当前位置: 首页>>代码示例>>Python>>正文


Python Analyzer.handle_request方法代码示例

本文整理汇总了Python中Analyzer.Analyzer.handle_request方法的典型用法代码示例。如果您正苦于以下问题:Python Analyzer.handle_request方法的具体用法?Python Analyzer.handle_request怎么用?Python Analyzer.handle_request使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在Analyzer.Analyzer的用法示例。


在下文中一共展示了Analyzer.handle_request方法的5个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Python代码示例。

示例1: handle_request

# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
 def handle_request(self, flow):
     if flow.request.path.find("?vulnerable_javascript_injection") != -1:
         visited_url_index = flow.request.path.find("&url=")
         self.add_to_report(self.get_filter_id(),
                            "Dynamically verified that malicious Javascript can be injected via HTTP via url %s" % base64.b64decode(
                                flow.request.path[visited_url_index + 5:]))
     Analyzer.handle_request(self,flow)
开发者ID:bigfool,项目名称:Marvin-dynamic-Analyzer,代码行数:9,代码来源:PhonegapAnalyzerJSInjection.py

示例2: handle_request

# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
 def handle_request(self, flow):
     if flow.request.path.find("?vulnerable_file_scheme") != -1:
         activity_index = flow.request.path.find("&activity=")
         self.add_to_report(self.get_filter_id(),
                            "Dynamically verified that Javascript can be inyected running as file:// scheme via an Intent to " + base64.b64decode(
                                flow.request.path[
                                activity_index + len(
                                    "&activity="):]))
     Analyzer.handle_request(self,flow)
开发者ID:bigfool,项目名称:Marvin-dynamic-Analyzer,代码行数:11,代码来源:FileSchemeAnalyzer.py

示例3: handle_request

# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
 def handle_request(self, flow):
     if flow.request.path.find("?vulnerable_javascript_injection") != -1:
         visited_url_index = flow.request.path.find("&url=")
         interface_url_index = flow.request.path.find("&interface=")
         self.add_to_report(self.get_filter_id(),
                            "Dynamically verified that malicious Javascript can be injected via HTTP via url %s and can run arbitrary code via the Javascript Interface %s" % (
                                base64.b64decode(
                                    flow.request.path[visited_url_index + len("&url="):]),
                                flow.request.path[interface_url_index + len("&interface="):visited_url_index]))
     Analyzer.handle_request(self,flow)
开发者ID:bigfool,项目名称:Marvin-dynamic-Analyzer,代码行数:12,代码来源:JavascriptInterfaceAnalyzer.py

示例4: handle_request

# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
 def handle_request(self, flow):
     if flow.request.scheme.endswith("https"):
         self.add_to_report(self.get_filter_id(),
                            'SSL connection to host %s, app not validating certificates properly' % (
                            flow.request.headers["Host"][0] + flow.request.path))
     Analyzer.handle_request(self,flow)
开发者ID:bigfool,项目名称:Marvin-dynamic-Analyzer,代码行数:8,代码来源:SSLAnalyzer.py

示例5: handle_request

# 需要导入模块: from Analyzer import Analyzer [as 别名]
# 或者: from Analyzer.Analyzer import handle_request [as 别名]
 def handle_request(self, flow):
     if flow.request.path.find("?vulnerable_cve_3500") != -1:
         self.add_to_report(self.get_filter_id(), "Dynamically verified that application is vulnerable to CVE-3500")
     Analyzer.handle_request(self,flow)
开发者ID:bigfool,项目名称:Marvin-dynamic-Analyzer,代码行数:6,代码来源:PhonegapAnalyzerCVE3500.py


注:本文中的Analyzer.Analyzer.handle_request方法示例由纯净天空整理自Github/MSDocs等开源代码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。