本文整理汇总了Python中src.core.injections.controller.checks.continue_tests函数的典型用法代码示例。如果您正苦于以下问题:Python continue_tests函数的具体用法?Python continue_tests怎么用?Python continue_tests使用的例子?那么恭喜您, 这里精选的函数代码示例或许可以为您提供帮助。
在下文中一共展示了continue_tests函数的20个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于我们的系统推荐出更棒的Python代码示例。
示例1: get_request_response
def get_request_response(request):
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
response = proxy.use_proxy(request)
except urllib2.HTTPError, err_msg:
if settings.IGNORE_ERR_MSG == False:
err_msg = str(err_msg) + "."
if not settings.VERBOSITY_LEVEL >= 1 and settings.TIME_BASED_STATE == False or \
settings.VERBOSITY_LEVEL >= 1 and settings.EVAL_BASED_STATE == None:
print ""
print settings.print_critical_msg(err_msg)
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err_msg:
err_msg = str(err_msg.reason).split(" ")[2:]
err_msg = ' '.join(err_msg)+ "."
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err_msg)
raise SystemExit()
开发者ID:fleischkatapult,项目名称:commix,代码行数:26,代码来源:requests.py
示例2: get_request_response
def get_request_response(request):
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
response = proxy.use_proxy(request)
except urllib2.HTTPError, err_msg:
if str(err_msg.code) == settings.INTERNAL_SERVER_ERROR:
response = False
elif settings.IGNORE_ERR_MSG == False:
err = str(err_msg) + "."
if not settings.VERBOSITY_LEVEL >= 1 and settings.TIME_BASED_STATE == False or \
settings.VERBOSITY_LEVEL >= 1 and settings.EVAL_BASED_STATE == None:
print ""
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err)
continue_tests = checks.continue_tests(err_msg)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err_msg:
if "Connection refused" in err_msg.reason:
err_msg = "The target host is not responding. "
err_msg += "Please ensure that is up and try again."
if not settings.VERBOSITY_LEVEL >= 1 and settings.TIME_BASED_STATE == False or \
settings.VERBOSITY_LEVEL >= 1 and settings.EVAL_BASED_STATE == None:
print ""
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err_msg)
raise SystemExit()
开发者ID:BMaChina,项目名称:commix,代码行数:34,代码来源:requests.py
示例3: referer_injection_test
def referer_injection_test(url, vuln_parameter, payload):
def inject_referer(url, vuln_parameter, payload, proxy):
if proxy == None:
opener = urllib2.build_opener()
else:
opener = urllib2.build_opener(proxy)
request = urllib2.Request(url)
# Check if defined extra headers.
headers.do_check(request)
request.add_header("Referer", urllib.unquote(payload))
response = opener.open(request)
return response
proxy = None
response = inject_referer(url, vuln_parameter, payload, proxy)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
proxy = urllib2.ProxyHandler({settings.PROXY_PROTOCOL: menu.options.proxy})
response = inject_referer(url, vuln_parameter, payload, proxy)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
print "\n" + Back.RED + settings.ERROR_SIGN + str(err) + Style.RESET_ALL
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err:
if "Connection refused" in err.reason:
print "\n" + Back.RED + settings.CRITICAL_SIGN + "The target host is not responding." + " Please ensure that is up and try again." + Style.RESET_ALL
raise SystemExit()
开发者ID:hosttor,项目名称:commix,代码行数:35,代码来源:eb_injector.py
示例4: icmp_exfiltration_handler
def icmp_exfiltration_handler(url, http_request_method):
# You need to have root privileges to run this script
if os.geteuid() != 0:
print "\n" + Back.RED + settings.ERROR_SIGN + "You need to have root privileges to run this option." + Style.RESET_ALL
os._exit(0)
if http_request_method == "GET":
#url = parameters.do_GET_check(url)
vuln_parameter = parameters.vuln_GET_param(url)
request = urllib2.Request(url)
headers.do_check(request)
else:
parameter = menu.options.data
parameter = urllib2.unquote(parameter)
parameter = parameters.do_POST_check(parameter)
request = urllib2.Request(url, parameter)
headers.do_check(request)
vuln_parameter = parameters.vuln_POST_param(parameter, url)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
response = proxy.use_proxy(request)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
print "\n" + Back.RED + settings.ERROR_SIGN + str(err) + Style.RESET_ALL
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
os._exit(0)
开发者ID:hanshaze,项目名称:commix,代码行数:32,代码来源:icmp_exfiltration.py
示例5: custom_header_injection
def custom_header_injection(url, vuln_parameter, payload):
def inject_custom_header(url, vuln_parameter, payload, proxy):
if proxy == None:
opener = urllib2.build_opener()
else:
opener = urllib2.build_opener(proxy)
request = urllib2.Request(url)
#Check if defined extra headers.
