Ejemplo n.º 1
0
def identify_main(head='',
                  context='',
                  ip='',
                  port='',
                  productname='',
                  protocol='',
                  nmapscript=''):
    keywords = ''
    hackinfo = ''
    #     print '运行前状态'
    #     gc.collect()
    #     objgraph.show_growth()
    print ip, port, '正在纳入检测的队列'
    try:
        from httpdect import headdect
        from fluzzdetect import fuzztask
        from poc_file import pocsearchtask
        keywords, hackinfo = headdect.dect(head=head,
                                           context=context,
                                           ip=ip,
                                           port=port,
                                           protocol=protocol)
        fuz = fuzztask.getObject()
        fuz.add_work([(head, context, ip, port, productname, keywords,
                       nmapscript, protocol)])
        temp = pocsearchtask.getObject()
        temp.add_work([(head, context, ip, port, productname, keywords,
                        nmapscript, protocol)])
    except Exception, e:
        print e

        pass
Ejemplo n.º 2
0
def identify_main(head='',context='',ip='',port=''):
    keywords=''
    hackinfo=''
    keywords,hackinfo=headdect.dect(head=head,context=context,ip=ip,port=port)
#    dedeCMS()
#检测网站的产品    

    return keywords,hackinfo
Ejemplo n.º 3
0
def identify_main(head='', context='', ip='', port=''):
    keywords = ''
    hackinfo = ''
    keywords, hackinfo = headdect.dect(head=head,
                                       context=context,
                                       ip=ip,
                                       port=port)
    #    dedeCMS()
    #检测网站的产品

    return keywords, hackinfo
Ejemplo n.º 4
0
def identify_main(head='',context='',ip='',port='',productname='',protocol='',nmapscript=''):
    keywords=''
    hackinfo=''
#     print '运行前状态'
#     gc.collect()
#     objgraph.show_growth()
    
    keywords,hackinfo=headdect.dect(head=head,context=context,ip=ip,port=port,protocol=protocol)
    fuz=fuzztask.getObject()
    fuz.add_work([(head,context,ip,port,productname,keywords,nmapscript,protocol)])
    temp=pocsearchtask.getObject()
    temp.add_work([(head,context,ip,port,productname,keywords,nmapscript,protocol)])
     
#     gc.collect()
#     objgraph.show_growth()
#     print '检测运行后状态'
    return keywords,hackinfo
Ejemplo n.º 5
0
def identify_main(head='',context='',ip='',port='',productname='',protocol='',nmapscript=''):
    keywords=''
    hackinfo=''
#     print '运行前状态'
#     gc.collect()
#     objgraph.show_growth()
    print ip,port,'正在纳入检测的队列'
    try:
        from httpdect import headdect
        from fluzzdetect import fuzztask
        from vuldect import pocsearchtask
        keywords,hackinfo=headdect.dect(head=head,context=context,ip=ip,port=port,protocol=protocol)
        fuz=fuzztask.getObject()
        fuz.add_work([(head,context,ip,port,productname,keywords,nmapscript,protocol)])
        temp=pocsearchtask.getObject()
        temp.add_work([(head,context,ip,port,productname,keywords,nmapscript,protocol)])
    except Exception ,e:
        print e


        pass