        # User configured variables
        #
        if cf.cf.get('fuzz_cookies') is None:
            # It's the first time I'm run
            cf.cf.save('fuzz_cookies', False)
            cf.cf.save('fuzz_form_files', True)
            cf.cf.save('fuzzed_files_extension', 'gif')
            cf.cf.save('fuzz_url_filenames', False)
            cf.cf.save('fuzz_url_parts', False)
            cf.cf.save('fuzzable_headers', [])

            cf.cf.save('form_fuzzing_mode', 'tmb')

            cf.cf.save('max_discovery_time', 120)

            cf.cf.save('msf_location', '/opt/metasploit3/bin/')

            #
            #
            #
            ifname = get_net_iface()
            cf.cf.save('interface', ifname)

            #
            # This doesn't send any packets, and gives you a nice default
            # setting. In most cases, it is the "public" IP address, which will
            # work perfectly in all plugins that need a reverse connection
            # (rfi_proxy)
            #
            local_address = get_local_ip()
            if not local_address:
                local_address = '127.0.0.1'  # do'h!

            cf.cf.save('local_ip_address', local_address)
            cf.cf.save('non_targets', [])
            cf.cf.save('stop_on_first_exception', False)
Exemplo n.º 4
0
    def __init__(self):
        """
        Set the defaults and save them to the config dict.
        """
        #
        # User configured variables
        #
        if cf.cf.get('fuzz_cookies') is None:
            # It's the first time I'm run
            cf.cf.save('fuzz_cookies', False)
            cf.cf.save('fuzz_form_files', True)
            cf.cf.save('fuzzed_files_extension', 'gif')
            cf.cf.save('fuzz_url_filenames', False)
            cf.cf.save('fuzz_url_parts', False)
            cf.cf.save('fuzzable_headers', [])

            cf.cf.save('form_fuzzing_mode', 'tmb')

            cf.cf.save('max_discovery_time', 120)

            cf.cf.save('msf_location', '/opt/metasploit3/bin/')

            #
            #
            #
            ifname = get_net_iface()
            cf.cf.save('interface', ifname)

            #
            # This doesn't send any packets, and gives you a nice default
            # setting. In most cases, it is the "public" IP address, which will
            # work perfectly in all plugins that need a reverse connection
            # (rfi_proxy)
            #
            local_address = get_local_ip()
            if not local_address:
                local_address = '127.0.0.1'  # do'h!

            cf.cf.save('local_ip_address', local_address)
            cf.cf.save('non_targets', [])
            cf.cf.save('stop_on_first_exception', False)
Exemplo n.º 5
0
    def set_default_values(self):
        """
        Load all the default settings
        :return: None
        """
        cf.cf.save('fuzz_cookies', False)
        cf.cf.save('fuzz_form_files', True)
        cf.cf.save('fuzzed_files_extension', 'gif')
        cf.cf.save('fuzz_url_filenames', False)
        cf.cf.save('fuzz_url_parts', False)
        cf.cf.save('fuzzable_headers', [])

        cf.cf.save('form_fuzzing_mode', 'tmb')

        cf.cf.save('max_discovery_time', 120)

        cf.cf.save('msf_location', '/opt/metasploit3/bin/')

        #
        # The network interface configuration (for advanced exploits)
        #
        ifname = get_net_iface()
        cf.cf.save('interface', ifname)

        #
        # This doesn't send any packets, and gives you a nice default
        # setting. In most cases, it is the "public" IP address, which will
        # work perfectly in all plugins that need a reverse connection
        # (rfi_proxy)
        #
        local_address = get_local_ip()
        if not local_address:
            local_address = '127.0.0.1'  # do'h!

        cf.cf.save('local_ip_address', local_address)
        cf.cf.save('non_targets', [])
        cf.cf.save('stop_on_first_exception', False)

        # Form exclusion via IDs
        cf.cf.save('form_id_list', FormIDMatcherList('[]'))
        cf.cf.save('form_id_action', EXCLUDE)
Exemplo n.º 6
0
    def set_default_values(self):
        """
        Load all the default settings
        :return: None
        """
        cf.cf.save('fuzz_cookies', False)
        cf.cf.save('fuzz_form_files', True)
        cf.cf.save('fuzzed_files_extension', 'gif')
        cf.cf.save('fuzz_url_filenames', False)
        cf.cf.save('fuzz_url_parts', False)
        cf.cf.save('fuzzable_headers', [])

        cf.cf.save('form_fuzzing_mode', 'tmb')

        cf.cf.save('max_discovery_time', 120)

        cf.cf.save('msf_location', '/opt/metasploit3/bin/')

        #
        # The network interface configuration (for advanced exploits)
        #
        ifname = get_net_iface()
        cf.cf.save('interface', ifname)

        #
        # This doesn't send any packets, and gives you a nice default
        # setting. In most cases, it is the "public" IP address, which will
        # work perfectly in all plugins that need a reverse connection
        # (rfi_proxy)
        #
        local_address = get_local_ip()
        if not local_address:
            local_address = '127.0.0.1'  # do'h!

        cf.cf.save('local_ip_address', local_address)
        cf.cf.save('non_targets', [])
        cf.cf.save('stop_on_first_exception', False)

        cf.cf.save('params_max_variants', 10)
        cf.cf.save('path_max_variants', 50)