pwn 0.4.637 → 0.4.638
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/lib/pwn/plugins/burp_suite.rb +6 -6
- data/lib/pwn/plugins/owasp_zap.rb +1 -1
- data/lib/pwn/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e3997d085d7b525c646e2899c95468a734df8021f722717c1453c52cf3d6c208
|
4
|
+
data.tar.gz: 5490d6e641a80efa324b8b12184f8d368012c3a7fd7a137c0d5171efd77f6a45
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 72c2121bfc843d071e745e53452a77523e996d18b88e2e1fd93184048e3154151a5348fa86fbdbc669d33af01c028483d1cbf19278eb721b5aa34aab2abd2029
|
7
|
+
data.tar.gz: 894d262d198208c8c585594edb0fa36805b32bf465abcf4ac61fc4e4609021f6a6845ab776b91139c5b4a257a2bfb209c3b7c08cdf9470404719f0a885cf7862
|
data/README.md
CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
37
37
|
$ rvm list gemsets
|
38
38
|
$ gem install --verbose pwn
|
39
39
|
$ pwn
|
40
|
-
pwn[v0.4.
|
40
|
+
pwn[v0.4.638]:001 >>> PWN.help
|
41
41
|
```
|
42
42
|
|
43
43
|
[![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
|
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
53
53
|
$ gem install --verbose pwn
|
54
54
|
$ pwn
|
55
|
-
pwn[v0.4.
|
55
|
+
pwn[v0.4.638]:001 >>> PWN.help
|
56
56
|
```
|
57
57
|
|
58
58
|
|
@@ -40,11 +40,11 @@ module PWN
|
|
40
40
|
burp_obj = {}
|
41
41
|
burp_obj[:pid] = Process.spawn(burp_cmd_string)
|
42
42
|
rest_browser = PWN::Plugins::TransparentBrowser.open(browser_type: :rest)
|
43
|
-
random_mitm_port = PWN::Plugins::Sock.get_random_unused_port
|
44
|
-
random_bb_port = random_mitm_port
|
45
|
-
random_bb_port = PWN::Plugins::Sock.get_random_unused_port while random_bb_port == random_mitm_port
|
46
|
-
burp_obj[:mitm_proxy] =
|
47
|
-
burp_obj[:burpbuddy_api] =
|
43
|
+
# random_mitm_port = PWN::Plugins::Sock.get_random_unused_port
|
44
|
+
# random_bb_port = random_mitm_port
|
45
|
+
# random_bb_port = PWN::Plugins::Sock.get_random_unused_port while random_bb_port == random_mitm_port
|
46
|
+
burp_obj[:mitm_proxy] = '127.0.0.1:8080'
|
47
|
+
burp_obj[:burpbuddy_api] = '127.0.0.1:8001'
|
48
48
|
burp_obj[:rest_browser] = rest_browser
|
49
49
|
|
50
50
|
# Proxy always listens on localhost...use SSH tunneling if remote access is required
|
@@ -57,7 +57,7 @@ module PWN
|
|
57
57
|
|
58
58
|
# Wait for TCP 8001 to open prior to returning burp_obj
|
59
59
|
loop do
|
60
|
-
s = TCPSocket.new('127.0.0.1',
|
60
|
+
s = TCPSocket.new('127.0.0.1', 8001)
|
61
61
|
s.close
|
62
62
|
break
|
63
63
|
rescue Errno::ECONNREFUSED
|
@@ -116,12 +116,12 @@ module PWN
|
|
116
116
|
if opts[:proxy]
|
117
117
|
proxy = opts[:proxy].to_s.scrub.strip.chomp
|
118
118
|
proxy_uri = URI.parse(proxy)
|
119
|
-
owasp_zap_cmd = "#{owasp_zap_cmd} -host #{proxy_uri.host} -port #{proxy_uri.port}"
|
120
119
|
else
|
121
120
|
random_port = PWN::Plugins::Sock.get_random_unused_port
|
122
121
|
proxy = "http://127.0.0.1:#{random_port}"
|
123
122
|
proxy_uri = URI.parse(proxy)
|
124
123
|
end
|
124
|
+
owasp_zap_cmd = "#{owasp_zap_cmd} -host #{proxy_uri.host} -port #{proxy_uri.port}"
|
125
125
|
zap_obj[:host] = proxy_uri.host.to_s.scrub
|
126
126
|
zap_obj[:port] = proxy_uri.port.to_i
|
127
127
|
|
data/lib/pwn/version.rb
CHANGED