You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I would like to suggest some features for the tools as follow
Has ability to reload target URL after injections (Ex: --url-reload ), cause in some forms after submitting, it will generate the new CSRF token which will cause false result
Has ability to keep testing all the payload when set -level 5. Normally, if the first 3 payloads pass, the tool will stop. I cannot know what payloads are using at level 5 (for learning purpose). The only way is try to make the request goes wrong, then the tool will throw all payload
Second order. This idea has already been suggested by someone, I'm really looking forward to this ^^
Regards!
The text was updated successfully, but these errors were encountered:
it will generate the new CSRF token which will cause false result
Bypassing CSRF can be rather hard and might need to be tailored to the specific website. Especially if the token is not in cookies.
Same goes for second order. I have plans to add custom requesting workflows in the future, but it is not as easy as adding a single flag.
Normally, if the first 3 payloads pass, the tool will stop.
What do you mean by that? The tool will generate payloads until the vulnerability is found or all the payloads are checked.
I have plans to add a way to keep scanning even after finding a vulnerability.
it will generate the new CSRF token which will cause false result
Bypassing CSRF can be rather hard and might need to be tailored to the specific website. Especially if the token is not in cookies. Same goes for second order. I have plans to add custom requesting workflows in the future, but it is not as easy as adding a single flag.
Normally, if the first 3 payloads pass, the tool will stop.
What do you mean by that? The tool will generate payloads until the vulnerability is found or all the payloads are checked. I have plans to add a way to keep scanning even after finding a vulnerability.
For the second idea you nail it. I just want the tool test all payloads :D
And for the blind SSTI, I think should add a basic technique as follow
The tool will ask user to defind the IP, Port from local or ngrok, then the tool setup simple webserver
From the injected place, execute command curl to that IP+Port
If the webserver receive any request. It means site got Blind SSTI
I know this is suitable for doing labs, ctf. But it is still a good improvement
Blind detection is now way more reliable, so there is no need for external network connections. Network-based out of bounds detection is not very reliable, as it relies a lot on the ability of the target to use a specific tool and connect to a specific host on a specific port.
Hi brother,
I would like to suggest some features for the tools as follow
--url-reload
), cause in some forms after submitting, it will generate the new CSRF token which will cause false result-level 5
. Normally, if the first 3 payloads pass, the tool will stop. I cannot know what payloads are using at level 5 (for learning purpose). The only way is try to make the request goes wrong, then the tool will throw all payloadRegards!
The text was updated successfully, but these errors were encountered: