在选定ES做插件后,我把入口点选择在了漏洞相关页面,首先在./package.json中做以下配置:... "main": "./extension.js", "contributes": { "views": { "vulList": [ { "command": "elastic", "title": "Indices", "visible": "elastic_visi" } ] } } ......
在选定ES做插件后,我把入口点选择在了漏洞相关页面,首先在./package.json中做以下配置:... "main": "./extension.js", "contributes": { "views": { "vulList": [ { "command": "elastic", "title": "Indices", "visible": "elastic_visi" } ] } } ......
刚好看到Goby的内测版推出了开放式的插件功能,所以抱着试手的想法开发了此款插件。在Goby团队小姐姐的强烈推荐下,分享我此次的开发经验。 插件效果 当扫描出Elasticsearch未授权漏洞后,会在漏洞相关⻚以及资产详情处显示“Indices按钮”,点击即可展开该es服务器的Indices信息: 在搜索框输入关键字可以根据index名称进行模...
hostinfo=" + content.hostinfo; //设置打开新窗口的html文件路径,并传入当前hostinfo信息goby.showif rameDia(path, "Elasticsearch未授权漏洞利用", "600", "600"); //打开一个600*600的if rame窗口,窗口标题为'Elasticsearch未授权漏洞利用'}); goby.registerCommand('elastic_visi', (content) => { //这...
在选定ES做插件后,我把入口点选择在了漏洞相关页面,首先在./package.json中做以下配置: ... "main": "./extension.js", "contributes": { "views": { "vulList": [ { "command": "elastic", "title": "Indices", "visible": "elastic_visi" ...
在选定ES做插件后,我把入口点选择在了漏洞相关页面,首先在./package.json中做以下配置:... "main": "./extension.js", "contributes": { "views": { "vulList": [ { "command": "elastic", "title": "Indices", "visible": "elastic_visi" } ] } } ......
在选定ES做插件后,我把入口点选择在了漏洞相关页面,首先在./package.json中做以下配置: ... "main": "./extension.js", "contributes": { "views": { "vulList": [ { "command": "elastic", "title": "Indices", "visible": "elastic_visi" ...