response.status -> old
response.body.bcontains(b"??")
==> bcontains(b"??", response.body)
response.headers["??"] == "??" ==> old
response.headers["??"].contains("??")
==> contains("??", response.headers["??"])
"??".bmatches(response.body)
==> bmatches(response.body, "??")
[module demo]
name: dirscan-yaml-backstage
wordlist: .\wordlist\test.txt
search: (?P<username>(账[户号]|管理员账[户号]|username|password|密码))
- fastjson
- thinkphp
- struts2
- sql注入检测(联合注入和宽字节注入暂未写完)
- 命令/代码注入检测
- 反射xss检测
name: fuzz-params
rule: /{{param}}=$value$/ ** 匹配规则 **
fuzzlist: **可选参数 fuzz字典,若为空,则为默认fuzz规则**
search: (?P<param>[\w-]+)=(?P<value>[\w%]*)
http://127.0.0.1:8080/?sid=1&id=2 => sid=1 id=2 => sid=$$ id=$$
(1) and -> anandd -> def andDouble()
(2) 空格 -> {"%09", "%0A", "%0C", "%0D", "%0B"} -> def spaceToMySqlBlank()
(3) # -> and [SYMBOL]rand[SYMBOL]=[SYMBOL]rand -> def noteToInference()
使用
e.g.
bypass: spaceToMySqlBlank