mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2026-01-31 15:53:10 +08:00
* feat: Assume HTTP(S) server on high port is HTTP * feat: enhance http probing tests * improving issue description --------- Co-authored-by: Matej Smycka <smycka@ics.muni.cz> Co-authored-by: Mzack9999 <mzack9999@protonmail.com>
91 lines
2.2 KiB
Go
91 lines
2.2 KiB
Go
package utils
|
|
|
|
import (
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/projectdiscovery/httpx/common/httpx"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/input/types"
|
|
"github.com/projectdiscovery/useragent"
|
|
sliceutil "github.com/projectdiscovery/utils/slice"
|
|
)
|
|
|
|
var commonHttpPorts = []string{
|
|
"80",
|
|
"8080",
|
|
}
|
|
var defaultHttpSchemes = []string{
|
|
"https",
|
|
"http",
|
|
}
|
|
var httpFirstSchemes = []string{
|
|
"http",
|
|
"https",
|
|
}
|
|
|
|
// determineSchemeOrder for the input
|
|
func determineSchemeOrder(input string) []string {
|
|
if _, port, err := net.SplitHostPort(input); err == nil {
|
|
// if input has port that is commonly used for HTTP, return http then https
|
|
if sliceutil.Contains(commonHttpPorts, port) {
|
|
return httpFirstSchemes
|
|
}
|
|
|
|
// As of 10/2025 shodan shows that ports > 1024 are more likely to expose HTTP
|
|
// hence we test first http then https on higher ports
|
|
// if input has port > 1024, return http then https
|
|
if port, err := strconv.Atoi(port); err == nil && port > 1024 {
|
|
return httpFirstSchemes
|
|
}
|
|
}
|
|
|
|
return defaultHttpSchemes
|
|
}
|
|
|
|
// ProbeURL probes the scheme for a URL.
|
|
// http schemes are selected with heuristics
|
|
// If none succeeds, probing is abandoned for such URLs.
|
|
func ProbeURL(input string, httpxclient *httpx.HTTPX) string {
|
|
schemes := determineSchemeOrder(input)
|
|
for _, scheme := range schemes {
|
|
formedURL := fmt.Sprintf("%s://%s", scheme, input)
|
|
req, err := httpxclient.NewRequest(http.MethodHead, formedURL)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
userAgent := useragent.PickRandom()
|
|
req.Header.Set("User-Agent", userAgent.Raw)
|
|
|
|
if _, err = httpxclient.Do(req, httpx.UnsafeOptions{}); err != nil {
|
|
continue
|
|
}
|
|
|
|
return formedURL
|
|
}
|
|
return ""
|
|
}
|
|
|
|
type inputLivenessChecker struct {
|
|
client *httpx.HTTPX
|
|
}
|
|
|
|
// ProbeURL probes the scheme for a URL.
|
|
func (i *inputLivenessChecker) ProbeURL(input string) (string, error) {
|
|
return ProbeURL(input, i.client), nil
|
|
}
|
|
|
|
func (i *inputLivenessChecker) Close() error {
|
|
if i.client.Dialer != nil {
|
|
i.client.Dialer.Close()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// GetInputLivenessChecker returns a new input liveness checker using provided httpx client
|
|
func GetInputLivenessChecker(client *httpx.HTTPX) types.InputLivenessProbe {
|
|
x := &inputLivenessChecker{client: client}
|
|
return x
|
|
}
|