本文整理汇总了Python中Analyzer.Analyzer.handle_request方法的典型用法代码示例。如果您正苦于以下问题:Python Analyzer.handle_request方法的具体用法?Python Analyzer.handle_request怎么用?Python Analyzer.handle_request使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在类Analyzer.Analyzer
的用法示例。
在下文中一共展示了Analyzer.handle_request方法的5个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Python代码示例。
示例1: handle_request
# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
def handle_request(self, flow):
if flow.request.path.find("?vulnerable_javascript_injection") != -1:
visited_url_index = flow.request.path.find("&url=")
self.add_to_report(self.get_filter_id(),
"Dynamically verified that malicious Javascript can be injected via HTTP via url %s" % base64.b64decode(
flow.request.path[visited_url_index + 5:]))
Analyzer.handle_request(self,flow)
示例2: handle_request
# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
def handle_request(self, flow):
if flow.request.path.find("?vulnerable_file_scheme") != -1:
activity_index = flow.request.path.find("&activity=")
self.add_to_report(self.get_filter_id(),
"Dynamically verified that Javascript can be inyected running as file:// scheme via an Intent to " + base64.b64decode(
flow.request.path[
activity_index + len(
"&activity="):]))
Analyzer.handle_request(self,flow)
示例3: handle_request
# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
def handle_request(self, flow):
if flow.request.path.find("?vulnerable_javascript_injection") != -1:
visited_url_index = flow.request.path.find("&url=")
interface_url_index = flow.request.path.find("&interface=")
self.add_to_report(self.get_filter_id(),
"Dynamically verified that malicious Javascript can be injected via HTTP via url %s and can run arbitrary code via the Javascript Interface %s" % (
base64.b64decode(
flow.request.path[visited_url_index + len("&url="):]),
flow.request.path[interface_url_index + len("&interface="):visited_url_index]))
Analyzer.handle_request(self,flow)
示例4: handle_request
# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
def handle_request(self, flow):
if flow.request.scheme.endswith("https"):
self.add_to_report(self.get_filter_id(),
'SSL connection to host %s, app not validating certificates properly' % (
flow.request.headers["Host"][0] + flow.request.path))
Analyzer.handle_request(self,flow)
示例5: handle_request
# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
def handle_request(self, flow):
if flow.request.path.find("?vulnerable_cve_3500") != -1:
self.add_to_report(self.get_filter_id(), "Dynamically verified that application is vulnerable to CVE-3500")
Analyzer.handle_request(self,flow)