Home Page | Skip to Navigation | Skip to Content | Skip to Search | Skip to Footer

Home >   Check Point Forums >   Software Blades and Gateways >   Threat Prevention / Emulation / Extraction

Thread: Emulation of files using curl

Welcome, Guest Help
Login Login
Guest Settings Guest Settings
This question is not answered. Helpful answers available: 2. Correct answers available: 1.

Permlink Replies: 1 - Pages: 1 - Last Post: May 25, 2017 7:11 PM by: MartinKoldovsky Threads: [ Previous | Next ]
Michael Ahren

Posts: 1
Registered: 7/20/16
Emulation of files using curl
Posted: Apr 5, 2017 10:01 AM
  Click to reply to this thread Reply


I'm working on an easy way to emulate files in SandBlast using curl to upload the file into the API, but haven't been able to get it to work. Has anyone attempted the same, and if so, would it be possible to share how it was solved? Or if anyone was able to solve it in another manner, it would be very interesting to understand how.



Posts: 1
Registered: 1/10/08
Re: Emulation of files using curl
Posted: May 25, 2017 7:11 PM   in response to: Michael Ahren
  Click to reply to this thread Reply

Hello Michael,
get inspiration in my TP API from CLI document

in section
Threat Emulation API request UPLOAD (hash is not in the system yet)

Follow whole document to build content of environment variable and then
curl_cli -F "request=$TEU" -F "file=@$TEFILE" -k -s -H "Content-Type: multipart/form-data" https://$TESERVER/tecloud/api/v1/file/upload

to submit both API request in JSON and file content correctly encoded.

Kind Regards,

Expert: 751 + pts
Advanced: 301 - 750 pts
Enthusiast: 101 - 300 pts
Novice: 0 - 100 pts
Check Point
Helpful Answer (5 pts)
Correct Answer (10 pts)