Path: blob/dev/pkg/tmplexec/flow/testcases/flow-request-condition-payloads.yaml
4538 views
id: flow-request-condition-payloads12info:3name: Flow with request condition and payloads4author: test5severity: info67flow: http()89http:10- raw:11- |12GET /step1 HTTP/1.113Host: {{Hostname}}1415- |16POST /login HTTP/1.117Host: {{Hostname}}18Content-Type: application/x-www-form-urlencoded1920username={{username}}&password={{password}}2122- |23GET /admin?token={{auth}} HTTP/1.124Host: {{Hostname}}2526attack: pitchfork27payloads:28username:29- admin30password:31- secret1233233matchers-condition: and34matchers:35- type: word36part: body_237words:38- "login-ok"3940- type: word41part: body_342words:43- "admin-ok"4445extractors:46- type: regex47name: auth48internal: true49part: header_250group: 151regex:52- 'X-Auth-Token: ([a-z0-9]+)'535455