ronin-vulns 0.1.0.beta1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (64) hide show
  1. checksums.yaml +7 -0
  2. data/.document +5 -0
  3. data/.github/workflows/ruby.yml +31 -0
  4. data/.gitignore +13 -0
  5. data/.rspec +1 -0
  6. data/.ruby-version +1 -0
  7. data/.yardopts +1 -0
  8. data/COPYING.txt +165 -0
  9. data/ChangeLog.md +22 -0
  10. data/Gemfile +34 -0
  11. data/README.md +328 -0
  12. data/Rakefile +34 -0
  13. data/bin/ronin-vulns +19 -0
  14. data/data/rfi_test.asp +21 -0
  15. data/data/rfi_test.aspx +25 -0
  16. data/data/rfi_test.cfm +27 -0
  17. data/data/rfi_test.jsp +19 -0
  18. data/data/rfi_test.php +24 -0
  19. data/data/rfi_test.pl +25 -0
  20. data/gemspec.yml +41 -0
  21. data/lib/ronin/vulns/cli/command.rb +39 -0
  22. data/lib/ronin/vulns/cli/commands/lfi.rb +145 -0
  23. data/lib/ronin/vulns/cli/commands/open_redirect.rb +119 -0
  24. data/lib/ronin/vulns/cli/commands/reflected_xss.rb +99 -0
  25. data/lib/ronin/vulns/cli/commands/rfi.rb +156 -0
  26. data/lib/ronin/vulns/cli/commands/scan.rb +316 -0
  27. data/lib/ronin/vulns/cli/commands/sqli.rb +133 -0
  28. data/lib/ronin/vulns/cli/commands/ssti.rb +126 -0
  29. data/lib/ronin/vulns/cli/logging.rb +78 -0
  30. data/lib/ronin/vulns/cli/web_vuln_command.rb +347 -0
  31. data/lib/ronin/vulns/cli.rb +45 -0
  32. data/lib/ronin/vulns/lfi/test_file.rb +91 -0
  33. data/lib/ronin/vulns/lfi.rb +266 -0
  34. data/lib/ronin/vulns/open_redirect.rb +118 -0
  35. data/lib/ronin/vulns/reflected_xss/context.rb +224 -0
  36. data/lib/ronin/vulns/reflected_xss/test_string.rb +149 -0
  37. data/lib/ronin/vulns/reflected_xss.rb +184 -0
  38. data/lib/ronin/vulns/rfi.rb +224 -0
  39. data/lib/ronin/vulns/root.rb +28 -0
  40. data/lib/ronin/vulns/sqli/error_pattern.rb +89 -0
  41. data/lib/ronin/vulns/sqli.rb +397 -0
  42. data/lib/ronin/vulns/ssti/test_expression.rb +104 -0
  43. data/lib/ronin/vulns/ssti.rb +203 -0
  44. data/lib/ronin/vulns/url_scanner.rb +218 -0
  45. data/lib/ronin/vulns/version.rb +26 -0
  46. data/lib/ronin/vulns/vuln.rb +49 -0
  47. data/lib/ronin/vulns/web_vuln/http_request.rb +223 -0
  48. data/lib/ronin/vulns/web_vuln.rb +774 -0
  49. data/man/ronin-vulns-lfi.1 +107 -0
  50. data/man/ronin-vulns-lfi.1.md +80 -0
  51. data/man/ronin-vulns-open-redirect.1 +98 -0
  52. data/man/ronin-vulns-open-redirect.1.md +73 -0
  53. data/man/ronin-vulns-reflected-xss.1 +95 -0
  54. data/man/ronin-vulns-reflected-xss.1.md +71 -0
  55. data/man/ronin-vulns-rfi.1 +107 -0
  56. data/man/ronin-vulns-rfi.1.md +80 -0
  57. data/man/ronin-vulns-scan.1 +138 -0
  58. data/man/ronin-vulns-scan.1.md +103 -0
  59. data/man/ronin-vulns-sqli.1 +107 -0
  60. data/man/ronin-vulns-sqli.1.md +80 -0
  61. data/man/ronin-vulns-ssti.1 +99 -0
  62. data/man/ronin-vulns-ssti.1.md +74 -0
  63. data/ronin-vulns.gemspec +60 -0
  64. metadata +161 -0
@@ -0,0 +1,107 @@
1
+ .\" Generated by kramdown-man 0.1.8
2
+ .\" https://github.com/postmodern/kramdown-man#readme
3
+ .TH ronin-vulns-lfi 1 "May 2022" Ronin "User Manuals"
4
+ .LP
5
+ .SH SYNOPSIS
6
+ .LP
7
+ .HP
8
+ \fBronin-vulns lfi\fR \[lB]\fIoptions\fP\[rB] \[lC]\fIURL\fP \.\.\. \[or] \fB--input\fR \fIFILE\fP\[rC]
9
+ .LP
10
+ .SH DESCRIPTION
11
+ .LP
12
+ .PP
13
+ Scans URL(s) for Local File Inclusion (LFI) vulnerabilities\. The URLs to scan
14
+ can be given as additional arguments or read from a file using the \fB--input\fR
15
+ option\.
