diff --git a/waf/jiasule.py b/waf/jiasule.py new file mode 100644 index 000000000..c8976db26 --- /dev/null +++ b/waf/jiasule.py @@ -0,0 +1,25 @@ +#!/usr/bin/env python + +""" +Copyright (c) 2006-2013 sqlmap developers (http://sqlmap.org/) +See the file 'doc/COPYING' for copying permission +""" + +import re + +from lib.core.enums import HTTPHEADER +from lib.core.settings import WAF_ATTACK_VECTORS + +__product__ = "Jiasule Web Application Firewall (Jiasule)" + +def detect(get_page): + retval = False + + for vector in WAF_ATTACK_VECTORS: + page, headers, code = get_page(get=vector) + retval = re.search(r"jiasule-WAF", headers.get(HTTPHEADER.SERVER, ""), re.I) is not None + retval |= re.search(r"static\.jiasule\.com/static/js/http_error\.js", page, re.I) is not None + if retval: + break + + return retval diff --git a/waf/knownsec.py b/waf/knownsec.py new file mode 100644 index 000000000..6f3f15b0e --- /dev/null +++ b/waf/knownsec.py @@ -0,0 +1,24 @@ +#!/usr/bin/env python + +""" +Copyright (c) 2006-2013 sqlmap developers (http://sqlmap.org/) +See the file 'doc/COPYING' for copying permission +""" + +import re + +from lib.core.enums import HTTPHEADER +from lib.core.settings import WAF_ATTACK_VECTORS + +__product__ = "KS-WAF (Knownsec)" + +def detect(get_page): + retval = False + + for vector in WAF_ATTACK_VECTORS: + page, headers, code = get_page(get=vector) + retval = re.search(r"url\('/ks-waf-error\.png'\)", page, re.I) is not None + if retval: + break + + return retval