|
@@ -171,8 +171,6 @@ class SQLiAttack(BaseAttack.BaseAttack):
|
|
|
eth_frame.payload = b''
|
|
|
ip_pkt.payload = b''
|
|
|
tcp_pkt.payload = b''
|
|
|
-
|
|
|
-
|
|
|
|
|
|
if len(str_http_pkt) > 0:
|
|
|
|
|
@@ -181,6 +179,8 @@ class SQLiAttack(BaseAttack.BaseAttack):
|
|
|
str_http_pkt = str_http_pkt.replace(orig_ip_dst, target_host)
|
|
|
str_http_pkt = str_http_pkt.replace("\\n", "\n")
|
|
|
str_http_pkt = str_http_pkt.replace("\\r", "\r")
|
|
|
+ str_tcp_seg = str_tcp_seg.replace("\\t", "\t")
|
|
|
+ str_tcp_seg = str_tcp_seg.replace("\\\'", "\'")
|
|
|
|
|
|
new_pkt = (eth_frame / ip_pkt/ tcp_pkt / str_http_pkt)
|
|
|
new_pkt.time = timestamp_next_pkt
|
|
@@ -211,6 +211,8 @@ class SQLiAttack(BaseAttack.BaseAttack):
|
|
|
str_http_pkt = str_http_pkt.replace(orig_ip_dst, target_host)
|
|
|
str_http_pkt = str_http_pkt.replace("\\n", "\n")
|
|
|
str_http_pkt = str_http_pkt.replace("\\r", "\r")
|
|
|
+ str_tcp_seg = str_tcp_seg.replace("\\t", "\t")
|
|
|
+ str_tcp_seg = str_tcp_seg.replace("\\\'", "\'")
|
|
|
|
|
|
new_pkt = (eth_frame / ip_pkt / tcp_pkt / str_http_pkt)
|
|
|
timestamp_next_pkt = timestamp_next_pkt + uniform(replyDelay, 2 * replyDelay)
|