Description Usage Arguments Details Value
This function takes in a payload and analyses it for malicious strings. If malicious strings are found it will return an indicator and tokenized data (fingerprint).
1 | detectAttack(payload)
|
payload |
A string containing a URL-decoded parameter, request body, or header argument. |
Detect SQLi or XSS in parameter or request body payload. The process of detection and classification is as follows:
Send payload to be tested for SQL
Send payload to be tested for XSS
If malicious activities have been detected then return with a '1'
If no malicious activity has been detected then return with a '0'
Returns a binary integer indicating whether the payload contained a malicious element ('1') or not ('0').
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.