Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
projectdiscovery
GitHub Repository: projectdiscovery/nuclei
Path: blob/dev/pkg/protocols/common/generators/generators_test.go
2072 views
1
package generators
2
3
import (
4
"strings"
5
"testing"
6
7
"github.com/stretchr/testify/require"
8
"gopkg.in/yaml.v2"
9
10
"github.com/projectdiscovery/nuclei/v3/pkg/catalog/disk"
11
"github.com/projectdiscovery/nuclei/v3/pkg/types"
12
)
13
14
func TestBatteringRamGenerator(t *testing.T) {
15
usernames := []string{"admin", "password"}
16
17
catalogInstance := disk.NewCatalog("")
18
generator, err := New(map[string]interface{}{"username": usernames}, BatteringRamAttack, "", catalogInstance, "", getOptions(false))
19
require.Nil(t, err, "could not create generator")
20
21
iterator := generator.NewIterator()
22
count := 0
23
for {
24
_, ok := iterator.Value()
25
if !ok {
26
break
27
}
28
count++
29
}
30
require.Equal(t, len(usernames), count, "could not get correct batteringram counts")
31
}
32
33
func TestPitchforkGenerator(t *testing.T) {
34
usernames := []string{"admin", "token"}
35
passwords := []string{"password1", "password2", "password3"}
36
37
catalogInstance := disk.NewCatalog("")
38
generator, err := New(map[string]interface{}{"username": usernames, "password": passwords}, PitchForkAttack, "", catalogInstance, "", getOptions(false))
39
require.Nil(t, err, "could not create generator")
40
41
iterator := generator.NewIterator()
42
count := 0
43
for {
44
value, ok := iterator.Value()
45
if !ok {
46
break
47
}
48
count++
49
require.Contains(t, usernames, value["username"], "Could not get correct pitchfork username")
50
require.Contains(t, passwords, value["password"], "Could not get correct pitchfork password")
51
}
52
require.Equal(t, len(usernames), count, "could not get correct pitchfork counts")
53
}
54
55
func TestClusterbombGenerator(t *testing.T) {
56
usernames := []string{"admin"}
57
passwords := []string{"admin", "password", "token"}
58
59
catalogInstance := disk.NewCatalog("")
60
generator, err := New(map[string]interface{}{"username": usernames, "password": passwords}, ClusterBombAttack, "", catalogInstance, "", getOptions(false))
61
require.Nil(t, err, "could not create generator")
62
63
iterator := generator.NewIterator()
64
count := 0
65
for {
66
value, ok := iterator.Value()
67
if !ok {
68
break
69
}
70
count++
71
require.Contains(t, usernames, value["username"], "Could not get correct clusterbomb username")
72
require.Contains(t, passwords, value["password"], "Could not get correct clusterbomb password")
73
}
74
require.Equal(t, 3, count, "could not get correct clusterbomb counts")
75
76
iterator.Reset()
77
count = 0
78
for {
79
value, ok := iterator.Value()
80
if !ok {
81
break
82
}
83
count++
84
require.Contains(t, usernames, value["username"], "Could not get correct clusterbomb username")
85
require.Contains(t, passwords, value["password"], "Could not get correct clusterbomb password")
86
}
87
require.Equal(t, 3, count, "could not get correct clusterbomb counts")
88
}
89
90
func getOptions(allowLocalFileAccess bool) *types.Options {
91
opts := types.DefaultOptions()
92
opts.AllowLocalFileAccess = allowLocalFileAccess
93
return opts
94
}
95
96
func TestParsePayloadsWithAggression(t *testing.T) {
97
testPayload := `linux_path:
98
low:
99
- /etc/passwd
100
medium:
101
- ../etc/passwd
102
- ../../etc/passwd
103
high:
104
- ../../../etc/passwd
105
- ../../../../etc/passwd
106
- ../../../../../etc/passwd`
107
108
var payloads map[string]interface{}
109
err := yaml.NewDecoder(strings.NewReader(testPayload)).Decode(&payloads)
110
require.Nil(t, err, "could not unmarshal yaml")
111
112
aggressionsToValues := map[string][]string{
113
"low": {
114
"/etc/passwd",
115
},
116
"medium": {
117
"/etc/passwd",
118
"../etc/passwd",
119
"../../etc/passwd",
120
},
121
"high": {
122
"/etc/passwd",
123
"../etc/passwd",
124
"../../etc/passwd",
125
"../../../etc/passwd",
126
"../../../../etc/passwd",
127
"../../../../../etc/passwd",
128
},
129
}
130
131
for k, v := range payloads {
132
for aggression, values := range aggressionsToValues {
133
parsed, err := parsePayloadsWithAggression(k, v.(map[interface{}]interface{}), aggression)
134
require.Nil(t, err, "could not parse payloads with aggression")
135
136
gotValues := parsed[k].([]interface{})
137
require.Equal(t, len(values), len(gotValues), "could not get correct number of values")
138
}
139
}
140
}
141
142