Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Penetration/Exploit/Hijacking Tools decoder #102

Merged
merged 2 commits into from
Aug 15, 2017

Conversation

1modm
Copy link
Contributor

@1modm 1modm commented Jun 20, 2017

No description provided.

@dev195
Copy link
Contributor

dev195 commented Jul 7, 2017

This is a decoder that looks useful! Needs a bit of cleanup, though.

First, I would recommend updating the filter field to include a port number. HTTPDecoder spams a lot of warning messages if traffic isn't formatted properly. For example, SSL traffic on port 443 can generate a lot of warnings like this:

WARNING:peht:invalid http method: '\x17\x03\x01\x01'

Also, I don't think lines like this work the way you think they do. 'cmd' and 'ProcessBuilder' would never be checked. For example:

>>> ('A' and 'B' and 'C')
'C'
>>> ('A' and 'B' and 'C') in "test"
False
>>> ('A' and 'B' and 'C') in "test-A"
False
>>> ('A' and 'B' and 'C') in "test-C"
True

@1modm
Copy link
Contributor Author

1modm commented Jul 20, 2017

yes you are right, I tried to fix this

@dev195
Copy link
Contributor

dev195 commented Aug 15, 2017

Sorry for the delay. We wanted to collect some data to test the decoder against before accepting it, and that took a little while.

The decoder seems to be working, so we'll accept the pull request. Thanks for the submission!

@dev195 dev195 merged commit d3e447e into USArmyResearchLab:master Aug 15, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants