|
@@ -18,21 +18,28 @@ ROOT_DIR = CODE_DIR + "../"
|
|
|
RESOURCE_DIR = ROOT_DIR + "resources/"
|
|
|
TEST_DIR = RESOURCE_DIR + "test/"
|
|
|
|
|
|
+
|
|
|
platforms = {"win7", "win10", "winxp", "win8.1", "macos", "linux", "win8", "winvista", "winnt", "win2000"}
|
|
|
+
|
|
|
platform_probability = {"win7": 48.43, "win10": 27.99, "winxp": 6.07, "win8.1": 6.07, "macos": 5.94, "linux": 3.38,
|
|
|
"win8": 1.35, "winvista": 0.46, "winnt": 0.31}
|
|
|
|
|
|
+
|
|
|
x86_nops = {b'\x90', b'\xfc', b'\xfd', b'\xf8', b'\xf9', b'\xf5', b'\x9b'}
|
|
|
+
|
|
|
x86_pseudo_nops = {b'\x97', b'\x96', b'\x95', b'\x93', b'\x92', b'\x91', b'\x99', b'\x4d', b'\x48', b'\x47', b'\x4f',
|
|
|
b'\x40', b'\x41', b'\x37', b'\x3f', b'\x27', b'\x2f', b'\x46', b'\x4e', b'\x98', b'\x9f', b'\x4a',
|
|
|
b'\x44', b'\x42', b'\x43', b'\x49', b'\x4b', b'\x45', b'\x4c', b'\x60', b'\x0e', b'\x1e', b'\x50',
|
|
|
b'\x55', b'\x53', b'\x51', b'\x57', b'\x52', b'\x06', b'\x56', b'\x54', b'\x16', b'\x58', b'\x5d',
|
|
|
b'\x5b', b'\x59', b'\x5f', b'\x5a', b'\x5e', b'\xd6'}
|
|
|
+
|
|
|
forbidden_chars = [b'\x00', b'\x0a', b'\x0d']
|
|
|
|
|
|
+
|
|
|
attacker_port_mapping = {}
|
|
|
+
|
|
|
attacker_ttl_mapping = {}
|
|
|
-
|
|
|
+
|
|
|
generic_attack_names = {"attack", "exploit"}
|
|
|
|
|
|
|