16
+ .LP
17
+ .SH ARGUMENTS
18
+ .LP
19
+ .TP
20
+ \fIURL\fP
21
+ A URL to scan\.
22
+ .LP
23
+ .SH OPTIONS
24
+ .LP
25
+ .TP
26
+ \fB--first\fR
27
+ Only find the first vulnerability for each URL\.
28
+ .LP
29
+ .TP
30
+ \fB-A\fR, \fB--all\fR
31
+ Find all vulnerabilities for each URL\.
32
+ .LP
33
+ .TP
34
+ \fB-H\fR, \fB--header\fR \[lq]\fIName\fP: \fIvalue\fP\[rq]
35
+ Sets an additional header using the given \fIName\fP and \fIvalue\fP\.
36
+ .LP
37
+ .TP
38
+ \fB-C\fR, \fB--cookie\fR \fICOOKIE\fP
39
+ Sets the raw \fBCookie\fR header\.
40
+ .LP
41
+ .TP
42
+ \fB-c\fR, \fB--cookie-param\fR \fINAME\fP\fB=\fR\fIVALUE\fP
43
+ Sets an additional \fBCookie\fR param using the given \fINAME\fP and \fIVALUE\fP\.
44
+ .LP
45
+ .TP
46
+ \fB-R\fR, \fB--referer\fR \fIURL\fP
47
+ Sets the \fBReferer\fR header\.
48
+ .LP
49
+ .TP
50
+ \fB-F\fR, \fB--form-param\fR \fINAME\fP\fB=\fR\fIVALUE\fP
51
+ Sets an additional form param using the given \fINAME\fP and \fIVALUE\fP\.
52
+ .LP
53
+ .TP
54
+ \fB--test-query-param\fR \fINAME\fP
55
+ Tests the URL query param name\.
56
+ .LP
57
+ .TP
58
+ \fB--test-all-query-params\fR
59
+ Test all URL query param names\.
60
+ .LP
61
+ .TP
62
+ \fB--test-header-name\fR \fINAME\fP
63
+ Tests the HTTP Header name\.
64
+ .LP
65
+ .TP
66
+ \fB--test-cookie-param\fR \fINAME\fP
67
+ Tests the HTTP Cookie name\.
68
+ .LP
69
+ .TP
70
+ \fB--test-all-cookie-params\fR
71
+ Test all Cookie param names\.
72
+ .LP
73
+ .TP
74
+ \fB--test-form-param\fR \fINAME\fP
75
+ Tests the form param name\.
76
+ .LP
77
+ .TP
78
+ \fB-i\fR, \fB--input\fR \fIFILE\fP
79
+ Reads URLs from the given \fIFILE\fP\.
80
+ .LP
81
+ .TP
82
+ \fB-O\fR, \fB--os\fR \fBunix\fR\[or]\fBwindows\fR
83
+ Sets the OS to test for\.
84
+ .LP
85
+ .TP
86
+ \fB-D\fR, \fB--depth\fR \fICOUNT\fP
87
+ Sets the directory depth to escape up\.
