def atom(self, host): import asp import java import php import python import ruby import perl import urllib from core.urli import sansor host = sansor().fransor(host) hostp = sansor().pransor(host) if sansor().cransor(hostp): content = urllib.urlopen(host).read() header = urllib.urlopen(host).headers final = [] asp = asp.Asp().run(content, header) jva = java.Java().run(content, header) php = php.Php().run(content, header) prl = perl.Perl().run(content, header) pyt = python.Python().run(content, header) rby = ruby.Ruby().run(content, header) eve = [asp, jva, php, prl, pyt, rby] for key in eve: if key: final.append(key) if final == []: final.append('none') return final else: return None
def Lang(content,headers): return ( asp.Asp().run(content,headers), java.Java().run(content,headers), php.Php().run(content,headers), perl.Perl().run(content,headers), python.Python().run(content,headers), ruby.Ruby().run(content,headers) )
def run(self): print "" self.output.info('Starting attacks module...') rfi.Rfi(agent=self.agent, proxy=self.proxy, redirect=self.redirect, timeout=self.timeout, urls=self.url, cookie=self.cookie).run() sql.Sql(agent=self.agent, proxy=self.proxy, redirect=self.redirect, timeout=self.timeout, urls=self.url, cookie=self.cookie).run() xss.Xss(agent=self.agent, proxy=self.proxy, redirect=self.redirect, timeout=self.timeout, urls=self.url, cookie=self.cookie).run() php.Php(agent=self.agent, proxy=self.proxy, redirect=self.redirect, timeout=self.timeout, urls=self.url, cookie=self.cookie).run() ldap.LDAP(agent=self.agent, proxy=self.proxy, redirect=self.redirect, timeout=self.timeout, urls=self.url, cookie=self.cookie).run() html.Html(agent=self.agent, proxy=self.proxy, redirect=self.redirect, timeout=self.timeout, urls=self.url, cookie=self.cookie).run() xpath.Xpath(agent=self.agent, proxy=self.proxy, redirect=self.redirect, timeout=self.timeout, urls=self.url, cookie=self.cookie).run()
def __init__(self, logfile='/tmp/d2fs_log.txt', *args, **kw): fuse.Fuse.__init__(self, *args, **kw) self.parser.add_option( mountopt="server", metavar="SERVER", help="Remote serveri [%default]", default="192.168.0.1") self.parser.add_option( mountopt="uri", metavar="URI", help="Server-side script on the remote server used to mount a remote directory [%default]", default="/eval.php"), self.parse(errex=1) opts, args = self.cmdline self.logfile = open(logfile, 'a+') self.logged = [] self.cache = { 'getattr': {}, } self.php = php.Php(opts.server, opts.uri) print '[*] Remote filesystem mounted...' print 'args: server=%s, uri=%s' % (opts.server, opts.uri)