bbot 2.3.0.5370rc0__py3-none-any.whl → 2.3.0.5382rc0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of bbot might be problematic. Click here for more details.
- bbot/__init__.py +1 -1
- bbot/cli.py +2 -6
- bbot/core/config/files.py +0 -1
- bbot/core/config/logger.py +1 -1
- bbot/core/core.py +1 -1
- bbot/core/event/base.py +13 -16
- bbot/core/helpers/command.py +4 -4
- bbot/core/helpers/depsinstaller/installer.py +5 -5
- bbot/core/helpers/diff.py +7 -7
- bbot/core/helpers/dns/brute.py +1 -1
- bbot/core/helpers/dns/dns.py +1 -2
- bbot/core/helpers/dns/engine.py +4 -6
- bbot/core/helpers/dns/mock.py +0 -1
- bbot/core/helpers/files.py +1 -1
- bbot/core/helpers/helper.py +3 -1
- bbot/core/helpers/interactsh.py +3 -3
- bbot/core/helpers/libmagic.py +0 -1
- bbot/core/helpers/misc.py +11 -11
- bbot/core/helpers/process.py +0 -2
- bbot/core/helpers/regex.py +1 -1
- bbot/core/helpers/regexes.py +3 -3
- bbot/core/helpers/validators.py +1 -2
- bbot/core/helpers/web/client.py +1 -1
- bbot/core/helpers/web/engine.py +1 -2
- bbot/core/helpers/web/web.py +2 -3
- bbot/core/helpers/wordcloud.py +5 -5
- bbot/core/modules.py +21 -22
- bbot/db/sql/models.py +0 -1
- bbot/modules/azure_tenant.py +2 -2
- bbot/modules/baddns.py +0 -2
- bbot/modules/baddns_direct.py +0 -1
- bbot/modules/base.py +16 -16
- bbot/modules/bypass403.py +5 -5
- bbot/modules/c99.py +1 -1
- bbot/modules/columbus.py +1 -1
- bbot/modules/deadly/ffuf.py +8 -8
- bbot/modules/deadly/nuclei.py +1 -1
- bbot/modules/deadly/vhost.py +3 -3
- bbot/modules/dnsbimi.py +1 -1
- bbot/modules/dnsdumpster.py +2 -2
- bbot/modules/dockerhub.py +1 -1
- bbot/modules/dotnetnuke.py +0 -2
- bbot/modules/extractous.py +1 -1
- bbot/modules/filedownload.py +1 -1
- bbot/modules/generic_ssrf.py +3 -3
- bbot/modules/github_workflows.py +1 -1
- bbot/modules/gowitness.py +7 -7
- bbot/modules/host_header.py +5 -5
- bbot/modules/httpx.py +1 -1
- bbot/modules/iis_shortnames.py +6 -6
- bbot/modules/internal/cloudcheck.py +5 -5
- bbot/modules/internal/dnsresolve.py +7 -7
- bbot/modules/internal/excavate.py +23 -26
- bbot/modules/internal/speculate.py +4 -4
- bbot/modules/ipneighbor.py +1 -1
- bbot/modules/jadx.py +1 -1
- bbot/modules/newsletters.py +2 -2
- bbot/modules/output/asset_inventory.py +6 -6
- bbot/modules/output/base.py +1 -1
- bbot/modules/output/csv.py +1 -1
- bbot/modules/output/stdout.py +2 -2
- bbot/modules/paramminer_headers.py +4 -7
- bbot/modules/portscan.py +3 -3
- bbot/modules/report/asn.py +11 -11
- bbot/modules/robots.py +3 -3
- bbot/modules/securitytxt.py +1 -1
- bbot/modules/sitedossier.py +1 -1
- bbot/modules/social.py +1 -1
- bbot/modules/subdomainradar.py +1 -1
- bbot/modules/telerik.py +7 -7
- bbot/modules/templates/bucket.py +1 -1
- bbot/modules/templates/github.py +1 -1
- bbot/modules/templates/shodan.py +1 -1
- bbot/modules/templates/subdomain_enum.py +1 -1
- bbot/modules/templates/webhook.py +1 -1
- bbot/modules/trufflehog.py +2 -2
- bbot/modules/url_manipulation.py +3 -3
- bbot/modules/urlscan.py +1 -1
- bbot/modules/viewdns.py +1 -1
- bbot/modules/wafw00f.py +1 -1
- bbot/scanner/preset/args.py +10 -11
- bbot/scanner/preset/environ.py +0 -1