88
+ .LP
89
+ .TP
90
+ \fB-B\fR, \fB--filter-bypass\fR \fBnull_byte\fR\[or]\fBdouble_escape\fR\[or]\fBbase64\fR\[or]\fBrot13\fR\[or]\fBzlib\fR
91
+ Sets the filter bypass strategy to use\.
92
+ .LP
93
+ .TP
94
+ \fB-h\fR, \fB--help\fR
95
+ Print help information\.
96
+ .LP
97
+ .SH AUTHOR
98
+ .LP
99
+ .PP
100
+ Postmodern
101
+ .MT postmodern\.mod3\[at]gmail\.com
102
+ .ME
103
+ .LP
104
+ .SH SEE ALSO
105
+ .LP
106
+ .PP
107
+ ronin\-vulns\-rfi(1) ronin\-vulns\-scan(1)
@@ -0,0 +1,80 @@
1
+ # ronin-vulns-lfi 1 "May 2022" Ronin "User Manuals"
2
+
3
+ ## SYNOPSIS
4
+
5
+ `ronin-vulns lfi` [*options*] {*URL* ... \| `--input` *FILE*}
6
+
7
+ ## DESCRIPTION
8
+
9
+ Scans URL(s) for Local File Inclusion (LFI) vulnerabilities. The URLs to scan
10
+ can be given as additional arguments or read from a file using the `--input`
11
+ option.
12
+
13
+ ## ARGUMENTS
14
+
15
+ *URL*
16
+ A URL to scan.
17
+
18
+ ## OPTIONS
19
+
20
+ `--first`
21
+ Only find the first vulnerability for each URL.
22
+
23
+ `-A`, `--all`
24
+ Find all vulnerabilities for each URL.
25
+
26
+ `-H`, `--header` "*Name*: *value*"
27
+ Sets an additional header using the given *Name* and *value*.
28
+
29
+ `-C`, `--cookie` *COOKIE*
30
+ Sets the raw `Cookie` header.
31
+
32
+ `-c`, `--cookie-param` *NAME*`=`*VALUE*
33
+ Sets an additional `Cookie` param using the given *NAME* and *VALUE*.
34
+
35
+ `-R`, `--referer` *URL*
36
+ Sets the `Referer` header.
37
+
38
+ `-F`, `--form-param` *NAME*`=`*VALUE*
39
+ Sets an additional form param using the given *NAME* and *VALUE*.
40
+
41
+ `--test-query-param` *NAME*
42
+ Tests the URL query param name.
43
+
44
+ `--test-all-query-params`
45
+ Test all URL query param names.
46
+
47
+ `--test-header-name` *NAME*
48
+ Tests the HTTP Header name.
49
+
50
+ `--test-cookie-param` *NAME*
51
+ Tests the HTTP Cookie name.
52
+
53
+ `--test-all-cookie-params`
54
+ Test all Cookie param names.
55
+
56
+ `--test-form-param` *NAME*
57
+ Tests the form param name.
58
+
59
+ `-i`, `--input` *FILE*
60
+ Reads URLs from the given *FILE*.
61
+
62
+ `-O`, `--os` `unix`|`windows`
63
+ Sets the OS to test for.
64
+
65
+ `-D`, `--depth` *COUNT*
66
+ Sets the directory depth to escape up.
67
+
68
+ `-B`, `--filter-bypass` `null_byte`\|`double_escape`\|`base64`\|`rot13`\|`zlib`
69
+ Sets the filter bypass strategy to use.
70
+
71
+ `-h`, `--help`
72
+ Print help information.
73
+
74
+ ## AUTHOR
75
+
76
+ Postmodern <postmodern.mod3@gmail.com>
77
+
78
+ ## SEE ALSO
79
+
80
+ ronin-vulns-rfi(1) ronin-vulns-scan(1)
@@ -0,0 +1,98 @@
1
+ .\" Generated by kramdown-man 0.1.8
2
+ .\" https://github.com/postmodern/kramdown-man#readme
3
+ .TH ronin-vulns-open-redirect 1 "May 2022" Ronin "User Manuals"
4
+ .LP
5
+ .SH SYNOPSIS
6
+ .LP
7
+ .HP
8
+ \fBronin-vulns open-redirect\fR \[lB]\fIoptions\fP\[rB] \[lC]\fIURL\fP \.\.\. \[or] \fB--input\fR \fIFILE\fP\[rC]
9
+ .LP
10
+ .SH DESCRIPTION
11
+ .LP
12
+ .PP
13
+ Scans URL(s) for Open Redirect vulnerabilities\. The URLs to scan can be given
14
+ as additional arguments or read from a file using the \fB--input\fR option\.
