pwn 0.4.637 → 0.4.638

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ed890d64be30032f92cd57c59abfe52a7b568816945c9196fcc46adb1ccdeb7e
4
- data.tar.gz: 9e5f0acbfeaea73f98b1dc14e4ec3e54dc8bb71c654ffcf4d0ca14a7ee2e344d
3
+ metadata.gz: e3997d085d7b525c646e2899c95468a734df8021f722717c1453c52cf3d6c208
4
+ data.tar.gz: 5490d6e641a80efa324b8b12184f8d368012c3a7fd7a137c0d5171efd77f6a45
5
5
  SHA512:
6
- metadata.gz: 26a50246edaa50f39dba47018111e7803891daea153f9ed2bf5b2dd916613eac40d30f66fbb6c6f5a5e3f0a2aa5b470715d2848b9a68219d59afc23533800fb7
7
- data.tar.gz: 63dd51a285d26aa58d4a5de34000c2d28bbdee18333841ea3d09a2b003052141c094fe4c94d89d03da2030c74a4f2802487b8d1255c735ea846d422f49bb1e48
6
+ metadata.gz: 72c2121bfc843d071e745e53452a77523e996d18b88e2e1fd93184048e3154151a5348fa86fbdbc669d33af01c028483d1cbf19278eb721b5aa34aab2abd2029
7
+ data.tar.gz: 894d262d198208c8c585594edb0fa36805b32bf465abcf4ac61fc4e4609021f6a6845ab776b91139c5b4a257a2bfb209c3b7c08cdf9470404719f0a885cf7862
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.637]:001 >>> PWN.help
40
+ pwn[v0.4.638]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.637]:001 >>> PWN.help
55
+ pwn[v0.4.638]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
@@ -40,11 +40,11 @@ module PWN
40
40
  burp_obj = {}
41
41
  burp_obj[:pid] = Process.spawn(burp_cmd_string)
42
42
  rest_browser = PWN::Plugins::TransparentBrowser.open(browser_type: :rest)
43
- random_mitm_port = PWN::Plugins::Sock.get_random_unused_port
44
- random_bb_port = random_mitm_port
45
- random_bb_port = PWN::Plugins::Sock.get_random_unused_port while random_bb_port == random_mitm_port
46
- burp_obj[:mitm_proxy] = "127.0.0.1:#{random_mitm_port}"
47
- burp_obj[:burpbuddy_api] = "127.0.0.1:#{random_bb_port}"
43
+ # random_mitm_port = PWN::Plugins::Sock.get_random_unused_port
44
+ # random_bb_port = random_mitm_port
45
+ # random_bb_port = PWN::Plugins::Sock.get_random_unused_port while random_bb_port == random_mitm_port
46
+ burp_obj[:mitm_proxy] = '127.0.0.1:8080'
47
+ burp_obj[:burpbuddy_api] = '127.0.0.1:8001'
48
48
  burp_obj[:rest_browser] = rest_browser
49
49
 
50
50
  # Proxy always listens on localhost...use SSH tunneling if remote access is required
@@ -57,7 +57,7 @@ module PWN
57
57
 
58
58
  # Wait for TCP 8001 to open prior to returning burp_obj
59
59
  loop do
60
- s = TCPSocket.new('127.0.0.1', random_bb_port)
60
+ s = TCPSocket.new('127.0.0.1', 8001)
61
61
  s.close
62
62
  break
63
63
  rescue Errno::ECONNREFUSED
@@ -116,12 +116,12 @@ module PWN
116
116
  if opts[:proxy]
117
117
  proxy = opts[:proxy].to_s.scrub.strip.chomp
118
118
  proxy_uri = URI.parse(proxy)
119
- owasp_zap_cmd = "#{owasp_zap_cmd} -host #{proxy_uri.host} -port #{proxy_uri.port}"
120
119
  else
121
120
  random_port = PWN::Plugins::Sock.get_random_unused_port
122
121
  proxy = "http://127.0.0.1:#{random_port}"
123
122
  proxy_uri = URI.parse(proxy)
124
123
  end
124
+ owasp_zap_cmd = "#{owasp_zap_cmd} -host #{proxy_uri.host} -port #{proxy_uri.port}"
125
125
  zap_obj[:host] = proxy_uri.host.to_s.scrub
126
126
  zap_obj[:port] = proxy_uri.port.to_i
127
127
 
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.4.637'
4
+ VERSION = '0.4.638'
5
5
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.637
4
+ version: 0.4.638
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.