def test_parse_raw_multi_response(self): fr = FuzzRequest() fr.update_from_raw_http(http_multi_request, "https", http_follow_response) self.assertEqual(fr.content, "LINE_1") self.assertEqual(fr.code, 200)
def _gen_burpitem(self, output_fn): try: tree = ET.parse(self.find_file(output_fn)) for item in tree.getroot().iter("item"): fr = FuzzRequest() fr.update_from_raw_http( raw=b64decode(item.find("request").text or "").decode("utf-8"), scheme=item.find("protocol").text, raw_response=b64decode(item.find("response").text or ""), ) fr.wf_ip = { "ip": item.find("host").attrib.get("ip", None) or item.find("host").text, "port": item.find("port").text, } frr = FuzzResult(history=fr) yield frr.update() return except IOError as e: raise FuzzExceptBadFile( "Error opening Burp items payload file. %s" % str(e)) except EOFError: return
def test_parse_multi_raw_request(self): fr = FuzzRequest() fr.update_from_raw_http(http_multi_request, "https", http_response) self.assertEqual(fr.params.post.id, "561358470665569") self.assertEqual(fr.params.post.rqm, "SB") self.assertEqual(fr.content, "LINE_1")
def get_filtered_fuzzrequest(self, filter_str): fr = FuzzRequest() fr.update_from_raw_http(raw_req, "http", raw_resp, b"") fuzz_res = FuzzResult(history=fr) ffilter = FuzzResFilter(filter_string=filter_str) ffilter.is_visible(fuzz_res) return fuzz_res
def burp_to_xml(self, filename): """Unzip Burp's file, remove non-printable characters, CDATA any HTML, include a valid XML header and trailer, and return a valid XML string.""" z = zipfile.ZipFile(self.find_file(filename)) # Open Burp's zip file burp = z.read("burp", "rb") # Read-in the main burp file m = TAG.match(burp, 0) # Match a tag at the start of the string while m: index = m.end() etag = m.group().replace("<", "</") # Matching tag m = TAG.match(burp, index) # Attempt to get the next tag if not m: # Data folows # Read the type of data using Burp's binary data headers value, length = self.burp_binary_field(burp, index) if value is None: break index += length + len(etag) # Point our index to the next tag m = TAG.match(burp, index) # And retrieve it if (self.params["checkversion"] and etag == "</version>" and value not in ["65", "67"]): raise FuzzExceptBadFile("Unknown burp log version %s" % value) if etag == "</https>": https_tag = value == "True" if etag in self.request_tags: raw_request = self.strip_cdata(value) if etag in self.response_tags: fr = FuzzRequest() fr.update_from_raw_http( raw_request, "http" if not https_tag else "https", self.strip_cdata(value), ) frr = FuzzResult(history=fr) raw_request = "" https_tag = "" yield frr.update()
def test_2_ways_of_parsing_content(self): fr = FuzzRequest() fr.update_from_raw_http(http_multi_request, "https", http_response) fr2 = FuzzRequest() fr2.update_from_raw_http(http_multi_request, "https", http_response_no_content, b"LINE_1") # raw content takes precedence fr3 = FuzzRequest() fr3.update_from_raw_http(http_multi_request, "https", http_response, b"LINE_0") self.assertEqual(fr.content, fr2.content) self.assertEqual(fr3.content, "LINE_0")
def full_fuzzreq(request): http_req, http_response = request.param fr = FuzzRequest() fr.update_from_raw_http(http_req, "http", http_response, None) return fr
def test_parse_crlf_post_request(self): fr = FuzzRequest() fr.update_from_raw_http(http_post_request, "https", "\n\n\n") self.assertEqual(fr.method, "POST") self.assertEqual(fr.params.post, {"a": "1"})
def test_parse_get_crlf_request(self): fr = FuzzRequest() fr.update_from_raw_http(http_get_request, "https", "\n\n\n") self.assertEqual(fr.method, "GET") self.assertEqual(fr.params.raw_post, None)
def parse_burp_log(self, burp_log): burp_file = None try: burp_file = open( self.find_file(burp_log), "r", encoding="utf-8", errors="surrogateescape", ) history = "START" rl = burp_file.readline() while rl != "": if history == "START": if rl == DELIMITER: history = "HEADER" elif history == "HEADER": if rl == DELIMITER: raw_request = "" history = "REQUEST" else: matched = HEADER.match(rl) ctime, host, ip_address = matched.group(1, 3, 5) elif history == "REQUEST": if rl == DELIMITER: history = "DELIM1" else: raw_request += rl elif history == "DELIM1": if rl == CRLF: raw_response = "" history = "DELIM3" else: raw_response = rl history = "RESPONSE" elif history == "RESPONSE": if rl == DELIMITER: history = "DELIM2" else: raw_response += rl elif history == "DELIM2": if rl == CRLF: history = "DELIM3" elif history == "DELIM3": if rl == CRLF: history = "DELIM4" elif history == "DELIM4": if rl == CRLF: fr = FuzzRequest() # last read line contains an extra CRLF fr.update_from_raw_http(raw_request, host[:host.find("://")], raw_response[:-1]) frr = FuzzResult(history=fr) yield frr.update() history = "START" rl = burp_file.readline() except IOError as e: raise FuzzExceptBadFile("Error opening burp log file. %s" % str(e)) finally: if burp_file is not None: burp_file.close()