15
+ .LP
16
+ .SH ARGUMENTS
17
+ .LP
18
+ .TP
19
+ \fIURL\fP
20
+ A URL to scan\.
21
+ .LP
22
+ .SH OPTIONS
23
+ .LP
24
+ .TP
25
+ \fB--first\fR
26
+ Only find the first vulnerability for each URL\.
27
+ .LP
28
+ .TP
29
+ \fB-A\fR, \fB--all\fR
30
+ Find all vulnerabilities for each URL\.
31
+ .LP
32
+ .TP
33
+ \fB-H\fR, \fB--header\fR \[lq]\fIName\fP: \fIvalue\fP\[rq]
34
+ Sets an additional header using the given \fIName\fP and \fIvalue\fP\.
35
+ .LP
36
+ .TP
37
+ \fB-C\fR, \fB--cookie\fR \fICOOKIE\fP
38
+ Sets the raw \fBCookie\fR header\.
39
+ .LP
40
+ .TP
41
+ \fB-c\fR, \fB--cookie-param\fR \fINAME\fP\fB=\fR\fIVALUE\fP
42
+ Sets an additional \fBCookie\fR param using the given \fINAME\fP and \fIVALUE\fP\.
43
+ .LP
44
+ .TP
45
+ \fB-R\fR, \fB--referer\fR \fIURL\fP
46
+ Sets the \fBReferer\fR header\.
47
+ .LP
48
+ .TP
49
+ \fB-F\fR, \fB--form-param\fR \fINAME\fP\fB=\fR\fIVALUE\fP
50
+ Sets an additional form param using the given \fINAME\fP and \fIVALUE\fP\.
51
+ .LP
52
+ .TP
53
+ \fB--test-query-param\fR \fINAME\fP
54
+ Tests the URL query param name\.
55
+ .LP
56
+ .TP
57
+ \fB--test-all-query-params\fR
58
+ Test all URL query param names\.
59
+ .LP
60
+ .TP
61
+ \fB--test-header-name\fR \fINAME\fP
62
+ Tests the HTTP Header name\.
63
+ .LP
64
+ .TP
65
+ \fB--test-cookie-param\fR \fINAME\fP
66
+ Tests the HTTP Cookie name\.
67
+ .LP
68
+ .TP
69
+ \fB--test-all-cookie-params\fR
70
+ Test all Cookie param names\.
71
+ .LP
72
+ .TP
73
+ \fB--test-form-param\fR \fINAME\fP
74
+ Tests the form param name\.
75
+ .LP
76
+ .TP
77
+ \fB-i\fR, \fB--input\fR \fIFILE\fP
78
+ Reads URLs from the given \fIFILE\fP\.
79
+ .LP
80
+ .TP
81
+ \fB-T\fR, \fB--test-url\fR \fIURL\fP
82
+ Optional test \fIURL\fP to try to redirect to\.
83
+ .LP
84
+ .TP
85
+ \fB-h\fR, \fB--help\fR
86
+ Print help information\.
87
+ .LP
88
+ .SH AUTHOR
89
+ .LP
90
+ .PP
91
+ Postmodern
92
+ .MT postmodern\.mod3\[at]gmail\.com
93
+ .ME
94
+ .LP
95
+ .SH SEE ALSO
96
+ .LP
97
+ .PP
98
+ ronin\-vulns\-scan(1)
@@ -0,0 +1,73 @@
1
+ # ronin-vulns-open-redirect 1 "May 2022" Ronin "User Manuals"
2
+
3
+ ## SYNOPSIS
4
+
5
+ `ronin-vulns open-redirect` [*options*] {*URL* ... \| `--input` *FILE*}
6
+
7
+ ## DESCRIPTION
8
+
9
+ Scans URL(s) for Open Redirect vulnerabilities. The URLs to scan can be given
10
+ as additional arguments or read from a file using the `--input` option.