headers.do_check(request)
request.add_header(settings.CUSTOM_HEADER_NAME, urllib.unquote(payload))
try:
response = opener.open(request)
return response
except ValueError:
pass
if settings.TIME_RELATIVE_ATTACK :
start = 0
end = 0
start = time.time()
proxy = None
response = inject_custom_header(url, vuln_parameter, payload, proxy)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
proxy = urllib2.ProxyHandler({settings.PROXY_PROTOCOL : menu.options.proxy})
response = inject_custom_header(url, vuln_parameter, payload, proxy)
except urllib2.HTTPError, err_msg:
if str(err_msg.code) == settings.INTERNAL_SERVER_ERROR:
response = False
elif settings.IGNORE_ERR_MSG == False:
err = str(err_msg) + "."
if not settings.VERBOSITY_LEVEL >= 1 and settings.TIME_BASED_STATE == False or \
settings.VERBOSITY_LEVEL >= 1 and settings.EVAL_BASED_STATE == None:
print ""
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err)
continue_tests = checks.continue_tests(err_msg)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err_msg:
err_msg = str(err_msg.reason).split(" ")[2:]
err_msg = ' '.join(err_msg)+ "."
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err_msg)
raise SystemExit()
开发者ID:BMaChina,项目名称:commix,代码行数:56,代码来源:requests.py
示例6: cookie_injection
def cookie_injection(url, vuln_parameter, payload):
def inject_cookie(url, vuln_parameter, payload, proxy):
if proxy == None:
opener = urllib2.build_opener()
else:
opener = urllib2.build_opener(proxy)
if settings.TIME_RELATIVE_ATTACK :
payload = urllib.quote(payload)
opener.addheaders.append(('Cookie', vuln_parameter + "=" + payload))
request = urllib2.Request(url)
# Check if defined extra headers.
headers.do_check(request)
try:
response = opener.open(request)
return response
except ValueError:
pass
if settings.TIME_RELATIVE_ATTACK :
start = 0
end = 0
start = time.time()
proxy = None
response = inject_cookie(url, vuln_parameter, payload, proxy)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
proxy = urllib2.ProxyHandler({settings.PROXY_PROTOCOL : menu.options.proxy})
response = inject_cookie(url, vuln_parameter, payload, proxy)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
err_msg = str(err) + "."
print "\n" + settings.print_critical_msg(err_msg)
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err_msg:
err_msg = str(err_msg.reason).split(" ")[2:]
err_msg = ' '.join(err_msg)+ "."
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err_msg)
raise SystemExit()
开发者ID:Cyber-Forensic,项目名称:commix,代码行数:51,代码来源:requests.py
示例7: custom_header_injection_test
def custom_header_injection_test(url, vuln_parameter, payload):
def inject_custom_header(url, vuln_parameter, payload, proxy):
if proxy == None:
opener = urllib2.build_opener()
else:
opener = urllib2.build_opener(proxy)
request = urllib2.Request(url)
#Check if defined extra headers.
headers.do_check(request)
request.add_header(settings.CUSTOM_HEADER_NAME, urllib.unquote(payload))
try:
response = opener.open(request)
return response
except ValueError:
pass
start = 0
end = 0
start = time.time()
proxy = None
response = inject_custom_header(url, vuln_parameter, payload, proxy)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
proxy = urllib2.ProxyHandler({settings.PROXY_PROTOCOL: menu.options.proxy})
response = inject_custom_header(url, vuln_parameter, payload, proxy)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
print settings.print_error_msg(err)
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err:
if "Connection refused" in err.reason:
err_msg = "The target host is not responding."
err_msg += " Please ensure that is up and try again."
print "\n" + settings.print_critical_msg(err_msg)
raise SystemExit()
开发者ID:ardiansn,项目名称:commix,代码行数:45,代码来源:tb_injector.py
示例8: cookie_injection_test
def cookie_injection_test(url, vuln_parameter, payload):
def inject_cookie(url, vuln_parameter, payload, proxy):
if proxy == None:
opener = urllib2.build_opener()
else:
opener = urllib2.build_opener(proxy)
# Encoding non-ASCII characters payload.
payload = urllib.quote(payload)
opener.addheaders.append(('Cookie', vuln_parameter + "=" + payload))
request = urllib2.Request(url)
# Check if defined extra headers.
headers.do_check(request)
try:
response = opener.open(request)
return response
except ValueError:
pass
start = 0
end = 0
start = time.time()
proxy = None
response = inject_cookie(url, vuln_parameter, payload, proxy)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
proxy = urllib2.ProxyHandler({settings.PROXY_PROTOCOL: menu.options.proxy})
response = inject_cookie(url, vuln_parameter, payload, proxy)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
print Back.RED + settings.ERROR_SIGN + str(err) + Style.RESET_ALL
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err:
if "Connection refused" in err.reason:
print "\n" + Back.RED + settings.CRITICAL_SIGN + "The target host is not responding." + \
" Please ensure that is up and try again." + Style.RESET_ALL
raise SystemExit()
开发者ID:0day29,项目名称:commix,代码行数:44,代码来源:tb_injector.py
示例9: get_request_response
def get_request_response(request):
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
response = proxy.use_proxy(request)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
print "\n" + Back.RED + settings.ERROR_SIGN + str(err) + Style.RESET_ALL
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err:
if "Connection refused" in err.reason:
print "\n" + Back.RED + settings.CRITICAL_SIGN + "The target host is not responding." + " Please ensure that is up and try again." + Style.RESET_ALL
raise SystemExit()
开发者ID:hosttor,项目名称:commix,代码行数:19,代码来源:eb_injector.py
示例10: user_agent_injection_test
def user_agent_injection_test(url, vuln_parameter, payload):
def inject_user_agent(url, vuln_parameter, payload, proxy):
if proxy == None:
opener = urllib2.build_opener()
else:
opener = urllib2.build_opener(proxy)
request = urllib2.Request(url)
#Check if defined extra headers.
headers.do_check(request)
payload = urllib.unquote(payload)
request.add_header('User-Agent', payload)
response = opener.open(request)
return response
start = 0
end = 0
start = time.time()
proxy = None
response = inject_user_agent(url, vuln_parameter, payload, proxy)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
proxy = urllib2.ProxyHandler({settings.PROXY_PROTOCOL: menu.options.proxy})
response = inject_user_agent(url, vuln_parameter, payload, proxy)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
print "\n" + Back.RED + "(x) Error: " + str(err) + Style.RESET_ALL
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err:
if "Connection refused" in err.reason:
print "\n" + Back.RED + "(x) Critical: The target host is not responding." + \
" Please ensure that is up and try again." + Style.RESET_ALL
raise SystemExit()
开发者ID:1872892142,项目名称:commix,代码行数:42,代码来源:tb_injector.py
示例11: cookie_injection_test
def cookie_injection_test(url, vuln_parameter, payload):
def inject_cookie(url, vuln_parameter, payload, proxy):
if proxy == None:
opener = urllib2.build_opener()
else:
opener = urllib2.build_opener(proxy)
opener.addheaders.append(('Cookie', vuln_parameter + "=" + payload))
request = urllib2.Request(url)
# Check if defined extra headers.
headers.do_check(request)
try:
response = opener.open(request)
return response
except ValueError:
pass
proxy = None
response = inject_cookie(url, vuln_parameter, payload, proxy)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
proxy = urllib2.ProxyHandler({settings.PROXY_PROTOCOL: menu.options.proxy})
response = inject_cookie(url, vuln_parameter, payload, proxy)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
err_msg = str(err) + "."
