Projects STRLCPY CVS Commits 33625bac
🤬
  • ■ ■ ■ ■ ■
    README.md
    skipped 66 lines
    67 67  </h3>
    68 68   
    69 69   
    70  -The upper right corner of the above picture shows the Run, Save, and Refresh buttons, which are used to debug PoC scripts. The syntax of the script is similar to Golang. The **cvs structure** in the picture will be automatically generated by the CVS scanner based on target.json, without the need for implementation. It is only convenient for testing during debugging and can be declared by oneself. This picture shows the writing process of the CVE-2022-46169 no echo vulnerability test script. CVS IDE provides the **debug function** for printing debugging information, which is compatible with **fmt.Printf** in the go language The usage is shown in the text box below. For vulnerabilities with echoes, the existence of the vulnerability can be confirmed directly by returning true. For scenarios that require some information to be returned, such as password cracking, a string can be returned to save the result, which is located in the info field of the result. json generated by the CVS scanner. The functions in the PoC script are compatible with the help functions of Nuclei, please refer to them for details https://docs.projectdiscovery.io/templates/reference/helper-functions .In addition, CVS also provides a network library, please refer to https://github.com/Safe3/CVS/blob/main/library.md for details,so it is very convenient to convert Nuclei's vulnerability template into CVS's PoC. For more PoC examples, please refer to the yaml file in the poc directory of the CVS scanner.
     70 +The upper right corner of the above picture shows the Run, Save, and Refresh buttons, which are used to debug PoC scripts. The syntax of the script is similar to Golang. The **cvs structure** in the picture will be automatically generated by the CVS scanner based on target.json, without the need for implementation. It is only convenient for testing during debugging and can be declared by oneself.
     71 + 
     72 +This picture shows the writing process of the CVE-2022-46169 no echo vulnerability test script. CVS IDE provides the **debug function** for printing debugging information, which is compatible with **fmt.Printf** in the go language The usage is shown in the text box below. For vulnerabilities with echoes, the existence of the vulnerability can be confirmed directly by returning true. For scenarios that require some information to be returned, such as password cracking, a string can be returned to save the result, which is located in the info field of the result.json generated by the CVS scanner.
     73 + 
     74 +The functions in the PoC script are compatible with the help functions of Nuclei, please refer to them for details https://docs.projectdiscovery.io/templates/reference/helper-functions .In addition, CVS also provides a network library, please refer to https://github.com/Safe3/CVS/blob/main/library.md for details,so it is very convenient to convert Nuclei's vulnerability template into CVS's PoC. For more PoC examples, please refer to the yaml file in the poc directory of the CVS scanner.
    71 75   
    72 76  ### Setting up an OOB server
    73 77   
    skipped 76 lines
  • ■ ■ ■ ■ ■
    README_CN.md
    skipped 70 lines
    71 71   <img src="https://github.com/Safe3/CVS/blob/main/ide.png" alt="IDE" width="700px">
    72 72   <br>
    73 73  </h3>
    74  -上图右上角分别为运行、保存、刷新按钮,运行按钮用于调试PoC脚本,该脚本语法类似golang,图中**cvs结构体**在CVS扫描器中会自动根据target.json生成,无需实现,仅在调试时方便测试,自行声明。此图展示的是CVE-2022-46169无回显漏洞测试脚本的编写过程,图中提供了**debug函数**用于打印调试信息,该函数兼容go语言中fmt.Printf的用法,结果显示于下方方框。对于有回显的漏洞可以直接通过**return true**返回来确认漏洞存在,对于需要返回一些信息的场景,如密码破解等,可以return一个字符串来保存结果,结果位于CVS扫描器生成的result.json中的info字段中。PoC脚本中的函数兼容Nuclei的帮助函数,详见https://docs.projectdiscovery.io/templates/reference/helper-functions ,另外CVS也提供了网络请求相关lib库,详见https://github.com/Safe3/CVS/blob/main/library.md 。所以你可以很方便的将Nuclei的漏洞模板转换成CVS的PoC。更多PoC样例可参考CVS扫描器poc目录下的yaml文件。
     74 +上图右上角分别为运行、保存、刷新按钮,运行按钮用于调试PoC脚本,该脚本语法类似golang,图中 **cvs结构体** 在CVS扫描器中会自动根据target.json生成,无需实现,仅在调试时方便测试,自行声明。
     75 + 
     76 +此图展示的是CVE-2022-46169无回显漏洞测试脚本的编写过程,图中提供了 **debug函数** 用于打印调试信息,该函数兼容go语言中fmt.Printf的用法,结果显示于下方方框。对于有回显的漏洞可以直接通过 **return true** 返回来确认漏洞存在,对于需要返回一些信息的场景,如密码破解等,可以return一个字符串来保存结果,结果位于CVS扫描器生成的result.json中的info字段中。
     77 + 
     78 +PoC脚本中的函数兼容Nuclei的帮助函数,详见https://docs.projectdiscovery.io/templates/reference/helper-functions ,另外CVS也提供了网络请求相关lib库,详见https://github.com/Safe3/CVS/blob/main/library.md 。所以你可以很方便的将Nuclei的漏洞模板转换成CVS的PoC。更多PoC样例可参考CVS扫描器poc目录下的yaml文件。
    75 79   
    76 80  ### 架设OOB服务器
    77 81   
    skipped 76 lines
Please wait...
Page is in error, reload to recover