11
+
12
+ ## ARGUMENTS
13
+
14
+ *URL*
15
+ A URL to scan.
16
+
17
+ ## OPTIONS
18
+
19
+ `--first`
20
+ Only find the first vulnerability for each URL.
21
+
22
+ `-A`, `--all`
23
+ Find all vulnerabilities for each URL.
24
+
25
+ `-H`, `--header` "*Name*: *value*"
26
+ Sets an additional header using the given *Name* and *value*.
27
+
28
+ `-C`, `--cookie` *COOKIE*
29
+ Sets the raw `Cookie` header.
30
+
31
+ `-c`, `--cookie-param` *NAME*`=`*VALUE*
32
+ Sets an additional `Cookie` param using the given *NAME* and *VALUE*.
33
+
34
+ `-R`, `--referer` *URL*
35
+ Sets the `Referer` header.
36
+
37
+ `-F`, `--form-param` *NAME*`=`*VALUE*
38
+ Sets an additional form param using the given *NAME* and *VALUE*.
39
+
40
+ `--test-query-param` *NAME*
41
+ Tests the URL query param name.
42
+
43
+ `--test-all-query-params`
44
+ Test all URL query param names.
45
+
46
+ `--test-header-name` *NAME*
47
+ Tests the HTTP Header name.
48
+
49
+ `--test-cookie-param` *NAME*
50
+ Tests the HTTP Cookie name.
51
+
52
+ `--test-all-cookie-params`
53
+ Test all Cookie param names.
54
+
55
+ `--test-form-param` *NAME*
56
+ Tests the form param name.
57
+
58
+ `-i`, `--input` *FILE*
59
+ Reads URLs from the given *FILE*.
60
+
61
+ `-T`, `--test-url` *URL*
62
+ Optional test *URL* to try to redirect to.
63
+
64
+ `-h`, `--help`
65
+ Print help information.
66
+
67
+ ## AUTHOR
68
+
69
+ Postmodern <postmodern.mod3@gmail.com>
70
+
71
+ ## SEE ALSO
72
+
73
+ ronin-vulns-scan(1)
@@ -0,0 +1,95 @@
1
+ .\" Generated by kramdown-man 0.1.8
2
+ .\" https://github.com/postmodern/kramdown-man#readme
3
+ .TH ronin-vulns-reflected-xss 1 "May 2022" Ronin "User Manuals"
4
+ .LP
5
+ .SH SYNOPSIS
6
+ .LP
7
+ .HP
8
+ \fBronin-vulns reflected-xss\fR \[lB]\fIoptions\fP\[rB] \[lC]\fIURL\fP \.\.\. \[or] \fB--input\fR \fIFILE\fP\[rC]
9
+ .LP
10
+ .SH DESCRIPTION
11
+ .LP
12
+ .PP
13
+ Scans URL(s) for reflected Cross Site Scripting (XSS) vulnerabilities\. The URLs
14
+ to scan can be given as additional arguments or read from a file using the
15
+ \fB--input\fR option\.
16
+ .LP
17
+ .SH ARGUMENTS
18
+ .LP
19
+ .TP
20
+ \fIURL\fP
21
+ A URL to scan\.
22
+ .LP
23
+ .SH OPTIONS
24
+ .LP
25
+ .TP
26
+ \fB--first\fR
27
+ Only find the first vulnerability for each URL\.
28
+ .LP
29
+ .TP
30
+ \fB-A\fR, \fB--all\fR
31
+ Find all vulnerabilities for each URL\.
32
+ .LP
33
+ .TP
34
+ \fB-H\fR, \fB--header\fR \[lq]\fIName\fP: \fIvalue\fP\[rq]
35
+ Sets an additional header using the given \fIName\fP and \fIvalue\fP\.
36
+ .LP
37
+ .TP
38
+ \fB-C\fR, \fB--cookie\fR \fICOOKIE\fP
39
+ Sets the raw \fBCookie\fR header\.
