Module: Ronin::Vulns::URLScanner
- Defined in:
- lib/ronin/vulns/url_scanner.rb
Overview
Top-level module which scans a URL for all web vulnerabilities.
Class Method Summary collapse
-
.scan(url, lfi: {}, rfi: {}, sqli: {}, ssti: {}, reflected_xss: {}, open_redirect: {}, **kwargs) {|vuln| ... } ⇒ Array<LFI, RFI, SQLI, SSTI, ReflectedXSS, OpenRedirect>
Scans a URL for web vulnerabilities.
-
.test(url, **kwargs) ⇒ LFI, ...
Tests the URL for a Web vulnerability and returns the first found vulnerability.
Class Method Details
.scan(url, lfi: {}, rfi: {}, sqli: {}, ssti: {}, reflected_xss: {}, open_redirect: {}, **kwargs) {|vuln| ... } ⇒ Array<LFI, RFI, SQLI, SSTI, ReflectedXSS, OpenRedirect>
Scans a URL for web vulnerabilities.
The HTTP request mehtod for each request.
161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 |
# File 'lib/ronin/vulns/url_scanner.rb', line 161 def self.scan(url, lfi: {}, rfi: {}, sqli: {}, ssti: {}, reflected_xss: {}, open_redirect: {}, **kwargs, &block) vulns = [] if lfi vulns.concat(LFI.scan(url,**kwargs,**lfi,&block)) end if rfi vulns.concat(RFI.scan(url,**kwargs,**rfi,&block)) end if sqli vulns.concat(SQLI.scan(url,**kwargs,**sqli,&block)) end if ssti vulns.concat(SSTI.scan(url,**kwargs,**ssti,&block)) end if reflected_xss vulns.concat(ReflectedXSS.scan(url,**kwargs,**reflected_xss,&block)) end if open_redirect vulns.concat(OpenRedirect.scan(url,**kwargs,**open_redirect,&block)) end return vulns end |
.test(url, **kwargs) ⇒ LFI, ...
Tests the URL for a Web vulnerability and returns the first found vulnerability.
212 213 214 215 216 217 218 |
# File 'lib/ronin/vulns/url_scanner.rb', line 212 def self.test(url,**kwargs) scan(url,**kwargs) do |vuln| return vuln end return nil end |