Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 608f141

Browse files
committed
New waf scripts
1 parent 31850e4 commit 608f141

2 files changed

Lines changed: 49 additions & 0 deletions

File tree

waf/stingray.py

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
#!/usr/bin/env python
2+
3+
"""
4+
Copyright (c) 2006-2016 sqlmap developers (http://sqlmap.org/)
5+
See the file 'doc/COPYING' for copying permission
6+
"""
7+
8+
import re
9+
10+
from lib.core.enums import HTTP_HEADER
11+
from lib.core.settings import WAF_ATTACK_VECTORS
12+
13+
__product__ = "Stingray Application Firewall (Riverbed / Brocade)"
14+
15+
def detect(get_page):
16+
retval = False
17+
18+
for vector in WAF_ATTACK_VECTORS:
19+
_, headers, code = get_page(get=vector)
20+
retval = code in (403, 500) and re.search(r"\AX-Mapping-", headers.get(HTTP_HEADER.SET_COOKIE, ""), re.I) is not None
21+
if retval:
22+
break
23+
24+
return retval

waf/yundun.py

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
#!/usr/bin/env python
2+
3+
"""
4+
Copyright (c) 2006-2016 sqlmap developers (http://sqlmap.org/)
5+
See the file 'doc/COPYING' for copying permission
6+
"""
7+
8+
import re
9+
10+
from lib.core.enums import HTTP_HEADER
11+
from lib.core.settings import WAF_ATTACK_VECTORS
12+
13+
__product__ = "Yundun Web Application Firewall (Yundun)"
14+
15+
def detect(get_page):
16+
retval = False
17+
18+
for vector in WAF_ATTACK_VECTORS:
19+
_, headers, _ = get_page(get=vector)
20+
retval = re.search(r"YUNDUN", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None
21+
retval |= re.search(r"YUNDUN", headers.get("X-Cache", ""), re.I) is not None
22+
if retval:
23+
break
24+
25+
return retval

0 commit comments

Comments
 (0)