- bbot/scanner/preset/preset.py +9 -9
- bbot/scanner/scanner.py +17 -17
- bbot/scanner/target.py +1 -1
- bbot/scripts/docs.py +1 -1
- bbot/test/bbot_fixtures.py +1 -1
- bbot/test/conftest.py +1 -1
- bbot/test/run_tests.sh +4 -4
- bbot/test/test_step_1/test_bbot_fastapi.py +2 -2
- bbot/test/test_step_1/test_cli.py +56 -56
- bbot/test/test_step_1/test_dns.py +15 -15
- bbot/test/test_step_1/test_engine.py +17 -17
- bbot/test/test_step_1/test_events.py +22 -22
- bbot/test/test_step_1/test_helpers.py +26 -26
- bbot/test/test_step_1/test_manager_scope_accuracy.py +306 -306
- bbot/test/test_step_1/test_modules_basic.py +52 -53
- bbot/test/test_step_1/test_presets.py +81 -81
- bbot/test/test_step_1/test_regexes.py +5 -5
- bbot/test/test_step_1/test_scan.py +4 -4
- bbot/test/test_step_1/test_target.py +25 -25
- bbot/test/test_step_1/test_web.py +5 -5
- bbot/test/test_step_2/module_tests/base.py +6 -6
- bbot/test/test_step_2/module_tests/test_module_anubisdb.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_asset_inventory.py +0 -1
- bbot/test/test_step_2/module_tests/test_module_azure_realm.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_baddns.py +6 -6
- bbot/test/test_step_2/module_tests/test_module_baddns_direct.py +2 -4
- bbot/test/test_step_2/module_tests/test_module_bevigil.py +4 -4
- bbot/test/test_step_2/module_tests/test_module_binaryedge.py +2 -2
- bbot/test/test_step_2/module_tests/test_module_bucket_amazon.py +2 -2
- bbot/test/test_step_2/module_tests/test_module_bucket_azure.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_builtwith.py +2 -2
- bbot/test/test_step_2/module_tests/test_module_c99.py +9 -9
- bbot/test/test_step_2/module_tests/test_module_columbus.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_credshed.py +2 -2
- bbot/test/test_step_2/module_tests/test_module_dehashed.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_digitorus.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_dnsbrute.py +8 -9
- bbot/test/test_step_2/module_tests/test_module_dnsbrute_mutations.py +0 -1
- bbot/test/test_step_2/module_tests/test_module_dnscommonsrv.py +0 -1
- bbot/test/test_step_2/module_tests/test_module_dnsdumpster.py +2 -2
- bbot/test/test_step_2/module_tests/test_module_dotnetnuke.py +0 -2
- bbot/test/test_step_2/module_tests/test_module_excavate.py +10 -30
- bbot/test/test_step_2/module_tests/test_module_extractous.py +9 -9
- bbot/test/test_step_2/module_tests/test_module_filedownload.py +14 -14
- bbot/test/test_step_2/module_tests/test_module_git_clone.py +2 -2
- bbot/test/test_step_2/module_tests/test_module_gowitness.py +4 -4
- bbot/test/test_step_2/module_tests/test_module_host_header.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_http.py +4 -4
- bbot/test/test_step_2/module_tests/test_module_httpx.py +7 -7
- bbot/test/test_step_2/module_tests/test_module_leakix.py +2 -2
- bbot/test/test_step_2/module_tests/test_module_myssl.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_neo4j.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_newsletters.py +6 -6
- bbot/test/test_step_2/module_tests/test_module_ntlm.py +7 -7
