Skip to content
Browse files

Changed the name of the util tool in the README.md

  • Loading branch information...
1 parent 76db098 commit 321196c77c13e3b6d7e85b134067987d870d1338 @PaulSec committed Mar 5, 2014
Showing with 4 additions and 4 deletions.
  1. +4 −4 README.md
View
8 README.md
@@ -57,7 +57,7 @@ However, here is a little summary of those folders :
* ```views folder``` : index file and exploit template
* ```dicos``` : Folder containing all your dictionnaries for those attacks
* ```lib``` : libs specific for my project (custom ones)
-* ```utils``` : folder containing utils such as : form_dumper.py which will launch CSRFT directly.
+* ```utils``` : folder containing utils such as : csrft_utils.py which will launch CSRFT directly.
* ```server.js``` file - the HTTP server
### Configuration file templates
@@ -211,20 +211,20 @@ If you have any trouble creating it, feel free to contact me and I'll try to hel
#### B) I want to automate attacks really easily
-To do so, I developed a Python script **form_dumper.py** in ```utils``` folder that will do this for you.
+To do so, I developed a Python script **csrft_utils.py** in ```utils``` folder that will do this for you.
Here are some basic use cases :
**GET parameter with Dictionnary attack : **
```
-$ python form_dumper.py --url="http://www.vulnerable.com/changePassword.php?newPassword=csvulnerableParameter" --param=newPassword --dico_file="../dicos/passwords.txt"
+$ python csrft_utils.py --url="http://www.vulnerable.com/changePassword.php?newPassword=csvulnerableParameter" --param=newPassword --dico_file="../dicos/passwords.txt"
```
**POST parameter with Special value attack : **
```
-$ python form_dumper.py --form=http://website.com/user.php --id=changePassword --param=password password=newPassword --special_value
+$ python csrft_utils.py --form=http://website.com/user.php --id=changePassword --param=password password=newPassword --special_value
```
### Conclusion

0 comments on commit 321196c

Please sign in to comment.
Something went wrong with that request. Please try again.