ronin-exploits 1.0.0.beta2 → 1.0.0.beta3

Sign up to get free protection for your applications and to get access to all the features.
Files changed (63) hide show
  1. checksums.yaml +4 -4
  2. data/.github/workflows/ruby.yml +1 -0
  3. data/README.md +4 -0
  4. data/gemspec.yml +3 -1
  5. data/lib/ronin/exploits/cli/commands/run.rb +55 -5
  6. data/lib/ronin/exploits/version.rb +1 -1
  7. data/ronin-exploits.gemspec +2 -1
  8. metadata +10 -115
  9. data/spec/advisory_spec.rb +0 -71
  10. data/spec/cli/exploit_command_spec.rb +0 -68
  11. data/spec/cli/exploit_methods_spec.rb +0 -208
  12. data/spec/cli/ruby_shell_spec.rb +0 -14
  13. data/spec/client_side_web_vuln_spec.rb +0 -117
  14. data/spec/exploit_spec.rb +0 -538
  15. data/spec/exploits_spec.rb +0 -8
  16. data/spec/heap_overflow_spec.rb +0 -14
  17. data/spec/lfi_spec.rb +0 -162
  18. data/spec/loot/file_spec.rb +0 -131
  19. data/spec/loot_spec.rb +0 -138
  20. data/spec/memory_corruption_spec.rb +0 -22
  21. data/spec/metadata/arch_spec.rb +0 -82
  22. data/spec/metadata/cookie_param_spec.rb +0 -67
  23. data/spec/metadata/default_filename_spec.rb +0 -62
  24. data/spec/metadata/default_port_spec.rb +0 -62
  25. data/spec/metadata/header_name_spec.rb +0 -67
  26. data/spec/metadata/os_spec.rb +0 -164
  27. data/spec/metadata/shouts_spec.rb +0 -100
  28. data/spec/metadata/url_path_spec.rb +0 -67
  29. data/spec/metadata/url_query_param_spec.rb +0 -67
  30. data/spec/mixins/binary_spec.rb +0 -129
  31. data/spec/mixins/build_dir.rb +0 -66
  32. data/spec/mixins/file_builder_spec.rb +0 -67
  33. data/spec/mixins/format_string_spec.rb +0 -44
  34. data/spec/mixins/has_payload_spec.rb +0 -333
  35. data/spec/mixins/has_targets_spec.rb +0 -434
  36. data/spec/mixins/html_spec.rb +0 -772
  37. data/spec/mixins/http_spec.rb +0 -1227
  38. data/spec/mixins/loot_spec.rb +0 -20
  39. data/spec/mixins/nops_spec.rb +0 -165
  40. data/spec/mixins/remote_tcp_spec.rb +0 -217
  41. data/spec/mixins/remote_udp_spec.rb +0 -217
  42. data/spec/mixins/seh_spec.rb +0 -89
  43. data/spec/mixins/stack_overflow_spec.rb +0 -87
  44. data/spec/mixins/text_spec.rb +0 -43
  45. data/spec/open_redirect_spec.rb +0 -71
  46. data/spec/params/base_url_spec.rb +0 -71
  47. data/spec/params/bind_host_spec.rb +0 -34
  48. data/spec/params/bind_port_spec.rb +0 -35
  49. data/spec/params/filename_spec.rb +0 -77
  50. data/spec/params/host_spec.rb +0 -34
  51. data/spec/params/port_spec.rb +0 -77
  52. data/spec/rfi_spec.rb +0 -107
  53. data/spec/seh_overflow_spec.rb +0 -18
  54. data/spec/spec_helper.rb +0 -8
  55. data/spec/sqli_spec.rb +0 -306
  56. data/spec/ssti_spec.rb +0 -121
  57. data/spec/stack_overflow_spec.rb +0 -18
  58. data/spec/target_spec.rb +0 -92
  59. data/spec/test_result_spec.rb +0 -32
  60. data/spec/use_after_free_spec.rb +0 -14
  61. data/spec/web_spec.rb +0 -12
  62. data/spec/web_vuln_spec.rb +0 -854
  63. data/spec/xss_spec.rb +0 -69
data/spec/xss_spec.rb DELETED
@@ -1,69 +0,0 @@
1
- require 'spec_helper'
2
- require 'ronin/exploits/xss'
3
-
4
- describe Ronin::Exploits::XSS do
5
- module TestXSS
6
- class TestExploit < Ronin::Exploits::XSS
7
- base_path '/showthread.asp'
8
- query_param 'id'
9
- end
10
- end
11
-
12
- let(:exploit_class) { TestXSS::TestExploit }
13
- let(:base_url) { 'http://testasp.vulnweb.com' }
14
-
15
- subject do
16
- exploit_class.new(
17
- params: {
18
- base_url: base_url
19
- }
20
- )
21
- end
22
-
23
- it "must inherite from Ronin::Exploits::ClientSideWebVuln" do
24
- expect(described_class).to be < Ronin::Exploits::ClientSideWebVuln
25
- end
26
-
27
- it "must include Ronin::Exploits::Mixins::HTML" do
28
- expect(described_class).to include(Ronin::Exploits::Mixins::HTML)
29
- end
30
-
31
- describe ".exploit_type" do
32
- subject { described_class }
33
-
34
- it { expect(subject.exploit_type).to eq(:xss) }
35
- end
36
-
37
- describe "#initialize" do
38
- it "must default #payload to a Ronin::Payloads::Test::XSS payload" do
39
- expect(subject.payload).to be_kind_of(Ronin::Payloads::Test::XSS)
40
- end
41
-
42
- context "when given the payload: keyword argument" do
43
- let(:payload) { Ronin::Payloads::JavaScriptPayload.new }
44
-
45
- subject do
46
- exploit_class.new(
47
- payload: payload,
48
- params: {
49
- base_url: base_url
50
- }
51
- )
52
- end
53
-
54
- it "must set #payload" do
55
- expect(subject.payload).to be(payload)
56
- end
57
- end
58
- end
59
-
60
- describe "#vuln" do
61
- it "must return a Ronin::Vulns::ReflectedXSS object" do
62
- expect(subject.vuln).to be_kind_of(Ronin::Vulns::ReflectedXSS)
63
- end
64
-
65
- it "must set the #url attribute of the ReflectedXSS vuln object" do
66
- expect(subject.vuln.url).to eq(subject.url)
67
- end
68
- end
69
- end