- bbot/test/test_step_2/module_tests/test_module_oauth.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_otx.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_paramminer_cookies.py +1 -2
- bbot/test/test_step_2/module_tests/test_module_paramminer_getparams.py +0 -6
- bbot/test/test_step_2/module_tests/test_module_paramminer_headers.py +2 -9
- bbot/test/test_step_2/module_tests/test_module_portscan.py +3 -4
- bbot/test/test_step_2/module_tests/test_module_postgres.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_rapiddns.py +9 -9
- bbot/test/test_step_2/module_tests/test_module_sitedossier.py +2 -2
- bbot/test/test_step_2/module_tests/test_module_smuggler.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_speculate.py +2 -6
- bbot/test/test_step_2/module_tests/test_module_splunk.py +4 -4
- bbot/test/test_step_2/module_tests/test_module_subdomaincenter.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_subdomains.py +1 -1
- bbot/test/test_step_2/module_tests/test_module_trufflehog.py +2 -2
- bbot/test/test_step_2/module_tests/test_module_wayback.py +1 -1
- {bbot-2.3.0.5370rc0.dist-info → bbot-2.3.0.5382rc0.dist-info}/METADATA +2 -2
- {bbot-2.3.0.5370rc0.dist-info → bbot-2.3.0.5382rc0.dist-info}/RECORD +157 -157
- {bbot-2.3.0.5370rc0.dist-info → bbot-2.3.0.5382rc0.dist-info}/LICENSE +0 -0
- {bbot-2.3.0.5370rc0.dist-info → bbot-2.3.0.5382rc0.dist-info}/WHEEL +0 -0
- {bbot-2.3.0.5370rc0.dist-info → bbot-2.3.0.5382rc0.dist-info}/entry_points.txt +0 -0
|
@@ -81,8 +81,8 @@ async def test_events(events, helpers):
|
|
|
81
81
|
assert "fsocie.ty" not in events.subdomain
|
|
82
82
|
assert events.subdomain in events.domain
|
|
83
83
|
assert events.domain not in events.subdomain
|
|
84
|
-
assert
|
|
85
|
-
assert
|
|
84
|
+
assert events.ipv4 not in events.domain
|
|
85
|
+
assert events.netv6 not in events.domain
|
|
86
86
|
assert events.emoji not in events.domain
|
|
87
87
|
assert events.domain not in events.emoji
|
|
88
88
|
open_port_event = scan.make_event(" eViLcorp.COM.:88", "DNS_NAME", dummy=True)
|
|
@@ -207,7 +207,7 @@ async def test_events(events, helpers):
|
|
|
207
207
|
|
|
208
208
|
# scope distance
|
|
209
209
|
event1 = scan.make_event("1.2.3.4", dummy=True)
|
|
210
|
-
assert event1._scope_distance
|
|
210
|
+
assert event1._scope_distance is None
|
|
211
211
|
event1.scope_distance = 0
|
|
212
212
|
assert event1._scope_distance == 0
|
|
213
213
|
event2 = scan.make_event("2.3.4.5", parent=event1)
|
|
@@ -228,7 +228,7 @@ async def test_events(events, helpers):
|
|
|
228
228
|
|
|
229
229
|
org_stub_1 = scan.make_event("STUB1", "ORG_STUB", parent=scan.root_event)
|
|
230
230
|
org_stub_1.scope_distance == 1
|
|
231
|
-
assert org_stub_1.netloc
|
|
231
|
+
assert org_stub_1.netloc is None
|
|
232
232
|
assert "netloc" not in org_stub_1.json()
|
|
233
233
|
org_stub_2 = scan.make_event("STUB2", "ORG_STUB", parent=org_stub_1)
|
|
234
234
|
org_stub_2.scope_distance == 2
|
|
@@ -237,7 +237,7 @@ async def test_events(events, helpers):
|
|
|
237
237
|
root_event = scan.make_event("0.0.0.0", dummy=True)
|
|
238
238
|
root_event.scope_distance = 0
|
|
239
239
|