40
+ .LP
41
+ .TP
42
+ \fB-c\fR, \fB--cookie-param\fR \fINAME\fP\fB=\fR\fIVALUE\fP
43
+ Sets an additional \fBCookie\fR param using the given \fINAME\fP and \fIVALUE\fP\.
44
+ .LP
45
+ .TP
46
+ \fB-R\fR, \fB--referer\fR \fIURL\fP
47
+ Sets the \fBReferer\fR header\.
48
+ .LP
49
+ .TP
50
+ \fB-F\fR, \fB--form-param\fR \fINAME\fP\fB=\fR\fIVALUE\fP
51
+ Sets an additional form param using the given \fINAME\fP and \fIVALUE\fP\.
52
+ .LP
53
+ .TP
54
+ \fB--test-query-param\fR \fINAME\fP
55
+ Tests the URL query param name\.
56
+ .LP
57
+ .TP
58
+ \fB--test-all-query-params\fR
59
+ Test all URL query param names\.
60
+ .LP
61
+ .TP
62
+ \fB--test-header-name\fR \fINAME\fP
63
+ Tests the HTTP Header name\.
64
+ .LP
65
+ .TP
66
+ \fB--test-cookie-param\fR \fINAME\fP
67
+ Tests the HTTP Cookie name\.
68
+ .LP
69
+ .TP
70
+ \fB--test-all-cookie-params\fR
71
+ Test all Cookie param names\.
72
+ .LP
73
+ .TP
74
+ \fB--test-form-param\fR \fINAME\fP
75
+ Tests the form param name\.
76
+ .LP
77
+ .TP
78
+ \fB-i\fR, \fB--input\fR \fIFILE\fP
79
+ Reads URLs from the given \fIFILE\fP\.
80
+ .LP
81
+ .TP
82
+ \fB-h\fR, \fB--help\fR
83
+ Print help information\.
84
+ .LP
85
+ .SH AUTHOR
86
+ .LP
87
+ .PP
88
+ Postmodern
89
+ .MT postmodern\.mod3\[at]gmail\.com
90
+ .ME
91
+ .LP
92
+ .SH SEE ALSO
93
+ .LP
94
+ .PP
95
+ ronin\-vulns\-scan(1)
@@ -0,0 +1,71 @@
1
+ # ronin-vulns-reflected-xss 1 "May 2022" Ronin "User Manuals"
2
+
3
+ ## SYNOPSIS
4
+
5
+ `ronin-vulns reflected-xss` [*options*] {*URL* ... \| `--input` *FILE*}
6
+
7
+ ## DESCRIPTION
8
+
9
+ Scans URL(s) for reflected Cross Site Scripting (XSS) vulnerabilities. The URLs
10
+ to scan can be given as additional arguments or read from a file using the
11
+ `--input` option.
12
+
13
+ ## ARGUMENTS
14
+
15
+ *URL*
16
+ A URL to scan.
17
+
18
+ ## OPTIONS
19
+
20
+ `--first`
21
+ Only find the first vulnerability for each URL.
22
+
23
+ `-A`, `--all`
24
+ Find all vulnerabilities for each URL.
25
+
26
+ `-H`, `--header` "*Name*: *value*"
27
+ Sets an additional header using the given *Name* and *value*.
28
+
29
+ `-C`, `--cookie` *COOKIE*
30
+ Sets the raw `Cookie` header.
31
+
32
+ `-c`, `--cookie-param` *NAME*`=`*VALUE*
33
+ Sets an additional `Cookie` param using the given *NAME* and *VALUE*.
34
+
35
+ `-R`, `--referer` *URL*
36
+ Sets the `Referer` header.
37
+
38
+ `-F`, `--form-param` *NAME*`=`*VALUE*
39
+ Sets an additional form param using the given *NAME* and *VALUE*.
40
+
41
+ `--test-query-param` *NAME*
42
+ Tests the URL query param name.
43
+
44
+ `--test-all-query-params`
45
+ Test all URL query param names.
46
+
47
+ `--test-header-name` *NAME*
48
+ Tests the HTTP Header name.
49
+
50
+ `--test-cookie-param` *NAME*
51
+ Tests the HTTP Cookie name.
52
+
53
+ `--test-all-cookie-params`
54
+ Test all Cookie param names.
