def set_default_values(self): """ Load all the default settings :return: None """ cf.cf.save('fuzz_cookies', False) cf.cf.save('fuzz_form_files', True) cf.cf.save('fuzzed_files_extension', 'gif') cf.cf.save('fuzz_url_filenames', False) cf.cf.save('fuzz_url_parts', False) cf.cf.save('fuzzable_headers', []) cf.cf.save('form_fuzzing_mode', 'tmb') cf.cf.save('path_max_variants', PATH_MAX_VARIANTS) cf.cf.save('params_max_variants', PARAMS_MAX_VARIANTS) cf.cf.save('max_equal_form_variants', MAX_EQUAL_FORM_VARIANTS) cf.cf.save('max_discovery_time', 120) cf.cf.save('max_scan_time', 240) cf.cf.save('msf_location', '/opt/metasploit3/bin/') # # The network interface configuration (for advanced exploits) # ifname = get_net_iface() cf.cf.save('interface', ifname) # # This doesn't send any packets, and gives you a nice default # setting. In most cases, it is the "public" IP address, which will # work perfectly in all plugins that need a reverse connection # (rfi_proxy) # local_address = get_local_ip() if not local_address: local_address = '127.0.0.1' # do'h! cf.cf.save('local_ip_address', local_address) cf.cf.save('stop_on_first_exception', False) # Blacklists cf.cf.save('blacklist_http_request', []) cf.cf.save('blacklist_audit', []) # Form exclusion via IDs cf.cf.save('form_id_list', FormIDMatcherList('[]')) cf.cf.save('form_id_action', EXCLUDE) # Language to use when reading from vulndb cf.cf.save('vulndb_language', DBVuln.DEFAULT_LANG)
def set_default_values(self): """ Load all the default settings :return: None """ cf.cf.save('fuzz_cookies', False) cf.cf.save('fuzz_form_files', True) cf.cf.save('fuzzed_files_extension', 'gif') cf.cf.save('fuzz_url_filenames', False) cf.cf.save('fuzz_url_parts', False) cf.cf.save('fuzzable_headers', []) cf.cf.save('form_fuzzing_mode', 'tmb') cf.cf.save('path_max_variants', PATH_MAX_VARIANTS) cf.cf.save('params_max_variants', PARAMS_MAX_VARIANTS) cf.cf.save('max_equal_form_variants', MAX_EQUAL_FORM_VARIANTS) cf.cf.save('max_discovery_time', 120) cf.cf.save('msf_location', '/opt/metasploit3/bin/') # # The network interface configuration (for advanced exploits) # ifname = get_net_iface() cf.cf.save('interface', ifname) # # This doesn't send any packets, and gives you a nice default # setting. In most cases, it is the "public" IP address, which will # work perfectly in all plugins that need a reverse connection # (rfi_proxy) # local_address = get_local_ip() if not local_address: local_address = '127.0.0.1' # do'h! cf.cf.save('local_ip_address', local_address) cf.cf.save('non_targets', []) cf.cf.save('stop_on_first_exception', False) # Form exclusion via IDs cf.cf.save('form_id_list', FormIDMatcherList('[]')) cf.cf.save('form_id_action', EXCLUDE) # Language to use when reading from vulndb cf.cf.save('vulndb_language', DBVuln.DEFAULT_LANG)
def __init__(self): """ Set the defaults and save them to the config dict. """ # # User configured variables # if cf.cf.get('fuzz_cookies') is None: # It's the first time I'm run cf.cf.save('fuzz_cookies', False) cf.cf.save('fuzz_form_files', True) cf.cf.save('fuzzed_files_extension', 'gif') cf.cf.save('fuzz_url_filenames', False) cf.cf.save('fuzz_url_parts', False) cf.cf.save('fuzzable_headers', []) cf.cf.save('form_fuzzing_mode', 'tmb') cf.cf.save('max_discovery_time', 120) cf.cf.save('msf_location', '/opt/metasploit3/bin/') # # # ifname = get_net_iface() cf.cf.save('interface', ifname) # # This doesn't send any packets, and gives you a nice default # setting. In most cases, it is the "public" IP address, which will # work perfectly in all plugins that need a reverse connection # (rfi_proxy) # local_address = get_local_ip() if not local_address: local_address = '127.0.0.1' # do'h! cf.cf.save('local_ip_address', local_address) cf.cf.save('non_targets', []) cf.cf.save('stop_on_first_exception', False)
def set_default_values(self): """ Load all the default settings :return: None """ cf.cf.save('fuzz_cookies', False) cf.cf.save('fuzz_form_files', True) cf.cf.save('fuzzed_files_extension', 'gif') cf.cf.save('fuzz_url_filenames', False) cf.cf.save('fuzz_url_parts', False) cf.cf.save('fuzzable_headers', []) cf.cf.save('form_fuzzing_mode', 'tmb') cf.cf.save('max_discovery_time', 120) cf.cf.save('msf_location', '/opt/metasploit3/bin/') # # The network interface configuration (for advanced exploits) # ifname = get_net_iface() cf.cf.save('interface', ifname) # # This doesn't send any packets, and gives you a nice default # setting. In most cases, it is the "public" IP address, which will # work perfectly in all plugins that need a reverse connection # (rfi_proxy) # local_address = get_local_ip() if not local_address: local_address = '127.0.0.1' # do'h! cf.cf.save('local_ip_address', local_address) cf.cf.save('non_targets', []) cf.cf.save('stop_on_first_exception', False) # Form exclusion via IDs cf.cf.save('form_id_list', FormIDMatcherList('[]')) cf.cf.save('form_id_action', EXCLUDE)
def set_default_values(self): """ Load all the default settings :return: None """ cf.cf.save('fuzz_cookies', False) cf.cf.save('fuzz_form_files', True) cf.cf.save('fuzzed_files_extension', 'gif') cf.cf.save('fuzz_url_filenames', False) cf.cf.save('fuzz_url_parts', False) cf.cf.save('fuzzable_headers', []) cf.cf.save('form_fuzzing_mode', 'tmb') cf.cf.save('max_discovery_time', 120) cf.cf.save('msf_location', '/opt/metasploit3/bin/') # # The network interface configuration (for advanced exploits) # ifname = get_net_iface() cf.cf.save('interface', ifname) # # This doesn't send any packets, and gives you a nice default # setting. In most cases, it is the "public" IP address, which will # work perfectly in all plugins that need a reverse connection # (rfi_proxy) # local_address = get_local_ip() if not local_address: local_address = '127.0.0.1' # do'h! cf.cf.save('local_ip_address', local_address) cf.cf.save('non_targets', []) cf.cf.save('stop_on_first_exception', False) cf.cf.save('params_max_variants', 10) cf.cf.save('path_max_variants', 50)