forked from CERT-Polska/Artemis-modules-extra
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathextra_modules_config.py
75 lines (66 loc) · 2.65 KB
/
extra_modules_config.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
import decouple
class ExtraModulesConfig:
# This is the maximum number of correct certificate domain names to show when we show the
# "The following addresses return SSL/TLS certificates for different domains" message.
MAX_CERTIFICATE_NAMES_TO_SHOW = decouple.config("MAX_CERTIFICATE_NAMES_TO_SHOW", default=10, cast=int)
# Subdomains where the SSL configuration shouldn't be checked.
SUBDOMAINS_TO_SKIP_SSL_CHECKS = decouple.config(
"SUBDOMAINS_TO_SKIP_SSL_CHECKS",
default=",".join(
[
# Don't verify these, as they are misconfigured a lot of times because the users don't use them via HTTP.
"autodiscover",
"smtp",
"ftp",
"pop",
"pop3",
"imap",
"mx",
# The following often contains archived websites - at CERT PL we don't require them to have properly configured
# SSL certificates.
"old",
]
),
cast=decouple.Csv(str),
)
# The minimum response length to report SSL problems. This is to skip reporting e.g. "<html>\n</html>" or other
# non-interesting sites.
SSL_CHECKS_MIN_RESPONSE_LENGTH = decouple.config(
"SSL_CHECKS_MIN_RESPONSE_LENGTH",
cast=int,
default=50,
)
# Max URLs to be visited by sqlmap
SQLMAP_MAX_URLS_TO_CRAWL = decouple.config(
"SQLMAP_MAX_URLS_TO_CRAWL",
cast=int,
default=25,
)
# Command-line options that will be passed to sqlmap
SQLMAP_COMMAND_LINE_OPTIONS = decouple.config(
"SQLMAP_COMMAND_LINE_OPTIONS",
cast=decouple.Csv(str),
default=",".join(
[
"--technique",
"BU",
"--skip-waf",
"--skip-heuristics",
]
),
)
# Tamper scripts to be used by sqlmap (sqlmap will be executed once per tamper script + once without any)
SQLMAP_TAMPER_SCRIPTS = decouple.config(
"SQLMAP_TAMPER_SCRIPTS",
cast=decouple.Csv(str),
default=",".join(["chardoubleencode"]),
)
# Timeout counted in seconds, after which the what-vpn module terminates a connection and starts using the next sniffer.
# Some of VPN gateways do not respond in any way to the HTTP(S) requests, so the timeout variable should be optimized in
# order to avoid false negatives while not blocking the task for too long.
WHATVPN_TIMEOUT_SECONDS = decouple.config(
"WHATVPN_TIMEOUT_SECONDS",
default="2",
)
# WPScan API key
WPSCAN_API_KEY = decouple.config("WPSCAN_API_KEY", default=None)