mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2025-12-18 20:35:24 +00:00
* introducing execution id * wip * . * adding separate execution context id * lint * vet * fixing pg dialers * test ignore * fixing loader FD limit * test * fd fix * wip: remove CloseProcesses() from dev merge * wip: fix merge issue * protocolstate: stop memguarding on last dialer delete * avoid data race in dialers.RawHTTPClient * use shared logger and avoid race conditions * use shared logger and avoid race conditions * go mod * patch executionId into compiled template cache * clean up comment in Parse * go mod update * bump echarts * address merge issues * fix use of gologger * switch cmd/nuclei to options.Logger * address merge issues with go.mod * go vet: address copy of lock with new Copy function * fixing tests * disable speed control * fix nil ExecuterOptions * removing deprecated code * fixing result print * default logger * cli default logger * filter warning from results * fix performance test * hardcoding path * disable upload * refactor(runner): uses `Warning` instead of `Print` for `pdcpUploadErrMsg` Signed-off-by: Dwi Siswanto <git@dw1.io> * Revert "disable upload" This reverts commit 114fbe6663361bf41cf8b2645fd2d57083d53682. * Revert "hardcoding path" This reverts commit cf12ca800e0a0e974bd9fd4826a24e51547f7c00. --------- Signed-off-by: Dwi Siswanto <git@dw1.io> Co-authored-by: Mzack9999 <mzack9999@protonmail.com> Co-authored-by: Dwi Siswanto <git@dw1.io> Co-authored-by: Dwi Siswanto <25837540+dwisiswant0@users.noreply.github.com>
115 lines
3.7 KiB
Go
115 lines
3.7 KiB
Go
package main
|
|
|
|
import (
|
|
"crypto/sha256"
|
|
"encoding/hex"
|
|
"flag"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"github.com/projectdiscovery/gologger"
|
|
"github.com/projectdiscovery/gologger/levels"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/catalog/config"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/catalog/disk"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/templates"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/templates/signer"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/types"
|
|
fileutil "github.com/projectdiscovery/utils/file"
|
|
folderutil "github.com/projectdiscovery/utils/folder"
|
|
)
|
|
|
|
var (
|
|
appConfigDir = folderutil.AppConfigDirOrDefault(".config", "nuclei")
|
|
defaultCertFile = filepath.Join(appConfigDir, "keys", "nuclei-user.crt")
|
|
defaultPrivKey = filepath.Join(appConfigDir, "keys", "nuclei-user-private-key.pem")
|
|
)
|
|
|
|
var (
|
|
template string
|
|
cert string
|
|
privKey string
|
|
)
|
|
|
|
func main() {
|
|
flag.StringVar(&template, "template", "", "template to sign (file only)")
|
|
flag.StringVar(&cert, "cert", defaultCertFile, "certificate file")
|
|
flag.StringVar(&privKey, "priv-key", defaultPrivKey, "private key file")
|
|
flag.Parse()
|
|
|
|
config.DefaultConfig.LogAllEvents = true
|
|
gologger.DefaultLogger.SetMaxLevel(levels.LevelVerbose)
|
|
|
|
if template == "" {
|
|
gologger.Fatal().Msg("template is required")
|
|
}
|
|
if !fileutil.FileExists(template) {
|
|
gologger.Fatal().Msgf("template file %s does not exist or not a file", template)
|
|
}
|
|
|
|
// get signer
|
|
tmplSigner, err := signer.NewTemplateSignerFromFiles(cert, privKey)
|
|
if err != nil {
|
|
gologger.Fatal().Msgf("failed to create signer: %s", err)
|
|
}
|
|
gologger.Info().Msgf("Template Signer: %v\n", tmplSigner.Identifier())
|
|
|
|
// read file
|
|
bin, err := os.ReadFile(template)
|
|
if err != nil {
|
|
gologger.Fatal().Msgf("failed to read template file %s: %s", template, err)
|
|
}
|
|
|
|
// extract signature and content
|
|
sig, content := signer.ExtractSignatureAndContent(bin)
|
|
hash := sha256.Sum256(content)
|
|
|
|
gologger.Info().Msgf("Signature Details:")
|
|
gologger.Info().Msgf("----------------")
|
|
gologger.Info().Msgf("Signature: %s", sig)
|
|
gologger.Info().Msgf("Content Hash (SHA256): %s\n", hex.EncodeToString(hash[:]))
|
|
|
|
execOpts := defaultExecutorOpts(template)
|
|
|
|
tmpl, err := templates.Parse(template, nil, execOpts)
|
|
if err != nil {
|
|
gologger.Fatal().Msgf("failed to parse template: %s", err)
|
|
}
|
|
gologger.Info().Msgf("Template Verified: %v\n", tmpl.Verified)
|
|
|
|
if !tmpl.Verified {
|
|
gologger.Info().Msgf("------------------------")
|
|
gologger.Info().Msg("Template is not verified, signing template")
|
|
if err := templates.SignTemplate(tmplSigner, template); err != nil {
|
|
gologger.Fatal().Msgf("Failed to sign template: %s", err)
|
|
}
|
|
// verify again by reading file what the new signature and hash is
|
|
bin2, err := os.ReadFile(template)
|
|
if err != nil {
|
|
gologger.Fatal().Msgf("failed to read signed template file %s: %s", template, err)
|
|
}
|
|
sig2, content2 := signer.ExtractSignatureAndContent(bin2)
|
|
hash2 := sha256.Sum256(content2)
|
|
|
|
gologger.Info().Msgf("Updated Signature Details:")
|
|
gologger.Info().Msgf("------------------------")
|
|
gologger.Info().Msgf("Signature: %s", sig2)
|
|
gologger.Info().Msgf("Content Hash (SHA256): %s\n", hex.EncodeToString(hash2[:]))
|
|
}
|
|
gologger.Info().Msgf("✓ Template signed & verified successfully")
|
|
}
|
|
|
|
func defaultExecutorOpts(templatePath string) *protocols.ExecutorOptions {
|
|
// use parsed options when initializing signer instead of default options
|
|
options := types.DefaultOptions()
|
|
templates.UseOptionsForSigner(options)
|
|
catalog := disk.NewCatalog(filepath.Dir(templatePath))
|
|
executerOpts := &protocols.ExecutorOptions{
|
|
Catalog: catalog,
|
|
Options: options,
|
|
TemplatePath: templatePath,
|
|
Parser: templates.NewParser(),
|
|
}
|
|
return executerOpts
|
|
}
|