Skip to content

Commit f7bce02

Browse files
author
SykieChen
committed
fixed coding doc format
1 parent 390898d commit f7bce02

File tree

1 file changed

+82
-82
lines changed

1 file changed

+82
-82
lines changed

Diff for: docs/CODING.md

+82-82
Original file line numberDiff line numberDiff line change
@@ -149,80 +149,80 @@ JSON 格式的 PoC 类似于完形填空,只需要填写相应的字段的值即
149149
2. PoC JSON 有两个 key,pocInfo 和 pocExecute,分别代表 PoC 信息部分执行体。
150150

151151
```
152-
{
153-
"pocInfo":{},
154-
"pocExecute":{}
155-
}
152+
{
153+
"pocInfo":{},
154+
"pocExecute":{}
155+
}
156156
```
157157

158158
3. 填写 pocInfo 部分:
159159

160160
```
161-
{
162-
"pocInfo":{
163-
"vulID": "poc-2015-0107",
164-
"name": "Openssl 1.0.1 内存读取 信息泄露漏洞",
165-
"protocol": "http",
166-
"author": "test",
167-
"references": ["http://drops.wooyun.org/papers/1381"],
168-
"appName": "OpenSSL",
169-
"appVersion" : "1.0.1~1.0.1f, 1.0.2-beta, 1.0.2-beta1",
170-
"vulType": "Information Disclosure",
171-
"desc" :"OpenSSL是一个强大的安全套接字层密码库。这次漏洞被称为OpenSSL“心脏出血”漏洞,这是关于 OpenSSL 的信息泄漏漏洞导致的安全问题。它使攻击者能够从内存中读取最多64 KB的数据。安全人员表示:无需任何特权信息或身份验证,我们就可以从我们自己的(测试机上)偷来X.509证书的私钥、用户名与密码、聊天工具的消息、电子邮件以及重要的商业文档和通信等数据.",
172-
"samples": ["http://www.baidu.com", "http://www.qq.com"]
173-
},
174-
"pocExecute":{}
175-
}
161+
{
162+
"pocInfo":{
163+
"vulID": "poc-2015-0107",
164+
"name": "Openssl 1.0.1 内存读取 信息泄露漏洞",
165+
"protocol": "http",
166+
"author": "test",
167+
"references": ["http://drops.wooyun.org/papers/1381"],
168+
"appName": "OpenSSL",
169+
"appVersion" : "1.0.1~1.0.1f, 1.0.2-beta, 1.0.2-beta1",
170+
"vulType": "Information Disclosure",
171+
"desc" :"OpenSSL是一个强大的安全套接字层密码库。这次漏洞被称为OpenSSL“心脏出血”漏洞,这是关于 OpenSSL 的信息泄漏漏洞导致的安全问题。它使攻击者能够从内存中读取最多64 KB的数据。安全人员表示:无需任何特权信息或身份验证,我们就可以从我们自己的(测试机上)偷来X.509证书的私钥、用户名与密码、聊天工具的消息、电子邮件以及重要的商业文档和通信等数据.",
172+
"samples": ["http://www.baidu.com", "http://www.qq.com"]
173+
},
174+
"pocExecute":{}
175+
}
176176
```
177177
各字段的含义与 python 属性部分相同。
178178

179179
4. 填写 pocExecute 部分:
180180
pocExecute 分为 verify 和 attack 两部分
181181
```
182-
{
183-
"pocInfo":{},
184-
"pocExecute":{
185-
"verify":[],
186-
"attack":[]
182+
{
183+
"pocInfo":{},
184+
"pocExecute":{
185+
"verify":[],
186+
"attack":[]
187+
}
187188
}
188-
}
189189
```
190190
**填写 verify 部分:**
191191
```
192-
{
193-
"pocInfo":{},
194-
"pocExecute":{
195-
"verify":[
196-
{
197-
"step": "1",
198-
"method": "get",
199-
"vulPath": "/api.php",
200-
"params": "test=123&seebug=1234",
201-
"necessary": "",
202-
"headers": {"cookie": "123"},
203-
"status":"200",
204-
"match": {
205-
"regex": ["baidu","google"],
206-
"time": "time"
207-
}
208-
},
209-
{
210-
"step": "2",
211-
"method": "get",
212-
"vulPath": "/api.php",
213-
"params": "test=seebug",
214-
"necessary": "",
215-
"headers": "",
216-
"status": "200",
217-
"match":{
218-
"regex": [""],
219-
"time": "0.01"
192+
{
193+
"pocInfo":{},
194+
"pocExecute":{
195+
"verify":[
196+
{
197+
"step": "1",
198+
"method": "get",
199+
"vulPath": "/api.php",
200+
"params": "test=123&seebug=1234",
201+
"necessary": "",
202+
"headers": {"cookie": "123"},
203+
"status":"200",
204+
"match": {
205+
"regex": ["baidu","google"],
206+
"time": "time"
207+
}
208+
},
209+
{
210+
"step": "2",
211+
"method": "get",
212+
"vulPath": "/api.php",
213+
"params": "test=seebug",
214+
"necessary": "",
215+
"headers": "",
216+
"status": "200",
217+
"match":{
218+
"regex": [""],
219+
"time": "0.01"
220+
}
220221
}
221-
}
222-
],
223-
"attack":[]
222+
],
223+
"attack":[]
224+
}
224225
}
225-
}
226226
```
227227
>说明:
228228

@@ -252,32 +252,32 @@ JSON 格式的 PoC 类似于完形填空,只需要填写相应的字段的值即
252252

253253
**填写 attack 部分:**
254254
```
255-
{
256-
"pocInfo":{},
257-
"pocExecute":{
258-
"verify":[],
259-
"attack":[
260-
{
261-
"step": "1",
262-
"method": "get",
263-
"vulPath": "/api.php",
264-
"params": "test=123&seebug=1234",
265-
"necessary": "",
266-
"headers": {"cookie": "123"},
267-
"status":"200",
268-
"match": {
269-
"regex": ["baidu","google"],
270-
"time": "time"
271-
},
272-
"result":{
273-
"AdminInfo":{
274-
"Password":"<regex>www(.+)com"
275-
}
276-
}
277-
}
278-
]
255+
{
256+
"pocInfo":{},
257+
"pocExecute":{
258+
"verify":[],
259+
"attack":[
260+
{
261+
"step": "1",
262+
"method": "get",
263+
"vulPath": "/api.php",
264+
"params": "test=123&seebug=1234",
265+
"necessary": "",
266+
"headers": {"cookie": "123"},
267+
"status":"200",
268+
"match": {
269+
"regex": ["baidu","google"],
270+
"time": "time"
271+
},
272+
"result":{
273+
"AdminInfo":{
274+
"Password":"<regex>www(.+)com"
275+
}
276+
}
277+
}
278+
]
279+
}
279280
}
280-
}
281281
```
282282
attack 部分和 verify 部分类似,比 verify 部分多一个 "result".
283283

0 commit comments

Comments
 (0)