functionality for time base attack #1408
-
|
Hi team. Do we have a possibility to check time based attacks ? e.x. how i can check if request executes more than 30 secs ? Thanks. |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 8 replies
-
|
@savushkin-yauheni https://nuclei.projectdiscovery.io/template-examples/http/#time-based-matcher |
Beta Was this translation helpful? Give feedback.
-
|
Hey guys, I noticed that this in master now (which is awesome, thanks!). Can this be used to compare response time between N different requests? I send the first request with a condition that should take N (unknown) seconds to be processed If I have those increasing times, we can consider this as a TRUE vulnerable host. I have an example of this type of situation with palo alto integer overflow detection method described by Orange Tsai in the following link: https://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html I'm trying to create a template for it without crashing the instance, therefore, this time based comparision whould be vital. Please, let me know your thoughts @ehsandeep ty |
Beta Was this translation helpful? Give feedback.
-
|
yep, it works! |
Beta Was this translation helpful? Give feedback.
-
|
Not work for me with raw and {{BaseURL}} and status_code==200 && duration>=3 : requests:
|
Beta Was this translation helpful? Give feedback.
@savushkin-yauheni https://nuclei.projectdiscovery.io/template-examples/http/#time-based-matcher