Path: blob/dev/pkg/tmplexec/flow/testcases/noflow-request-condition-payloads.yaml
4538 views
id: noflow-request-condition-payloads12info:3name: No flow with request condition and payloads4author: test5severity: info67http:8- raw:9- |10GET /step1 HTTP/1.111Host: {{Hostname}}1213- |14POST /login HTTP/1.115Host: {{Hostname}}16Content-Type: application/x-www-form-urlencoded1718username={{username}}&password={{password}}1920- |21GET /admin?token={{auth}} HTTP/1.122Host: {{Hostname}}2324attack: pitchfork25payloads:26username:27- admin28password:29- secret1233031matchers-condition: and32matchers:33- type: word34part: body_235words:36- "login-ok"3738- type: word39part: body_340words:41- "admin-ok"4243extractors:44- type: regex45name: auth46internal: true47part: header_248group: 149regex:50- 'X-Auth-Token: ([a-z0-9]+)'515253