internal_event1 = scan.make_event("1.2.3.4", parent=root_event, internal=True)
|
|
240
|
-
assert internal_event1._internal
|
|
240
|
+
assert internal_event1._internal is True
|
|
241
241
|
assert "internal" in internal_event1.tags
|
|
242
242
|
|
|
243
243
|
# tag inheritance
|
|
@@ -269,8 +269,8 @@ async def test_events(events, helpers):
|
|
|
269
269
|
# updating module
|
|
270
270
|
event3 = scan.make_event("127.0.0.1", parent=scan.root_event)
|
|
271
271
|
updated_event = scan.make_event(event3, internal=True)
|
|
272
|
-
assert event3.internal
|
|
273
|
-
assert updated_event.internal
|
|
272
|
+
assert event3.internal is False
|
|
273
|
+
assert updated_event.internal is True
|
|
274
274
|
|
|
275
275
|
# event sorting
|
|
276
276
|
parent1 = scan.make_event("127.0.0.1", parent=scan.root_event)
|
|
@@ -490,7 +490,7 @@ async def test_events(events, helpers):
|
|
|
490
490
|
assert db_event.discovery_context == "test context"
|
|
491
491
|
assert db_event.discovery_path == ["test context"]
|
|
492
492
|
assert len(db_event.parent_chain) == 1
|
|
493
|
-
assert all(
|
|
493
|
+
assert all(event_uuid_regex.match(u) for u in db_event.parent_chain)
|
|
494
494
|
assert db_event.parent_chain[0] == str(db_event.uuid)
|
|
495
495
|
assert db_event.parent.uuid == scan.root_event.uuid
|
|
496
496
|
assert db_event.parent_uuid == scan.root_event.uuid
|
|
@@ -527,7 +527,7 @@ async def test_events(events, helpers):
|
|
|
527
527
|
hostless_event_json = hostless_event.json()
|
|
528
528
|
assert hostless_event_json["type"] == "ASDF"
|
|
529
529
|
assert hostless_event_json["data"] == "asdf"
|
|
530
|
-
assert
|
|
530
|
+
assert "host" not in hostless_event_json
|
|
531
531
|
|
|
532
532
|
# SIEM-friendly serialize/deserialize
|
|
533
533
|
json_event_siemfriendly = db_event.json(siem_friendly=True)
|
|
@@ -805,7 +805,7 @@ async def test_event_web_spider_distance(bbot_scanner):
|
|
|
805
805
|
)
|
|
806
806
|
assert url_event_3.web_spider_distance == 1
|
|
807
807
|
assert "spider-danger" in url_event_3.tags
|
|
808
|
-
assert
|
|
808
|
+
assert "spider-max" not in url_event_3.tags
|
|
809
809
|
social_event = scan.make_event(
|
|
810
810
|
{"platform": "github", "url": "http://www.evilcorp.com/test4"}, "SOCIAL", parent=url_event_3
|
|
811
811
|
)
|
|
@@ -828,42 +828,42 @@ async def test_event_web_spider_distance(bbot_scanner):
|
|
|
828
828
|
|
|
829
829
|
url_event = scan.make_event("http://www.evilcorp.com", "URL_UNVERIFIED", parent=scan.root_event)
|
|
830
830
|
assert url_event.web_spider_distance == 0
|
|
831
|
-
assert
|
|
832
|
-
assert
|
|
831
|
+
assert "spider-danger" not in url_event.tags
|
|
832
|
+
assert "spider-max" not in url_event.tags
|
|
833
833
|
url_event_2 = scan.make_event(
|
|
834
834
|
"http://www.evilcorp.com", "URL_UNVERIFIED", parent=scan.root_event, tags="spider-danger"
|
|
835
835
|
)
|
|
836
836
|
# spider distance shouldn't increment because it's not the same host
|
|
837
837
|
assert url_event_2.web_spider_distance == 0
|
|
838
838
|
assert "spider-danger" in url_event_2.tags
|
|
839
|
-
assert
|
|
839
|
+
assert "spider-max" not in url_event_2.tags
|
|
840
840
|