55
+
56
+ `--test-form-param` *NAME*
57
+ Tests the form param name.
58
+
59
+ `-i`, `--input` *FILE*
60
+ Reads URLs from the given *FILE*.
61
+
62
+ `-h`, `--help`
63
+ Print help information.
64
+
65
+ ## AUTHOR
66
+
67
+ Postmodern <postmodern.mod3@gmail.com>
68
+
69
+ ## SEE ALSO
70
+
71
+ ronin-vulns-scan(1)
@@ -0,0 +1,107 @@
1
+ .\" Generated by kramdown-man 0.1.8
2
+ .\" https://github.com/postmodern/kramdown-man#readme
3
+ .TH ronin-vulns-rfi 1 "May 2022" Ronin "User Manuals"
4
+ .LP
5
+ .SH SYNOPSIS
6
+ .LP
7
+ .HP
8
+ \fBronin-vulns rfi\fR \[lB]\fIoptions\fP\[rB] \[lC]\fIURL\fP \.\.\. \[or] \fB--input\fR \fIFILE\fP\[rC]
9
+ .LP
10
+ .SH DESCRIPTION
11
+ .LP
12
+ .PP
13
+ Scans URL(s) for Remote File Inclusion (RFI) vulnerabilities\. The URLs to scan
14
+ can be given as additional arguments or read from a file using the \fB--input\fR
15
+ option\.
16
+ .LP
17
+ .SH ARGUMENTS
18
+ .LP
19
+ .TP
20
+ \fIURL\fP
21
+ A URL to scan\.
22
+ .LP
23
+ .SH OPTIONS
24
+ .LP
25
+ .TP
26
+ \fB--first\fR
27
+ Only find the first vulnerability for each URL\.
28
+ .LP
29
+ .TP
30
+ \fB-A\fR, \fB--all\fR
31
+ Find all vulnerabilities for each URL\.
32
+ .LP
33
+ .TP
34
+ \fB-H\fR, \fB--header\fR \[lq]\fIName\fP: \fIvalue\fP\[rq]
35
+ Sets an additional header using the given \fIName\fP and \fIvalue\fP\.
36
+ .LP
37
+ .TP
38
+ \fB-C\fR, \fB--cookie\fR \fICOOKIE\fP
39
+ Sets the raw \fBCookie\fR header\.
40
+ .LP
41
+ .TP
42
+ \fB-c\fR, \fB--cookie-param\fR \fINAME\fP\fB=\fR\fIVALUE\fP
43
+ Sets an additional \fBCookie\fR param using the given \fINAME\fP and \fIVALUE\fP\.
44
+ .LP
45
+ .TP
46
+ \fB-R\fR, \fB--referer\fR \fIURL\fP
47
+ Sets the \fBReferer\fR header\.
48
+ .LP
49
+ .TP
50
+ \fB-F\fR, \fB--form-param\fR \fINAME\fP\fB=\fR\fIVALUE\fP
51
+ Sets an additional form param using the given \fINAME\fP and \fIVALUE\fP\.
52
+ .LP
53
+ .TP
54
+ \fB--test-query-param\fR \fINAME\fP
55
+ Tests the URL query param name\.
56
+ .LP
57
+ .TP
58
+ \fB--test-all-query-params\fR
59
+ Test all URL query param names\.
60
+ .LP
61
+ .TP
62
+ \fB--test-header-name\fR \fINAME\fP
63
+ Tests the HTTP Header name\.
64
+ .LP
65
+ .TP
66
+ \fB--test-cookie-param\fR \fINAME\fP
67
+ Tests the HTTP Cookie name\.
68
+ .LP
69
+ .TP
70
+ \fB--test-all-cookie-params\fR
71
+ Test all Cookie param names\.
72
+ .LP
73
+ .TP
74
+ \fB--test-form-param\fR \fINAME\fP
75
+ Tests the form param name\.
76
+ .LP
77
+ .TP
78
+ \fB-i\fR, \fB--input\fR \fIFILE\fP
79
+ Reads URLs from the given \fIFILE\fP\.
