mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-11-04 18:07:46 +03:00 
			
		
		
		
	Adding new WAF scripts
This commit is contained in:
		
							parent
							
								
									be50192d8d
								
							
						
					
					
						commit
						2e2658d4fa
					
				
							
								
								
									
										24
									
								
								waf/ciscoacexml.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								waf/ciscoacexml.py
									
									
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,24 @@
 | 
				
			||||||
 | 
					#!/usr/bin/env python
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					"""
 | 
				
			||||||
 | 
					Copyright (c) 2006-2013 sqlmap developers (http://sqlmap.org/)
 | 
				
			||||||
 | 
					See the file 'doc/COPYING' for copying permission
 | 
				
			||||||
 | 
					"""
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import re
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					from lib.core.enums import HTTPHEADER
 | 
				
			||||||
 | 
					from lib.core.settings import WAF_ATTACK_VECTORS
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					__product__ = "Cisco ACE XML Gateway (Cisco Systems)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def detect(get_page):
 | 
				
			||||||
 | 
					    retval = False
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    for vector in WAF_ATTACK_VECTORS:
 | 
				
			||||||
 | 
					        page, headers, code = get_page(get=vector)
 | 
				
			||||||
 | 
					        retval = re.search(r"ACE XML Gateway", headers.get(HTTPHEADER.SERVER, ""), re.I) is not None
 | 
				
			||||||
 | 
					        if retval:
 | 
				
			||||||
 | 
					            break
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    return retval
 | 
				
			||||||
							
								
								
									
										24
									
								
								waf/incapsula.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								waf/incapsula.py
									
									
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,24 @@
 | 
				
			||||||
 | 
					#!/usr/bin/env python
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					"""
 | 
				
			||||||
 | 
					Copyright (c) 2006-2013 sqlmap developers (http://sqlmap.org/)
 | 
				
			||||||
 | 
					See the file 'doc/COPYING' for copying permission
 | 
				
			||||||
 | 
					"""
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import re
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					from lib.core.enums import HTTPHEADER
 | 
				
			||||||
 | 
					from lib.core.settings import WAF_ATTACK_VECTORS
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					__product__ = "Incapsula Web Application Firewall (Incapsula/Imperva)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def detect(get_page):
 | 
				
			||||||
 | 
					    retval = False
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    for vector in WAF_ATTACK_VECTORS:
 | 
				
			||||||
 | 
					        page, headers, code = get_page(get=vector)
 | 
				
			||||||
 | 
					        retval = re.search(r"incap_ses|visid_incap", headers.get(HTTPHEADER.SET_COOKIE, ""), re.I) is not None
 | 
				
			||||||
 | 
					        if retval:
 | 
				
			||||||
 | 
					            break
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    return retval
 | 
				
			||||||
		Loading…
	
		Reference in New Issue
	
	Block a user