url_event_3 = scan.make_event(
|
|
841
841
|
"http://www.evilcorp.com/3", "URL_UNVERIFIED", parent=url_event_2, tags="spider-danger"
|
|
842
842
|
)
|
|
843
843
|
assert url_event_3.web_spider_distance == 1
|
|
844
844
|
assert "spider-danger" in url_event_3.tags
|
|
845
|
-
assert
|
|
845
|
+
assert "spider-max" not in url_event_3.tags
|
|
846
846
|
url_event_4 = scan.make_event("http://evilcorp.com", "URL_UNVERIFIED", parent=url_event_3)
|
|
847
847
|
assert url_event_4.web_spider_distance == 0
|
|
848
|
-
assert
|
|
849
|
-
assert
|
|
848
|
+
assert "spider-danger" not in url_event_4.tags
|
|
849
|
+
assert "spider-max" not in url_event_4.tags
|
|
850
850
|
url_event_4.add_tag("spider-danger")
|
|
851
851
|
assert url_event_4.web_spider_distance == 0
|
|
852
852
|
assert "spider-danger" in url_event_4.tags
|
|
853
|
-
assert
|
|
853
|
+
assert "spider-max" not in url_event_4.tags
|
|
854
854
|
url_event_4.remove_tag("spider-danger")
|
|
855
855
|
assert url_event_4.web_spider_distance == 0
|
|
856
|
-
assert
|
|
857
|
-
assert
|
|
856
|
+
assert "spider-danger" not in url_event_4.tags
|
|
857
|
+
assert "spider-max" not in url_event_4.tags
|
|
858
858
|
url_event_5 = scan.make_event("http://evilcorp.com/5", "URL_UNVERIFIED", parent=url_event_4)
|
|
859
859
|
assert url_event_5.web_spider_distance == 0
|
|
860
|
-
assert
|
|
861
|
-
assert
|
|
860
|
+
assert "spider-danger" not in url_event_5.tags
|
|
861
|
+
assert "spider-max" not in url_event_5.tags
|
|
862
862
|
url_event_5.add_tag("spider-danger")
|
|
863
863
|
# if host is the same as parent, web spider distance should auto-increment after adding spider-danger tag
|
|
864
864
|
assert url_event_5.web_spider_distance == 1
|
|
865
865
|
assert "spider-danger" in url_event_5.tags
|
|
866
|
-
assert
|
|
866
|
+
assert "spider-max" not in url_event_5.tags
|
|
867
867
|
|
|
868
868
|
|
|
869
869
|
def test_event_confidence():
|
|
@@ -64,8 +64,8 @@ async def test_helpers_misc(helpers, scan, bbot_scanner, bbot_httpserver):
|
|
|
64
64
|
assert not helpers.is_subdomain("notreal")
|
|
65
65
|
assert helpers.is_url("http://evilcorp.co.uk/asdf?a=b&c=d#asdf")
|
|
66
66
|
assert helpers.is_url("https://evilcorp.co.uk/asdf?a=b&c=d#asdf")
|
|
67
|
-
assert helpers.is_uri("ftp://evilcorp.co.uk")
|
|
68
|
-
assert helpers.is_uri("http://evilcorp.co.uk")
|
|
67
|
+
assert helpers.is_uri("ftp://evilcorp.co.uk") is True
|
|
68
|
+
assert helpers.is_uri("http://evilcorp.co.uk") is True
|
|
69
69
|
assert helpers.is_uri("evilcorp.co.uk", return_scheme=True) == ""
|
|
70
70
|
assert helpers.is_uri("ftp://evilcorp.co.uk", return_scheme=True) == "ftp"
|
|
71
71
|
assert helpers.is_uri("FTP://evilcorp.co.uk", return_scheme=True) == "ftp"
|
|
@@ -283,7 +283,7 @@ async def test_helpers_misc(helpers, scan, bbot_scanner, bbot_httpserver):
|
|
|
283
283
|
replaced = helpers.search_format_dict(
|
|
284
284
|
{"asdf": [{"wat": {"here": "#{replaceme}!"}}, {500: True}]}, replaceme="asdf"
|
|
285
285
|
)
|
|
286
|
-
assert replaced["asdf"][1][500]
|
|
286
|
+
assert replaced["asdf"][1][500] is True
|
|
287
287
|
assert replaced["asdf"][0]["wat"]["here"] == "asdf!"
