From 3a16c0d586ec691a333cee92cf3504f8f1e4e5ba Mon Sep 17 00:00:00 2001 From: Raoul Scholtes Date: Sun, 13 Sep 2020 18:55:07 +0200 Subject: [PATCH] modified description to match ; TID2.0-beta release point --- modules/VlnAnalysis/Severe/pathtrav.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/VlnAnalysis/Severe/pathtrav.py b/modules/VlnAnalysis/Severe/pathtrav.py index e75f29f6..6ea822da 100644 --- a/modules/VlnAnalysis/Severe/pathtrav.py +++ b/modules/VlnAnalysis/Severe/pathtrav.py @@ -18,7 +18,7 @@ from core.Core.colors import O, GR, R, G, B, C, W, color, RD info = "This module tries to find path traversal vulnerabilities on the target webpage. It is capable of in-path, as well as query attacks, and features two modes: a simple mode, recovering all possible paths, and a powerful evasion engine, attacking a specific path. Also, the user can provide cookies and his own dictionary." -searchinfo = "Path Traversal Finder" +searchinfo = "Advanced Path Traversal Scanning" properties = {"DIRECTORY":["Sensitive directory. Attack target will be http://site.com/sensitive", " "], "ATTACK":["Attack vector to be used (1: Query; 2: Path; 3: Cookie; 4: POST; 5: crawler-all", " "], "COOKIE":["File containing Authentication Cookie to be used", " "],