Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 7a2ac23

Browse files
committed
Adding new waf script (sitelock)
1 parent e435fb2 commit 7a2ac23

4 files changed

Lines changed: 25 additions & 3 deletions

File tree

lib/controller/checks.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1300,7 +1300,7 @@ def _(*args, **kwargs):
13001300
if output and output[0] not in ("Y", "y"):
13011301
raise SqlmapUserQuitException
13021302
else:
1303-
warnMsg = "WAF/IDS/IPS product hasn't been identified (generic protection response)"
1303+
warnMsg = "WAF/IDS/IPS product hasn't been identified"
13041304
logger.warn(warnMsg)
13051305

13061306
kb.testType = None

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
from lib.core.revision import getRevisionNumber
2020

2121
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22-
VERSION = "1.0.5.73"
22+
VERSION = "1.0.5.74"
2323
REVISION = getRevisionNumber()
2424
STABLE = VERSION.count('.') <= 2
2525
VERSION_STRING = "sqlmap/%s#%s" % (VERSION, "stable" if STABLE else "dev")

waf/incapsula.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,10 @@ def detect(get_page):
1616
retval = False
1717

1818
for vector in WAF_ATTACK_VECTORS:
19-
_, headers, _ = get_page(get=vector)
19+
page, headers, _ = get_page(get=vector)
2020
retval = re.search(r"incap_ses|visid_incap", headers.get(HTTP_HEADER.SET_COOKIE, ""), re.I) is not None
2121
retval |= re.search(r"Incapsula", headers.get("X-CDN", ""), re.I) is not None
22+
retval |= "Incapsula incident ID" in (page or "")
2223
if retval:
2324
break
2425

waf/sitelock.py

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
#!/usr/bin/env python
2+
3+
"""
4+
Copyright (c) 2006-2016 sqlmap developers (http://sqlmap.org/)
5+
See the file 'doc/COPYING' for copying permission
6+
"""
7+
8+
from lib.core.settings import WAF_ATTACK_VECTORS
9+
10+
__product__ = "TrueShield Web Application Firewall (SiteLock)"
11+
12+
def detect(get_page):
13+
retval = False
14+
15+
for vector in WAF_ATTACK_VECTORS:
16+
page, _, _ = get_page(get=vector)
17+
retval = "SiteLock Incident ID" in (page or "")
18+
if retval:
19+
break
20+
21+
return retval

0 commit comments

Comments
 (0)