|
|
288
288
|
|
|
289
289
|
filtered_dict = helpers.filter_dict(
|
|
@@ -315,7 +315,7 @@ async def test_helpers_misc(helpers, scan, bbot_scanner, bbot_httpserver):
|
|
|
315
315
|
fuzzy=True,
|
|
316
316
|
exclude_keys="modules",
|
|
317
317
|
)
|
|
318
|
-
assert
|
|
318
|
+
assert "secrets_db" not in filtered_dict4["modules"]
|
|
319
319
|
assert "ipneighbor" in filtered_dict4["modules"]
|
|
320
320
|
assert "secret" in filtered_dict4["modules"]["ipneighbor"]
|
|
321
321
|
assert "asdf" not in filtered_dict4["modules"]["ipneighbor"]
|
|
@@ -408,15 +408,15 @@ async def test_helpers_misc(helpers, scan, bbot_scanner, bbot_httpserver):
|
|
|
408
408
|
assert helpers.validators.validate_host("LOCALHOST ") == "localhost"
|
|
409
409
|
assert helpers.validators.validate_host(" 192.168.1.1") == "192.168.1.1"
|
|
410
410
|
assert helpers.validators.validate_host(" Dead::c0dE ") == "dead::c0de"
|
|
411
|
-
assert helpers.validators.soft_validate(" evilCorp.COM", "host")
|
|
412
|
-
assert helpers.validators.soft_validate("!@#$", "host")
|
|
411
|
+
assert helpers.validators.soft_validate(" evilCorp.COM", "host") is True
|
|
412
|
+
assert helpers.validators.soft_validate("!@#$", "host") is False
|
|
413
413
|
with pytest.raises(ValueError):
|
|
414
414
|
assert helpers.validators.validate_host("!@#$")
|
|
415
415
|
# ports
|
|
416
416
|
assert helpers.validators.validate_port(666) == 666
|
|
417
417
|
assert helpers.validators.validate_port(666666) == 65535
|
|
418
|
-
assert helpers.validators.soft_validate(666, "port")
|
|
419
|
-
assert helpers.validators.soft_validate("!@#$", "port")
|
|
418
|
+
assert helpers.validators.soft_validate(666, "port") is True
|
|
419
|
+
assert helpers.validators.soft_validate("!@#$", "port") is False
|
|
420
420
|
with pytest.raises(ValueError):
|
|
421
421
|
helpers.validators.validate_port("asdf")
|
|
422
422
|
# top tcp ports
|
|
@@ -428,7 +428,7 @@ async def test_helpers_misc(helpers, scan, bbot_scanner, bbot_httpserver):
|
|
|
428
428
|
assert top_tcp_ports[-10:] == [65526, 65527, 65528, 65529, 65530, 65531, 65532, 65533, 65534, 65535]
|
|
429
429
|
assert len(top_tcp_ports) == 65535
|
|
430
430
|
assert len(set(top_tcp_ports)) == 65535
|
|
431
|
-
assert all(
|
|
431
|
+
assert all(isinstance(i, int) for i in top_tcp_ports)
|
|
432
432
|
top_tcp_ports = helpers.top_tcp_ports(10, as_string=True)
|
|
433
433
|
assert top_tcp_ports == "80,23,443,21,22,25,3389,110,445,139"
|
|
434
434
|
# urls
|
|
@@ -437,20 +437,20 @@ async def test_helpers_misc(helpers, scan, bbot_scanner, bbot_httpserver):
|
|
|
437
437
|
helpers.validators.validate_url_parsed(" httP://evilcorP.com/asdf?a=b&c=d#e").geturl()
|
|
438
438
|
== "http://evilcorp.com/asdf"
|
|
439
439
|
)
|
|
440
|
-
