Removing unusable WAF script

This commit is contained in:
Miroslav Stampar 2019-01-20 15:26:57 +01:00
parent 01dba5c505
commit daa915a6f2
3 changed files with 2 additions and 27 deletions

View File

@ -19,7 +19,7 @@ from lib.core.enums import DBMS_DIRECTORY_NAME
from lib.core.enums import OS
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
VERSION = "1.3.1.56"
VERSION = "1.3.1.57"
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

View File

@ -49,7 +49,7 @@ fe370021c6bc99daf44b2bfc0d1effb3 lib/core/patch.py
9a7d68d5fa01561500423791f15cc676 lib/core/replication.py
3179d34f371e0295dd4604568fb30bcd lib/core/revision.py
d6269c55789f78cf707e09a0f5b45443 lib/core/session.py
0328a4b5e5880289b867aa143387b9a9 lib/core/settings.py
65d7f43d13347de8fe30238a082c2066 lib/core/settings.py
a8a7501d1e6b21669b858a62e921d191 lib/core/shell.py
5dc606fdf0afefd4b305169c21ab2612 lib/core/subprocessng.py
eec3080ba5baca44c6de4595f1c92a0d lib/core/target.py
@ -439,7 +439,6 @@ d4f36e44f496f4d51baa3241eabc60fd waf/malcare.py
8004b57e9b8e19060aae5b82ecb87472 waf/netscaler.py
96e1902b7e4297173d519b00c86f6a02 waf/newdefend.py
d03dfe93a14c966b88f5baf59ce2b091 waf/ninjafirewall.py
69fc40e85751279e9018d643742db04e waf/nsfocus.py
a59aff03a5b3fb40ea0feb3489677040 waf/onmessageshield.py
532b6f8de357a9b88a313944e1756538 waf/paloalto.py
f9de9375ffd0447ba93b215493d327a1 waf/perimeterx.py

View File

@ -1,24 +0,0 @@
#!/usr/bin/env python
"""
Copyright (c) 2006-2019 sqlmap developers (http://sqlmap.org/)
See the file 'LICENSE' for copying permission
"""
import re
from lib.core.enums import HTTP_HEADER
from lib.core.settings import WAF_ATTACK_VECTORS
__product__ = "NSFOCUS Web Application Firewall (NSFOCUS)"
def detect(get_page):
retval = False
for vector in WAF_ATTACK_VECTORS:
_, headers, _ = get_page(get=vector)
retval = re.search(r"NSFocus", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None
if retval:
break
return retval