sobota, 2 grudnia 2023

Monitoring SUFF

Few months ago we talked about Simple Universal Fortigate Fuzzer. Small script created in Python to mutate commands we'd like to send to Forti CLI. Today we'll check how to grab few "log details" for our future analysis. Here we go... 

Today we'll start here:


 

According to previous adventures - our environment will look pretty similar to those described before.

TL;DR:

So starting from this point:
- we have our "fuzzing scenario" ready to go (it could be suff.py script, Mutiny Fuzzer or Burp - your choice)
- we enabled 'logs' (or any 'debug' or 'info' that could be enabled - see manuals for more details; AFAIK from version-to-version some CLI-commands may be different for previous/other versions)

As you can see on the screen above - comparing it to 'previous screens from logs' we were able to saw/generate - this time we can see only a "Return code 11" message. ;)
 

I decided to follow this hint and that's how suff_monitor.py script was created. ;) Feel free to compare your settings and results (and choose your *best command* to get results from suff_monitor.py).

Remember about the "Responsible Disclosure" ;)


More details - soon ;)


See you next time!

Cheers



 

 

 

Brak komentarzy:

Prześlij komentarz