assert helpers.validators.soft_validate(" httP://evilcorP.com/asdf?a=b&c=d#e", "url")
|
|
441
|
-
assert helpers.validators.soft_validate("!@#$", "url")
|
|
440
|
+
assert helpers.validators.soft_validate(" httP://evilcorP.com/asdf?a=b&c=d#e", "url") is True
|
|
441
|
+
assert helpers.validators.soft_validate("!@#$", "url") is False
|
|
442
442
|
with pytest.raises(ValueError):
|
|
443
443
|
helpers.validators.validate_url("!@#$")
|
|
444
444
|
# severities
|
|
445
445
|
assert helpers.validators.validate_severity(" iNfo") == "INFO"
|
|
446
|
-
assert helpers.validators.soft_validate(" iNfo", "severity")
|
|
447
|
-
assert helpers.validators.soft_validate("NOPE", "severity")
|
|
446
|
+
assert helpers.validators.soft_validate(" iNfo", "severity") is True
|
|
447
|
+
assert helpers.validators.soft_validate("NOPE", "severity") is False
|
|
448
448
|
with pytest.raises(ValueError):
|
|
449
449
|
helpers.validators.validate_severity("NOPE")
|
|
450
450
|
# emails
|
|
451
451
|
assert helpers.validators.validate_email(" bOb@eViLcorp.COM") == "bob@evilcorp.com"
|
|
452
|
-
assert helpers.validators.soft_validate(" bOb@eViLcorp.COM", "email")
|
|
453
|
-
assert helpers.validators.soft_validate("!@#$", "email")
|
|
452
|
+
assert helpers.validators.soft_validate(" bOb@eViLcorp.COM", "email") is True
|
|
453
|
+
assert helpers.validators.soft_validate("!@#$", "email") is False
|
|
454
454
|
with pytest.raises(ValueError):
|
|
455
455
|
helpers.validators.validate_email("!@#$")
|
|
456
456
|
|
|
@@ -533,9 +533,9 @@ async def test_helpers_misc(helpers, scan, bbot_scanner, bbot_httpserver):
|
|
|
533
533
|
truncated_filename.unlink()
|
|
534
534
|
|
|
535
535
|
# misc DNS helpers
|
|
536
|
-
assert helpers.is_ptr("wsc-11-22-33-44-wat.evilcorp.com")
|
|
537
|
-
assert helpers.is_ptr("wsc-11-22-33-wat.evilcorp.com")
|
|
538
|
-
assert helpers.is_ptr("11wat.evilcorp.com")
|
|
536
|
+
assert helpers.is_ptr("wsc-11-22-33-44-wat.evilcorp.com") is True
|
|
537
|
+
assert helpers.is_ptr("wsc-11-22-33-wat.evilcorp.com") is False
|
|
538
|
+
assert helpers.is_ptr("11wat.evilcorp.com") is False
|
|
539
539
|
|
|
540
540
|
## NTLM
|
|
541
541
|
testheader = "TlRMTVNTUAACAAAAHgAeADgAAAAVgorilwL+bvnVipUAAAAAAAAAAJgAmABWAAAACgBjRQAAAA9XAEkATgAtAFMANAAyAE4ATwBCAEQAVgBUAEsAOAACAB4AVwBJAE4ALQBTADQAMgBOAE8AQgBEAFYAVABLADgAAQAeAFcASQBOAC0AUwA0ADIATgBPAEIARABWAFQASwA4AAQAHgBXAEkATgAtAFMANAAyAE4ATwBCAEQAVgBUAEsAOAADAB4AVwBJAE4ALQBTADQAMgBOAE8AQgBEAFYAVABLADgABwAIAHUwOZlfoNgBAAAAAA=="
|
|
@@ -613,8 +613,8 @@ async def test_helpers_misc(helpers, scan, bbot_scanner, bbot_httpserver):
|
|
|
613
613
|
assert len(helpers.get_exception_chain(e)) == 2
|
|
614
614
|
assert len([_ for _ in helpers.get_exception_chain(e) if isinstance(_, KeyboardInterrupt)]) == 1
|
|
615
