Noam Rathaus

Results 96 comments of Noam Rathaus

Generally speaking - not specific to what you are seeing, the JSON based interface, seems to be less prone to issues - not sure if its a metasploit issue or...

I think we need to modify `def match_callback(self, response):` inside `controller.py`

We need to check `response.status` for 200 (HTTP OK) Then add based on the filename found and extensions (such as suggested above) to the queue

I am not sure if it is or not allowed to add to `self.dictionary` (Inside controller) additional items after it already started fuzzing

I noticed that `class Dictionary` doesn't allow adding items to it manually via a func

https://github.com/maurosoria/dirsearch/pull/1376

Here is a short code we can integrate that will generate text (`test.rst`) that that an be provided to sqlmap to do SQL injection testing ``` def test_EndPoint(self): """./sqlmap.py --batch...

1. Flow of problem, I added a `print_status("s: #{s}")`: Outcome of connect: ``` msf6 auxiliary(sniffer/psnuffle) > [*] Sniffing traffic..... [*] s: {:client_host=>"172.17.0.1", :client_port=>"40158", :host=>"172.17.0.2", :port=>"110", :session=>"172.17.0.1:40158-172.17.0.2:110", :ctime=>2024-04-05 19:03:31.052785515 +0300, :mtime=>2024-04-05...

A fix proposed in https://github.com/rapid7/metasploit-framework/issues/18625

No I meant #18625 as my fix directly addresses the banner extraction