ronin-exploits 1.0.0.beta2 → 1.0.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.github/workflows/ruby.yml +1 -0
- data/README.md +29 -13
- data/gemspec.yml +10 -8
- data/lib/ronin/exploits/cli/commands/new.rb +1 -1
- data/lib/ronin/exploits/cli/commands/run.rb +55 -5
- data/lib/ronin/exploits/exploit.rb +7 -5
- data/lib/ronin/exploits/lfi.rb +1 -1
- data/lib/ronin/exploits/metadata/arch.rb +1 -1
- data/lib/ronin/exploits/metadata/default_filename.rb +1 -1
- data/lib/ronin/exploits/metadata/default_port.rb +1 -1
- data/lib/ronin/exploits/mixins/file_builder.rb +2 -2
- data/lib/ronin/exploits/mixins/nops.rb +1 -1
- data/lib/ronin/exploits/params/base_url.rb +1 -1
- data/lib/ronin/exploits/version.rb +1 -1
- data/ronin-exploits.gemspec +2 -1
- metadata +24 -129
- data/spec/advisory_spec.rb +0 -71
- data/spec/cli/exploit_command_spec.rb +0 -68
- data/spec/cli/exploit_methods_spec.rb +0 -208
- data/spec/cli/ruby_shell_spec.rb +0 -14
- data/spec/client_side_web_vuln_spec.rb +0 -117
- data/spec/exploit_spec.rb +0 -538
- data/spec/exploits_spec.rb +0 -8
- data/spec/heap_overflow_spec.rb +0 -14
- data/spec/lfi_spec.rb +0 -162
- data/spec/loot/file_spec.rb +0 -131
- data/spec/loot_spec.rb +0 -138
- data/spec/memory_corruption_spec.rb +0 -22
- data/spec/metadata/arch_spec.rb +0 -82
- data/spec/metadata/cookie_param_spec.rb +0 -67
- data/spec/metadata/default_filename_spec.rb +0 -62
- data/spec/metadata/default_port_spec.rb +0 -62
- data/spec/metadata/header_name_spec.rb +0 -67
- data/spec/metadata/os_spec.rb +0 -164
- data/spec/metadata/shouts_spec.rb +0 -100
- data/spec/metadata/url_path_spec.rb +0 -67
- data/spec/metadata/url_query_param_spec.rb +0 -67
- data/spec/mixins/binary_spec.rb +0 -129
- data/spec/mixins/build_dir.rb +0 -66
- data/spec/mixins/file_builder_spec.rb +0 -67
- data/spec/mixins/format_string_spec.rb +0 -44
- data/spec/mixins/has_payload_spec.rb +0 -333
- data/spec/mixins/has_targets_spec.rb +0 -434
- data/spec/mixins/html_spec.rb +0 -772
- data/spec/mixins/http_spec.rb +0 -1227
- data/spec/mixins/loot_spec.rb +0 -20
- data/spec/mixins/nops_spec.rb +0 -165
- data/spec/mixins/remote_tcp_spec.rb +0 -217
- data/spec/mixins/remote_udp_spec.rb +0 -217
- data/spec/mixins/seh_spec.rb +0 -89
- data/spec/mixins/stack_overflow_spec.rb +0 -87
- data/spec/mixins/text_spec.rb +0 -43
- data/spec/open_redirect_spec.rb +0 -71
- data/spec/params/base_url_spec.rb +0 -71
- data/spec/params/bind_host_spec.rb +0 -34
- data/spec/params/bind_port_spec.rb +0 -35
- data/spec/params/filename_spec.rb +0 -77
- data/spec/params/host_spec.rb +0 -34
- data/spec/params/port_spec.rb +0 -77
- data/spec/rfi_spec.rb +0 -107
- data/spec/seh_overflow_spec.rb +0 -18
- data/spec/spec_helper.rb +0 -8
- data/spec/sqli_spec.rb +0 -306
- data/spec/ssti_spec.rb +0 -121
- data/spec/stack_overflow_spec.rb +0 -18
- data/spec/target_spec.rb +0 -92
- data/spec/test_result_spec.rb +0 -32
- data/spec/use_after_free_spec.rb +0 -14
- data/spec/web_spec.rb +0 -12
- data/spec/web_vuln_spec.rb +0 -854
- data/spec/xss_spec.rb +0 -69
data/spec/xss_spec.rb
DELETED
@@ -1,69 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
require 'ronin/exploits/xss'
|
3
|
-
|
4
|
-
describe Ronin::Exploits::XSS do
|
5
|
-
module TestXSS
|
6
|
-
class TestExploit < Ronin::Exploits::XSS
|
7
|
-
base_path '/showthread.asp'
|
8
|
-
query_param 'id'
|
9
|
-
end
|
10
|
-
end
|
11
|
-
|
12
|
-
let(:exploit_class) { TestXSS::TestExploit }
|
13
|
-
let(:base_url) { 'http://testasp.vulnweb.com' }
|
14
|
-
|
15
|
-
subject do
|
16
|
-
exploit_class.new(
|
17
|
-
params: {
|
18
|
-
base_url: base_url
|
19
|
-
}
|
20
|
-
)
|
21
|
-
end
|
22
|
-
|
23
|
-
it "must inherite from Ronin::Exploits::ClientSideWebVuln" do
|
24
|
-
expect(described_class).to be < Ronin::Exploits::ClientSideWebVuln
|
25
|
-
end
|
26
|
-
|
27
|
-
it "must include Ronin::Exploits::Mixins::HTML" do
|
28
|
-
expect(described_class).to include(Ronin::Exploits::Mixins::HTML)
|
29
|
-
end
|
30
|
-
|
31
|
-
describe ".exploit_type" do
|
32
|
-
subject { described_class }
|
33
|
-
|
34
|
-
it { expect(subject.exploit_type).to eq(:xss) }
|
35
|
-
end
|
36
|
-
|
37
|
-
describe "#initialize" do
|
38
|
-
it "must default #payload to a Ronin::Payloads::Test::XSS payload" do
|
39
|
-
expect(subject.payload).to be_kind_of(Ronin::Payloads::Test::XSS)
|
40
|
-
end
|
41
|
-
|
42
|
-
context "when given the payload: keyword argument" do
|
43
|
-
let(:payload) { Ronin::Payloads::JavaScriptPayload.new }
|
44
|
-
|
45
|
-
subject do
|
46
|
-
exploit_class.new(
|
47
|
-
payload: payload,
|
48
|
-
params: {
|
49
|
-
base_url: base_url
|
50
|
-
}
|
51
|
-
)
|
52
|
-
end
|
53
|
-
|
54
|
-
it "must set #payload" do
|
55
|
-
expect(subject.payload).to be(payload)
|
56
|
-
end
|
57
|
-
end
|
58
|
-
end
|
59
|
-
|
60
|
-
describe "#vuln" do
|
61
|
-
it "must return a Ronin::Vulns::ReflectedXSS object" do
|
62
|
-
expect(subject.vuln).to be_kind_of(Ronin::Vulns::ReflectedXSS)
|
63
|
-
end
|
64
|
-
|
65
|
-
it "must set the #url attribute of the ReflectedXSS vuln object" do
|
66
|
-
expect(subject.vuln.url).to eq(subject.url)
|
67
|
-
end
|
68
|
-
end
|
69
|
-
end
|