80
+ .LP
81
+ .TP
82
+ \fB-B\fR, \fB--filter-bypass\fR \fBdouble-encode\fR\[or]\fBsuffix-escape\fR\[or]\fBnull-byte\fR
83
+ Optional filter\-bypass strategy to use\.
84
+ .LP
85
+ .HP
86
+ \fB-S\fR, \fB--script-lang\fR \fBasp\|\fRasp\.net\fB\|\fRcoldfusion\fB\|\fRjsp\fB\|\fRphp\fB\|\fRperl\`
87
+ Explicitly specify the scripting language to test for\.
88
+ .LP
89
+ .TP
90
+ \fB-T\fR, \fB--test-script-url\fR \fIURL\fP
91
+ Use an altnerative test script \fIURL\fP\.
92
+ .LP
93
+ .TP
94
+ \fB-h\fR, \fB--help\fR
95
+ Print help information\.
96
+ .LP
97
+ .SH AUTHOR
98
+ .LP
99
+ .PP
100
+ Postmodern
101
+ .MT postmodern\.mod3\[at]gmail\.com
102
+ .ME
103
+ .LP
104
+ .SH SEE ALSO
105
+ .LP
106
+ .PP
107
+ ronin\-vulns\-scan(1)
@@ -0,0 +1,80 @@
1
+ # ronin-vulns-rfi 1 "May 2022" Ronin "User Manuals"
2
+
3
+ ## SYNOPSIS
4
+
5
+ `ronin-vulns rfi` [*options*] {*URL* ... \| `--input` *FILE*}
6
+
7
+ ## DESCRIPTION
8
+
9
+ Scans URL(s) for Remote File Inclusion (RFI) vulnerabilities. The URLs to scan
10
+ can be given as additional arguments or read from a file using the `--input`
11
+ option.
12
+
13
+ ## ARGUMENTS
14
+
15
+ *URL*
16
+ A URL to scan.
17
+
18
+ ## OPTIONS
19
+
20
+ `--first`
21
+ Only find the first vulnerability for each URL.
22
+
23
+ `-A`, `--all`
24
+ Find all vulnerabilities for each URL.
25
+
26
+ `-H`, `--header` "*Name*: *value*"
27
+ Sets an additional header using the given *Name* and *value*.
28
+
29
+ `-C`, `--cookie` *COOKIE*
30
+ Sets the raw `Cookie` header.
31
+
32
+ `-c`, `--cookie-param` *NAME*`=`*VALUE*
33
+ Sets an additional `Cookie` param using the given *NAME* and *VALUE*.
34
+
35
+ `-R`, `--referer` *URL*
36
+ Sets the `Referer` header.
37
+
38
+ `-F`, `--form-param` *NAME*`=`*VALUE*
39
+ Sets an additional form param using the given *NAME* and *VALUE*.
40
+
41
+ `--test-query-param` *NAME*
42
+ Tests the URL query param name.
43
+
44
+ `--test-all-query-params`
45
+ Test all URL query param names.
46
+
47
+ `--test-header-name` *NAME*
48
+ Tests the HTTP Header name.
49
+
50
+ `--test-cookie-param` *NAME*
51
+ Tests the HTTP Cookie name.
52
+
53
+ `--test-all-cookie-params`
54
+ Test all Cookie param names.
55
+
56
+ `--test-form-param` *NAME*
57
+ Tests the form param name.
58
+
59
+ `-i`, `--input` *FILE*
60
+ Reads URLs from the given *FILE*.
61
+
62
+ `-B`, `--filter-bypass` `double-encode`\|`suffix-escape`\|`null-byte`
63
+ Optional filter-bypass strategy to use.
64
+
65
+ `-S`, `--script-lang` `asp\|`asp.net`\|`coldfusion`\|`jsp`\|`php`\|`perl`
66
+ Explicitly specify the scripting language to test for.
67
+
68
+ `-T`, `--test-script-url` *URL*
69
+ Use an altnerative test script *URL*.
70
+
71
+ `-h`, `--help`
72
+ Print help information.
73
+
74
+ ## AUTHOR
75
+
76
+ Postmodern <postmodern.mod3@gmail.com>
77
+
78
+ ## SEE ALSO
79
+
80
+ ronin-vulns-scan(1)