Description
I fuzz a target with a complex request I read in with -r.
That requests has special headers (no cookies) that also contain auth tokens that time out after x minutes.
A fuzz run takes however 4x+ the time than the lifetime of the auth token.
It would be great if there would be a feature that executes a python script on an event (in my case: HTTP code 401) and then re-read the -r file, hence the python script would get a new token and write it to the file.
My current workaround is to see at which item from the request sqlmap was fuzzing when it is terminating because the auth token has timed out, and skip all items that were completed until then with --skip, but that is a lot of hands-on work.
I think my problem is actually common so either there is already a way to deal with that and I didn't find it, or this is a feature that would be very useful.
Thank you!