-
Notifications
You must be signed in to change notification settings - Fork 2.5k
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add exploit mode #776
Comments
Hi @iiiusky, Thanks for sharing this idea, just wanted to dig more into this, how this is different from existing payload support? for example have a look at this template where you can define a variable and call in the request section - |
Hi @ehsandeep , Similar to the following:
|
Okay now I get it, so you are looking to add support for taking variable input via CLI at run time? |
Yes, so you can make more use in the poc. |
In fact, in normal mode, use the built-in default value, and in exploit mode, use the value entered in the console |
Got it, this should be already supported in - #641 and will be available to use as soon as we finalize the implementation and merge it into the branch. |
This method seems to require the user to manually specify a variable similar to this format, right? key=value, this is a way, but the more troublesome thing is that you have to manually open the yaml file every time to view its variables. I think interactive input is better under certain circumstances, but if it is in batch automation mode, it is really not Too friendly. |
@iiiusky I mean say, the above PR will allow us to feed variable value with user input in CLI and does not require editing template file, it's WIP. |
The source code of github.com/projectdiscovery/starlight is not open yet, right? I may not be able to express it clearly. What I want to express is that if you run a poc plug-in separately, you can interactively let users enter the values of different variables. In this case, the user does not need to open yaml to see what is available. Variables, in the interaction, will loop all the extracted variable lists, because they are of map[string]interface{} type |
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
Is your feature request related to a problem? Please describe.
I want to add a new exploit mode
Describe the solution you'd like
The verified vulnerabilities can be extended to make them more widely used in more situations
Can you join exp mode:
The conceptual verification warehouse is here (
except CVE-2017-12615.yaml, I will list it separately
)https://github.com/iiiusky/nuclei/tree/exp-concept
I changed the following files:
The content of the changed file is as follows:
iiiusky@a4f86d2
CVE-2017-12615.yaml file content
The text was updated successfully, but these errors were encountered: