s0md3v / Blazy

Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

http protocol error', 0, 'got a bad status line', None

oldesec opened this issue · comments

Hi.

I get the following error.

root@lol:~/Blazy# python blazy.py
    ____   _
   |  _ \ | |
   | |_) || |  __ _  ____ _   _
   |  _ < | | / _` ||_  /| | | |
   | |_) || || (_| | / / | |_| |
   |____/ |_| \__,_|/___| \__, |
                           __/ |
    Made with <3 By D3V   |___/

[?] Enter target URL: https://xxxx/login/login.jsp
[+] Heuristic found a Clickjacking Vulnerability
Traceback (most recent call last):
  File "blazy.py", line 77, in <module>
    WAF_detector()
  File "blazy.py", line 68, in WAF_detector
    res1 = urlopen(fuzz) #Opens the noise injected payload
  File "/usr/lib/python2.7/urllib.py", line 87, in urlopen
    return opener.open(url)
  File "/usr/lib/python2.7/urllib.py", line 213, in open
    return getattr(self, name)(url)
  File "/usr/lib/python2.7/urllib.py", line 357, in open_http
    'got a bad status line', None)
IOError: ('http protocol error', 0, 'got a bad status line', None)