nuclei/pkg/protocols/common/generators/generators_test.go

141 lines
3.9 KiB
Go
Raw Normal View History

2020-12-22 01:02:38 +05:30
package generators
import (
"strings"
2020-12-22 01:02:38 +05:30
"testing"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v2"
2021-11-25 17:09:20 +02:00
"github.com/projectdiscovery/nuclei/v3/pkg/catalog/disk"
"github.com/projectdiscovery/nuclei/v3/pkg/types"
2020-12-22 01:02:38 +05:30
)
func TestBatteringRamGenerator(t *testing.T) {
usernames := []string{"admin", "password"}
2020-12-22 01:21:05 +05:30
catalogInstance := disk.NewCatalog("")
generator, err := New(map[string]interface{}{"username": usernames}, BatteringRamAttack, "", catalogInstance, "", getOptions(false))
2020-12-22 01:21:05 +05:30
require.Nil(t, err, "could not create generator")
iterator := generator.NewIterator()
count := 0
2020-12-26 22:52:33 +05:30
for {
_, ok := iterator.Value()
2020-12-26 22:52:33 +05:30
if !ok {
break
}
2020-12-22 01:21:05 +05:30
count++
}
require.Equal(t, len(usernames), count, "could not get correct batteringram counts")
2020-12-22 01:21:05 +05:30
}
func TestPitchforkGenerator(t *testing.T) {
usernames := []string{"admin", "token"}
2021-09-01 20:03:53 +05:30
passwords := []string{"password1", "password2", "password3"}
2020-12-22 01:21:05 +05:30
catalogInstance := disk.NewCatalog("")
generator, err := New(map[string]interface{}{"username": usernames, "password": passwords}, PitchForkAttack, "", catalogInstance, "", getOptions(false))
2020-12-22 01:21:05 +05:30
require.Nil(t, err, "could not create generator")
iterator := generator.NewIterator()
count := 0
2020-12-26 22:52:33 +05:30
for {
value, ok := iterator.Value()
if !ok {
break
}
2020-12-22 01:21:05 +05:30
count++
require.Contains(t, usernames, value["username"], "Could not get correct pitchfork username")
require.Contains(t, passwords, value["password"], "Could not get correct pitchfork password")
}
2021-09-01 20:03:53 +05:30
require.Equal(t, len(usernames), count, "could not get correct pitchfork counts")
2020-12-22 01:21:05 +05:30
}
func TestClusterbombGenerator(t *testing.T) {
usernames := []string{"admin"}
passwords := []string{"admin", "password", "token"}
catalogInstance := disk.NewCatalog("")
generator, err := New(map[string]interface{}{"username": usernames, "password": passwords}, ClusterBombAttack, "", catalogInstance, "", getOptions(false))
2020-12-22 01:02:38 +05:30
require.Nil(t, err, "could not create generator")
iterator := generator.NewIterator()
2020-12-22 01:21:05 +05:30
count := 0
2020-12-26 22:52:33 +05:30
for {
value, ok := iterator.Value()
if !ok {
break
}
count++
require.Contains(t, usernames, value["username"], "Could not get correct clusterbomb username")
require.Contains(t, passwords, value["password"], "Could not get correct clusterbomb password")
}
require.Equal(t, 3, count, "could not get correct clusterbomb counts")
iterator.Reset()
count = 0
for {
value, ok := iterator.Value()
if !ok {
break
}
2020-12-22 01:21:05 +05:30
count++
require.Contains(t, usernames, value["username"], "Could not get correct clusterbomb username")
require.Contains(t, passwords, value["password"], "Could not get correct clusterbomb password")
2020-12-22 01:02:38 +05:30
}
2020-12-22 01:21:05 +05:30
require.Equal(t, 3, count, "could not get correct clusterbomb counts")
2020-12-22 01:02:38 +05:30
}
func getOptions(allowLocalFileAccess bool) *types.Options {
opts := types.DefaultOptions()
opts.AllowLocalFileAccess = allowLocalFileAccess
return opts
}
func TestParsePayloadsWithAggression(t *testing.T) {
testPayload := `linux_path:
low:
- /etc/passwd
medium:
- ../etc/passwd
- ../../etc/passwd
high:
- ../../../etc/passwd
- ../../../../etc/passwd
- ../../../../../etc/passwd`
var payloads map[string]interface{}
err := yaml.NewDecoder(strings.NewReader(testPayload)).Decode(&payloads)
require.Nil(t, err, "could not unmarshal yaml")
aggressionsToValues := map[string][]string{
"low": {
"/etc/passwd",
},
"medium": {
"/etc/passwd",
"../etc/passwd",
"../../etc/passwd",
},
"high": {
"/etc/passwd",
"../etc/passwd",
"../../etc/passwd",
"../../../etc/passwd",
"../../../../etc/passwd",
"../../../../../etc/passwd",
},
}
for k, v := range payloads {
for aggression, values := range aggressionsToValues {
parsed, err := parsePayloadsWithAggression(k, v.(map[interface{}]interface{}), aggression)
require.Nil(t, err, "could not parse payloads with aggression")
gotValues := parsed[k].([]interface{})
require.Equal(t, len(values), len(gotValues), "could not get correct number of values")
}
}
}