Ejemplo n.º 1
0
 def do_transform(self, request, response, config):
     # TODO: write your code here.
     scan_request = request.entity
     scan_id = "".join(random.choice("0123456789abcdef") for x in range(32))
     scan_request.ports = scan_request.ports.split(
         ', ') if scan_request.ports is not None else None
     scan_request.usernames = scan_request.usernames.split(
         ', ') if scan_request.usernames is not None else None
     scan_request.passwords = scan_request.passwords.split(
         ', ') if scan_request.passwords is not None else None
     start(scan_request.host, scan_request.usernames,
           scan_request.passwords, scan_request.ports,
           scan_request.timeout_sec, scan_request.thread_no, 1, 1, 'abcd',
           0, "en", scan_request.verbose, scan_request.socks_proxy,
           scan_request.retries, [], scan_id, "Through Maltego")
     results = find_log(scan_id, "en")
     for result in results:
         response += NettackerBrute(host=result["HOST"],
                                    ports=result["PORT"],
                                    usernames=result["USERNAME"],
                                    passwords=result["PASSWORD"],
                                    thread_no=request.entity.thread_no,
                                    socks_proxy=request.entity.socks_proxy,
                                    timeout_sec=request.entity.timeout_sec,
                                    verbose=request.entity.verbose,
                                    retries=request.entissty.retries,
                                    link_label='Telnet Brute found ' +
                                    result["USERNAME"] + ':' +
                                    result["PASSWORD"])
     return response
Ejemplo n.º 2
0
 def do_transform(self, request, response, config):
     # TODO: write your code here.
     scan_request = request.entity
     scan_id = "".join(random.choice("0123456789abcdef") for x in range(32))
     scan_request.ports = scan_request.ports.split(', ') if scan_request.ports is not None else None
     start(scan_request.host, [], [], scan_request.ports, scan_request.timeout_sec, scan_request.thread_no,
           1, 1, 'abcd', 0, "en", scan_request.verbose, scan_request.socks_proxy, scan_request.retries, [], scan_id,
           "Through Maltego")
     results = find_log(scan_id, "en")
     for result in results:
         url = result["DESCRIPTION"].split()[0]
         response += URL(url=url, title=result["DESCRIPTION"], short_title=url, link_label='dir_scan')
     return response
 def do_transform(self, request, response, config):
     # TODO: write your code here.
     scan_request = request.entity
     scan_id = "".join(random.choice("0123456789abcdef") for x in range(32))
     scan_request.ports = scan_request.ports.split(
         ', ') if scan_request.ports is not None else None
     start(scan_request.host, [], [], scan_request.ports,
           scan_request.timeout_sec, scan_request.thread_no, 1, 1, 'abcd',
           0, "en", scan_request.verbose, scan_request.socks_proxy,
           scan_request.retries, [], scan_id, "Through Maltego")
     results = find_log(scan_id, "en")
     for result in results:
         url = result["HOST"] + ":" + result["PORT"]
         response += URL(url=url,
                         title=result["DESCRIPTION"],
                         short_title="Wordpress DOS CVE 2018 6389 Found!",
                         link_label='weak_signature_algorithm_vuln')
     return response
Ejemplo n.º 4
0
 def do_transform(self, request, response, config):
     # TODO: write your code here.
     scan_request = request.entity
     scan_id = "".join(random.choice("0123456789abcdef") for x in range(32))
     scan_request.ports = scan_request.ports.split(
         ', ') if scan_request.ports is not None else None
     start(scan_request.host, [], [], scan_request.ports,
           scan_request.timeout_sec, scan_request.thread_no, 1, 1, 'abcd',
           0, "en", scan_request.verbose, scan_request.socks_proxy,
           scan_request.retries, [], scan_id, "Through Maltego")
     results = find_log(scan_id, "en")
     for result in results:
         url = result["DESCRIPTION"]
         response += NettackerScan(
             host=url,
             ports=result["PORT"],
             thread_no=request.entity.thread_no,
             socks_proxy=request.entity.socks_proxy,
             timeout_sec=request.entity.timeout_sec,
             verbose=request.entity.verbose,
             retries=request.entity.retries,
             link_label='viewdns_reverse_ip_lookup_scan')
     return response