print "\n" + settings.print_error_msg(err_msg)
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err:
if "Connection refused" in err.reason:
err_msg = "The target host is not responding."
err_msg += " Please ensure that is up and try again."
print "\n" + settings.print_critical_msg(err_msg)
raise SystemExit()
开发者ID:ardiansn,项目名称:commix,代码行数:41,代码来源:cb_injector.py
示例12: get_request_response
def get_request_response(request):
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
response = proxy.use_proxy(request)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
print settings.print_error_msg(err)
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err:
if "Connection refused" in err.reason:
err_msg = "The target host is not responding."
err_msg += " Please ensure that is up and try again."
print "\n" + settings.print_critical_msg(err_msg)
raise SystemExit()
开发者ID:jamesshew,项目名称:commix,代码行数:21,代码来源:fb_injector.py
示例13: dns_exfiltration_handler
def dns_exfiltration_handler(url, http_request_method):
# Check injection state
settings.DETECTION_PHASE = True
settings.EXPLOITATION_PHASE = False
# You need to have root privileges to run this script
if os.geteuid() != 0:
err_msg = "You need to have root privileges to run this option."
print "\n" + settings.print_critical_msg(err_msg)
os._exit(0)
if http_request_method == "GET":
#url = parameters.do_GET_check(url)
vuln_parameter = parameters.vuln_GET_param(url)
request = urllib2.Request(url)
headers.do_check(request)
else:
parameter = menu.options.data
parameter = urllib2.unquote(parameter)
parameter = parameters.do_POST_check(parameter)
request = urllib2.Request(url, parameter)
headers.do_check(request)
vuln_parameter = parameters.vuln_POST_param(parameter, url)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
response = proxy.use_proxy(request)
except urllib2.HTTPError, err_msg:
if str(err_msg.code) == settings.INTERNAL_SERVER_ERROR:
response = False
elif settings.IGNORE_ERR_MSG == False:
err = str(err_msg) + "."
print "\n" + settings.print_critical_msg(err)
continue_tests = checks.continue_tests(err_msg)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
os._exit(0)
开发者ID:security-geeks,项目名称:commix,代码行数:39,代码来源:dns_exfiltration.py
示例14: authentication_process
def authentication_process():
auth_url = menu.options.auth_url
auth_data = menu.options.auth_data
cj = cookielib.CookieJar()
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
request = opener.open(urllib2.Request(auth_url))
cookies = ""
for cookie in cj:
cookie_values = cookie.name + "=" + cookie.value + "; "
cookies += cookie_values
if len(cookies) != 0 :
menu.options.cookie = cookies.rstrip()
if menu.options.verbose:
success_msg = "The received cookie is " + Style.UNDERLINE
success_msg += menu.options.cookie + Style.RESET_ALL + "."
print settings.print_success_msg(success_msg)
urllib2.install_opener(opener)
request = urllib2.Request(auth_url, auth_data)
# Check if defined extra headers.
headers.do_check(request)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
response = proxy.use_proxy(request)
except urllib2.HTTPError, err_msg:
if settings.IGNORE_ERR_MSG == False:
print "\n" + settings.print_error_msg(err_msg)
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
开发者ID:ardiansn,项目名称:commix,代码行数:38,代码来源:authentication.py
示例15: shellshock_handler
#.........这里部分代码省略.........