615
|
assert len([_ for _ in helpers.get_exception_chain(e) if isinstance(_, ValueError)]) == 1
|
|
616
|
-
assert helpers.in_exception_chain(e, (KeyboardInterrupt, asyncio.CancelledError))
|
|
617
|
-
assert helpers.in_exception_chain(e, (TypeError, OSError))
|
|
616
|
+
assert helpers.in_exception_chain(e, (KeyboardInterrupt, asyncio.CancelledError)) is True
|
|
617
|
+
assert helpers.in_exception_chain(e, (TypeError, OSError)) is False
|
|
618
618
|
test_ran = True
|
|
619
619
|
assert test_ran
|
|
620
620
|
test_ran = False
|
|
@@ -627,9 +627,9 @@ async def test_helpers_misc(helpers, scan, bbot_scanner, bbot_httpserver):
|
|
|
627
627
|
assert len(helpers.get_exception_chain(e)) == 2
|
|
628
628
|
assert len([_ for _ in helpers.get_exception_chain(e) if isinstance(_, AttributeError)]) == 1
|
|
629
629
|
assert len([_ for _ in helpers.get_exception_chain(e) if isinstance(_, ValueError)]) == 1
|
|
630
|
-
assert helpers.in_exception_chain(e, (KeyboardInterrupt, asyncio.CancelledError))
|
|
631
|
-
assert helpers.in_exception_chain(e, (KeyboardInterrupt, AttributeError))
|
|
632
|
-
assert helpers.in_exception_chain(e, (AttributeError,))
|
|
630
|
+
assert helpers.in_exception_chain(e, (KeyboardInterrupt, asyncio.CancelledError)) is False
|
|
631
|
+
assert helpers.in_exception_chain(e, (KeyboardInterrupt, AttributeError)) is True
|
|
632
|
+
assert helpers.in_exception_chain(e, (AttributeError,)) is True
|
|
633
633
|
test_ran = True
|
|
634
634
|
assert test_ran
|
|
635
635
|
|
|
@@ -886,7 +886,7 @@ async def test_parameter_validation(helpers):
|
|
|
886
886
|
if helpers.validate_parameter(p, "getparam"):
|
|
887
887
|
assert p in getparam_valid_params and p not in getparam_invalid_params
|
|
888
888
|
else:
|
|
889
|
-
assert p in getparam_invalid_params and not
|
|
889
|
+
assert p in getparam_invalid_params and p not in getparam_valid_params
|
|
890
890
|
|
|
891
891
|
header_valid_params = {
|
|
892
892
|
"name",
|
|
@@ -917,7 +917,7 @@ async def test_parameter_validation(helpers):
|
|
|
917
917
|
if helpers.validate_parameter(p, "header"):
|
|
918
918
|
assert p in header_valid_params and p not in header_invalid_params
|
|
919
919
|
else:
|
|
920
|
-
assert p in header_invalid_params and not
|
|
920
|
+
assert p in header_invalid_params and p not in header_valid_params
|
|
921
921
|
|
|
922
922
|
cookie_valid_params = {
|
|
923
923
|
"name",
|
|
@@ -947,4 +947,4 @@ async def test_parameter_validation(helpers):
|
|
|
947
947
|
if helpers.validate_parameter(p, "cookie"):
|
|
948
948
|
assert p in cookie_valid_params and p not in cookie_invalid_params
|
|
949
949
|
else:
|
|
950
|
-
assert p in cookie_invalid_params and not
|
|
950
|
+
assert p in cookie_invalid_params and p not in cookie_valid_params
|