def test_open_file(mck_open): """ Test open_file. """ utils.open_file("random_path") # Assert open is called with the correct path mck_open.assert_called_with("random_path", "r")
def __init__(self, debug=False): """ Initialize SQLi. Args: debug (bool): Log on terminal or not Raises: None Returns: None """ # Initialize logger self.logger = ServerLogger( __name__, debug=debug ) # Path of file containing sqli payloads self.PAYLOAD_FILE = "securetea/lib/log_monitor/server_log/rules/payloads/sqli.txt" # Path of file containing sqli regex rules self.REGEX_FILE = "securetea/lib/log_monitor/server_log/rules/regex/sqli.txt" # Load sqli payloads self.payloads = utils.open_file(self.PAYLOAD_FILE) # Load sqli regex rules self.regex = utils.open_file(self.REGEX_FILE) # Logged IP list self.logged_IP = list()
def __init__(self, debug=False): """ Initialize CrossSite. Args: debug (bool): Log on terminal or not Raises: None Returns: None """ # Initialize logger self.logger = ServerLogger( __name__, debug=debug ) # Path of file containing XSS payloads self.PAYLOAD_FILE = "securetea/lib/log_monitor/server_log/rules/payloads/xss.txt" # Path of file containing XSS regex rules self.REGEX_FILE = "securetea/lib/log_monitor/server_log/rules/regex/xss.txt" # Load XSS payloads self.payloads = utils.open_file(self.PAYLOAD_FILE) # Load XSS regex rules self.regex = utils.open_file(self.REGEX_FILE) # Logged IP list self.logged_IP = list() # Initialize OSINT object self.osint_obj = OSINT(debug=debug)
def __init__(self,test=False,debug=False): """ Initialize Ssrf Args: debug (bool): Log on terminal or not Raises: None Returns: None """ # Initialize logger self.logger = ServerLogger( __name__, debug=debug ) if test: # Path of file containing SSRF payloads self.PAYLOAD_FILE = "securetea/lib/log_monitor/server_log/rules/payloads/ssrf.txt" # Path of file containing SSRF regex rules self.REGEX_FILE = "securetea/lib/log_monitor/server_log/rules/regex/ssrf.txt" # Path of the IP Rules self.IP_FILE = "securetea/lib/log_monitor/server_log/rules/payloads/ips.txt" else: # Path of file containing SSRF payloads self.PAYLOAD_FILE = "/etc/securetea/log_monitor/server_log/payloads/ssrf.txt" # Path of file containing SSRF regex rules self.REGEX_FILE = "/etc/securetea/log_monitor/server_log/regex/ssrf.txt" # Path of the IP Rules self.IP_FILE = "/etc/securetea/log_monitor/server_log/payloads/ips.txt" # Load SSRF payloads self.payloads = utils.open_file(self.PAYLOAD_FILE) # Load SSRF regex rules self.regex = utils.open_file(self.REGEX_FILE) # IPs self.ips = utils.open_file(self.IP_FILE) # Logged IP list self.logged_IP = list() # Initialize OSINT object self.osint_obj = OSINT(debug=debug)
def __init__(self, debug=False): """ Initialize SpiderDetect. Args: debug (bool): Log on terminal or not Raises: None Returns: None """ # Initialize logger self.logger = ServerLogger( __name__, debug=debug ) # Path of file containing spider user agents payloads self._PAYLOAD_FILE = "securetea/lib/log_monitor/server_log/rules/payloads/bad_ua.txt" # Load spider user agents payloads self.payloads = utils.open_file(self._PAYLOAD_FILE) # Initialize threshold to 50 request / second self._THRESHOLD = 50 # inter = 0.02 # List of IPs self.logged_IP = list()
def parse(self): """ Parse the log file and save the parsed data into a dict. Args: None Raises: None Returns: nginx_dict (dict): Dict containing the parsed data, IP being the key """ # Clear & rotate log file parsed data self.nginx_dict.clear() self.nginx_log_data = utils.open_file(self.path) for line in self.nginx_log_data: parsed_data = re.findall(self.NGINX_RGX, line) if parsed_data: ip = parsed_data[0][0] date = parsed_data[0][1].strip(" ") day = date.split("/")[0] month = date.split("/")[1] year = str(date.split("/")[2].split(":")[0]) last_time = ":".join(str(date.split("/")[2]).split(":")[1:]) ep_time = utils.get_epoch_time(month, day, year, last_time) get = parsed_data[0][2] status_code = parsed_data[0][3].strip(" ") user_agent = parsed_data[0][4] if self.check_within_window(ep_time): self.update_dict(ip, ep_time, get, status_code, user_agent) return self.nginx_dict
def __init__(self, debug=False, test=False): """ Initialize WebShell. Args: debug (bool): Log on terminal or not Raises: None Returns: None """ # Initialize logger self.logger = ServerLogger(__name__, debug=debug) if test: # Path of file containing web_shell payloads self.PAYLOAD_FILE = "securetea/lib/log_monitor/server_log/rules/payloads/web_shell.txt" else: # Path of file containing web_shell payloads self.PAYLOAD_FILE = "/etc/securetea/log_monitor/server_log/payloads/web_shell.txt" # Load web_shell payloads self.payloads = utils.open_file(self.PAYLOAD_FILE) # Logged IP list self.logged_IP = list() # Initialize OSINT object self.osint_obj = OSINT(debug=debug)
def __init__(self, debug=False): """ Initialize PortScan. Args: debug (bool): Log on terminal or not Raises: None Returns: None """ # Initialize logger self.logger = ServerLogger(__name__, debug=debug) # Path of file containing port_scan payloads self.PAYLOAD_FILE = "securetea/lib/log_monitor/server_log/rules/payloads/port_scan_ua.txt" # Load port_scan payloads self.payloads = utils.open_file(self.PAYLOAD_FILE) # List of IPs self.logged_IP = list() # Initialize OSINT object self.osint_obj = OSINT(debug=debug)