gotshell= "y"
if gotshell in settings.CHOICE_YES:
if not menu.options.batch:
print ""
print "Pseudo-Terminal (type '" + Style.BRIGHT + "?" + Style.RESET_ALL + "' for available options)"
if readline_error:
checks.no_readline_module()
while True:
try:
if not readline_error:
# Tab compliter
readline.set_completer(menu.tab_completer)
# MacOSX tab compliter
if getattr(readline, '__doc__', '') is not None and 'libedit' in getattr(readline, '__doc__', ''):
readline.parse_and_bind("bind ^I rl_complete")
# Unix tab compliter
else:
readline.parse_and_bind("tab: complete")
cmd = raw_input("""commix(""" + Style.BRIGHT + Fore.RED + """os_shell""" + Style.RESET_ALL + """) > """)
cmd = checks.escaped_cmd(cmd)
if cmd.lower() in settings.SHELL_OPTIONS:
os_shell_option = checks.check_os_shell_options(cmd.lower(), technique, go_back, no_result)
go_back, go_back_again = check_options(url, cmd, cve, check_header, filename, os_shell_option, http_request_method, go_back, go_back_again)
if go_back:
break
else:
shell, payload = cmd_exec(url, cmd, cve, check_header, filename)
if shell != "":
# Update logs with executed cmds and execution results.
logs.executed_command(filename, cmd, shell)
print "\n" + Fore.GREEN + Style.BRIGHT + shell + Style.RESET_ALL + "\n"
else:
info_msg = "Executing the '" + cmd + "' command... "
if settings.VERBOSITY_LEVEL == 1:
sys.stdout.write(settings.print_info_msg(info_msg))
sys.stdout.flush()
sys.stdout.write("\n" + settings.print_payload(payload)+ "\n")
elif settings.VERBOSITY_LEVEL > 1:
sys.stdout.write(settings.print_info_msg(info_msg))
sys.stdout.flush()
sys.stdout.write("\n" + settings.print_payload(payload)+ "\n")
err_msg = "The '" + cmd + "' command, does not return any output."
print settings.print_critical_msg(err_msg) + "\n"
except KeyboardInterrupt:
raise
except SystemExit:
raise
except EOFError:
err_msg = "Exiting, due to EOFError."
print settings.print_error_msg(err_msg)
raise
except:
info_msg = "Testing the " + technique + "... "
if settings.VERBOSITY_LEVEL > 1:
info_msg = info_msg + "\n"
sys.stdout.write(settings.print_info_msg(info_msg))
sys.stdout.flush()
break
elif gotshell in settings.CHOICE_NO:
if checks.next_attack_vector(technique, go_back) == True:
break
else:
if no_result == True:
return False
else:
return True
elif gotshell in settings.CHOICE_QUIT:
raise SystemExit()
else:
err_msg = "'" + gotshell + "' is not a valid answer."
print settings.print_error_msg(err_msg)
continue
break
else:
continue
if no_result and settings.VERBOSITY_LEVEL < 2:
print ""
except urllib2.HTTPError, err_msg:
if str(err_msg.code) == settings.INTERNAL_SERVER_ERROR:
response = False
elif settings.IGNORE_ERR_MSG == False:
err = str(err_msg) + "."
print "\n" + settings.print_critical_msg(err)
continue_tests = checks.continue_tests(err_msg)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
开发者ID:security-geeks,项目名称:commix,代码行数:101,代码来源:shellshock.py
示例16: host_injection
def host_injection(url, vuln_parameter, payload):
payload = urlparse.urlparse(url).hostname + payload
def inject_host(url, vuln_parameter, payload, proxy):
if proxy == None:
opener = urllib2.build_opener()
else:
opener = urllib2.build_opener(proxy)
# Check if defined POST data
if menu.options.data:
menu.options.data = settings.USER_DEFINED_POST_DATA
request = urllib2.Request(url, menu.options.data)
else:
url = parameters.get_url_part(url)
request = urllib2.Request(url)
#Check if defined extra headers.
