Skip to content

dome9/protego-attackdemo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Attack Demo

Run:

$ python demo.py

To get the menu: alt menu

Or see options:

optional arguments:
  -h, --help            show this help message and exit
  
  -p PROFILE, --profile PROFILE      Attackers AWS profile name (as appears in ~/.aws/credentials)
  -r REGION, --region REGION         The region in deployed the DVSA on (default is `us-east-1`)
  -e ENDPOINT, --endpoint ENDPOINT   The endpoint (API Gateway) for the lambda with XXE Vulnerability
  -a ACCOUNT, --account ACCOUNT      The AWS Account ID on which DVSA is installed
  -x PROXY, --proxy PROXY            [HOST]:[PORT]
  -v, --verbose                      Print additional information to stdout
  -d ATTACK, --attack ATTACK         Run attack directly. Use: [xxe, injection]
  • Examples:

$ python demo.py --endpoint https://xxxxxxxxxxx.execute-api.us-east-1.amazonaws.com/dev/xml

$ python demo.py --endpoint https://xxxxxxxxxxx.execute-api.us-east-1.amazonaws.com/dev/xml --attack xxe

$ python demo.py --attack injection --account 123123123123

About

xxe, injection, script

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages