Achim,
On Tue, May 19, 2009 at 3:51 PM, Achim Hoffmann <[email protected]> wrote:
>
> Hi Andres,
>
> as you write mails, you're no longer yetlagged ;-)
hehe, no, I arrived some days ago and I'm fully functional now =)
> According Dimitries question/suggestion:
> IIRC all attack signatures are hardcoded, that's difficult to maintain.
> If you give me a short introduction wher (which) file to find the attack
> sigbatures (and the code places where they are manipulated, if any),
> then I try to make a suggestion to handle all attack signatures in a
> simple way, better human readable, better maintenance, better overview, ...
>
> What do you think about that?
I think that having the payloads inside the same plugin, makes it more
readable. The user/developer/etc won't need to go to yet another file,
and see how those files are related in order to understand which
payloads are sent.
A simple example is here:
-----
def _get_echo_commands(self):
'''
@return: This method returns a list of commands to try to
execute in order
to print the content of a known file.
'''
commands = []
for special_char in self._special_chars:
# Unix
cmd_string = special_char + "/bin/cat /etc/passwd"
commands.append( command(cmd_string, 'unix', special_char))
# Windows
cmd_string = special_char + "type %SYSTEMROOT%\\win.ini"
commands.append( command(cmd_string, 'windows', special_char))
# Execution quotes
commands.append( command("`/bin/cat /etc/passwd`", 'unix', '`'))
# FoxPro uses run to run os commands. I found one of this vulns !!
commands.append( command("run type %SYSTEMROOT%\\win.ini",
'windows', 'run'))
# Now I filter the commands based on the targetOS:
targetOS = cf.cf.getData('targetOS').lower()
commands = [ c for c in commands if c.getOs() == targetOS or
targetOS == 'unknown']
return commands
-----
I think that it's easier to read the code, and not an XML file that
represents this information PLUS the python code to parse and filter
it.
On the other hand, I know of at least two tools that work with
external files to define the payloads: nikto and Grendel Scan. So it
seems that at some point the idea that you're proposing makes a lot of
sense. But for now I think that w3af is ok as it is.
What about everybody else? What do you think about this? Would it be
benefitial to write the payloads in different files?
Cheers,
> Cheers,
> Achim
>
> On Tue, 19 May 2009, Dimitri Paranoid wrote:
>
> !! Hi guys,
> !! I played with the w3af for the first time today. I'm specifically
> interested in the XSS scanning (crawling +
> !! fuzzing).
> !!
> !! It seems w3af does not catch the case when the site echoes the
> double-encoded Javascript.
> !! I added the following tests in xss.py, function _get_xss_tests :
> !!
> !! # D.S - url escaped injection string
> !!
> xss_tests.append(('%3CSCrIPT%3Ealert%28%22RANDOMIZE%22%29%3C/SCrIPT%3E',
> [browsers.ALL, ]))
> !!
> !! # D.S - double quoted injection string
> !!
> xss_tests.append(('%2522%253E%253Cscript%253Ealert%2528/RANDOMIZE/%2529%253C/script%253E',
> !! [browsers.ALL, ]))
> ------------------------------------------------------------------------------
> Crystal Reports - New Free Runtime and 30 Day Trial
> Check out the new simplified licensing option that enables
> unlimited royalty-free distribution of the report engine
> for externally facing server and web deployment.
> http://p.sf.net/sfu/businessobjects
>
--
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/
------------------------------------------------------------------------------
Register Now for Creativity and Technology (CaT), June 3rd, NYC. CaT
is a gathering of tech-side developers & brand creativity professionals. Meet
the minds behind Google Creative Lab, Visual Complexity, Processing, &
iPhoneDevCamp asthey present alongside digital heavyweights like Barbarian
Group, R/GA, & Big Spaceship. http://www.creativitycat.com
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users