headers.do_check(request)
payload = checks.newline_fixation(payload)
request.add_header('Host', payload)
try:
headers.check_http_traffic(request)
response = opener.open(request)
return response
except ValueError:
pass
if settings.TIME_RELATIVE_ATTACK :
start = 0
end = 0
start = time.time()
proxy = None
#response = inject_host(url, vuln_parameter, payload, proxy)
# Check if defined any HTTP Proxy.
if menu.options.proxy:
try:
proxy = urllib2.ProxyHandler({settings.SCHEME : menu.options.proxy})
response = inject_host(url, vuln_parameter, payload, proxy)
except urllib2.HTTPError, err_msg:
if str(err_msg.code) == settings.INTERNAL_SERVER_ERROR:
response = False
elif settings.IGNORE_ERR_MSG == False:
err = str(err_msg) + "."
if not settings.VERBOSITY_LEVEL >= 1 and settings.TIME_BASED_STATE == False or \
settings.VERBOSITY_LEVEL >= 1 and settings.EVAL_BASED_STATE == None:
print ""
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err)
continue_tests = checks.continue_tests(err_msg)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err_msg:
err_msg = str(err_msg.reason).split(" ")[2:]
err_msg = ' '.join(err_msg)+ "."
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err_msg)
raise SystemExit()
开发者ID:security-geeks,项目名称:commix,代码行数:65,代码来源:requests.py
示例17: str
# Check if defined Tor.
elif menu.options.tor:
try:
response = tor.use_tor(request)
except urllib2.HTTPError, err_msg:
if str(err_msg.code) == settings.INTERNAL_SERVER_ERROR:
response = False
elif settings.IGNORE_ERR_MSG == False:
err = str(err_msg) + "."
if not settings.VERBOSITY_LEVEL >= 1 and settings.TIME_BASED_STATE == False or \
settings.VERBOSITY_LEVEL >= 1 and settings.EVAL_BASED_STATE == None:
print ""
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err)
continue_tests = checks.continue_tests(err_msg)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err_msg:
err_msg = str(err_msg.reason).split(" ")[2:]
err_msg = ' '.join(err_msg)+ "."
if settings.VERBOSITY_LEVEL >= 1 and settings.LOAD_SESSION == False:
print ""
print settings.print_critical_msg(err_msg)
raise SystemExit()
else:
try:
开发者ID:BMaChina,项目名称:commix,代码行数:31,代码来源:requests.py
示例18: SystemExit
response = False
except urllib2.URLError, err:
if "Connection refused" in err.reason:
err_msg = "The target host is not responding."
err_msg += " Please ensure that is up and try again."
print "\n" + settings.print_critical_msg(err_msg)
raise SystemExit()
# Check if defined Tor.
elif menu.options.tor:
try:
response = tor.use_tor(request)
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
print settings.print_error_msg(err)
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
response = False
except urllib2.URLError, err:
if "Connection refused" in err.reason:
err_msg = "The target host is not responding."
err_msg += " Please ensure that is up and try again."
print "\n" + settings.print_critical_msg(err_msg)
raise SystemExit()
else:
try:
response = urllib2.urlopen(request)
开发者ID:jamesshew,项目名称:commix,代码行数:31,代码来源:fb_injector.py
示例19: shellshock_handler
#.........这里部分代码省略.........
if not readline_error:
readline.set_completer(menu.tab_completer)
# MacOSX tab compliter
if getattr(readline, '__doc__', '') is not None and 'libedit' in getattr(readline, '__doc__', ''):
readline.parse_and_bind("bind ^I rl_complete")
# Unix tab compliter
else:
readline.parse_and_bind("tab: complete")
cmd = raw_input("""commix(""" + Style.BRIGHT + Fore.RED + """os_shell""" + Style.RESET_ALL + """) > """)
cmd = checks.escaped_cmd(cmd)
if cmd.lower() in settings.SHELL_OPTIONS:
os_shell_option = checks.check_os_shell_options(cmd.lower(), technique, go_back, no_result)
if os_shell_option == False:
if no_result == True:
return False
else:
return True
elif os_shell_option == "quit":
sys.exit(0)
elif os_shell_option == "back":
go_back = True
break
elif os_shell_option == "os_shell":
warn_msg = "You are already into an 'os_shell' mode."
