mmelo-yottaa
mmelo-yottaa
latest version of CSP Auditor continues to lock-up the latest version of Burp Suite CE - v2021.2.1 - guessing this extension is not useful to BS users any more...
Any estimate when https://github.com/SpiderLabs/ModSecurity-nginx/pull/198 (and https://github.com/SpiderLabs/ModSecurity/pull/2304) might merge into master? we could definitely use this fix. thank you!!!
ok thanks @zimmerle
yeah just stumbled on that - https://github.com/lizrice/ebpf-networking/blob/main/network.py
``` import os from time import sleep from pyroute2 import IPRoute from bcc import BPF interface = "eth0" b = BPF(src_file="network.c") b.attach_kprobe(event="tcp_v4_connect", fn_name="tcpconnect") print("Ready") try: b.trace_print() except KeyboardInterrupt: print("unloading") exit()...
you can try those, untested but the code is straightforward
[2.1.4.zip](https://github.com/haproxytech/spoa-mirror/files/4857985/2.1.4.zip) zipfile includes: haproxy and mirror config files, the HTTP request causing the SEGV, debug tracing showing the SEGV (line 63). thank you