print settings.print_warning_msg(warn_msg)+ "\n"
elif os_shell_option == "reverse_tcp":
# Set up LHOST / LPORT for The reverse TCP connection.
reverse_tcp.configure_reverse_tcp()
while True:
if settings.LHOST and settings.LPORT in settings.SHELL_OPTIONS:
result = checks.check_reverse_tcp_options(settings.LHOST)
else:
cmd = reverse_tcp.reverse_tcp_options()
result = checks.check_reverse_tcp_options(cmd)
if result != None:
if result == 0:
return False
elif result == 1 or result == 2:
go_back_again = True
settings.REVERSE_TCP = False
break
# Command execution results.
shell, payload = cmd_exec(url, cmd, cve, check_header, filename)
if menu.options.verbose:
print ""
err_msg = "The reverse TCP connection to the target host has been failed!"
print settings.print_error_msg(err_msg)
else:
pass
else:
shell, payload = cmd_exec(url, cmd, cve, check_header, filename)
if shell != "":
print "\n" + Fore.GREEN + Style.BRIGHT + shell + Style.RESET_ALL + "\n"
else:
if menu.options.verbose:
print "\n" + settings.print_payload(payload)
err_msg = "The '" + cmd + "' command, does not return any output."
print settings.print_error_msg(err_msg) + "\n"
except KeyboardInterrupt:
raise
except SystemExit:
raise
except:
print ""
sys.exit(0)
elif gotshell in settings.CHOICE_NO:
if checks.next_attack_vector(technique, go_back) == True:
break
else:
if no_result == True:
return False
else:
return True
elif gotshell in settings.CHOICE_QUIT:
sys.exit(0)
else:
if gotshell == "":
gotshell = "enter"
err_msg = "'" + gotshell + "' is not a valid answer."
print settings.print_error_msg(err_msg) + "\n"
continue
break
else:
continue
except urllib2.HTTPError, err:
if settings.IGNORE_ERR_MSG == False:
print "\n" + settings.print_error_msg(err_msg)
continue_tests = checks.continue_tests(err)
if continue_tests == True:
settings.IGNORE_ERR_MSG = True
else:
raise SystemExit()
开发者ID:ardiansn,项目名称:commix,代码行数:101,代码来源:shellshock.py
示例20: shellshock_handler
#.........这里部分代码省略.........
if menu.options.os_cmd:
cmd = menu.options.os_cmd
shell = cmd_exec(url, cmd, cve, check_header, filename)
print "\n" + Fore.GREEN + Style.BRIGHT + shell + Style.RESET_ALL
sys.exit(0)
else:
# Pseudo-Terminal shell
go_back = False
go_back_again = False
while True:
if go_back == True:
break
if settings.ENUMERATION_DONE == False and settings.FILE_ACCESS_DONE == False:
print ""
gotshell = raw_input("(?) Do you want a Pseudo-Terminal? [Y/n/q] > ").lower()
if gotshell in settings.CHOISE_YES:
print ""
print "Pseudo-Terminal (type '" + Style.BRIGHT + "?" + Style.RESET_ALL + "' for available options)"
while True:
try:
cmd = raw_input("""commix(""" + Style.BRIGHT + Fore.RED + """os_shell""" + Style.RESET_ALL + """) > """)
cmd = checks.escaped_cmd(cmd)
if cmd.lower() in settings.SHELL_OPTIONS:
os_shell_option = checks.check_os_shell_options(cmd.lower(), technique, go_back, no_result)
if os_shell_option == False:
return False
elif os_shell_option == "quit":
sys.exit(0)
elif os_shell_option == "back":
go_back = True
break
elif os_shell_option == "os_shell":
print Fore.YELLOW + "(^) Warning: You are already into an 'os_shell' mode." + Style.RESET_ALL + "\n"
elif os_shell_option == "reverse_tcp":
# Set up LHOST / LPORT for The reverse TCP connection.
lhost, lport = reverse_tcp.configure_reverse_tcp()
|
请发表评论