コード例 #1
0
        # Check unnecessary contents using Google Hack.
        if opt_gcs:
            product_list = google_hack.execute_google_hack(
                cve_explorer, fqdn_list[idx], port_list[idx], report,
                max_target_byte)

        # Check unnecessary contents using Explore contents.
        if opt_explore:
            product_list.extend(
                content_explorer.content_explorer(
                    cve_explorer, protocol_list[idx], fqdn_list[idx],
                    port_list[idx], path_list[idx], report, max_target_byte))

        # Execute exploitation.
        if opt_exploit:
            exploit = Exploit(utility)
            exploit_product = list(
                map(
                    list,
                    set(
                        map(tuple, [[products[1], products[2]]
                                    for products in product_list]))))
            exploit.exploit({
                'fqdn': fqdn_list[idx],
                'ip': utility.forward_lookup(fqdn_list[idx]),
                'port': int(port_list[idx]),
                'prod_list': exploit_product,
                'path': path_list[idx].replace('/', '')
            })

            # Create exploiting report.
コード例 #2
0
        if opt_gcs:
            product_list = google_hack.execute_google_hack(
                cve_explorer, fqdn_list[idx], path_list[idx].replace('/', ''),
                report)

        # Check unnecessary contents using Explore contents.
        if opt_explore:
            product_list.extend(
                content_explorer.content_explorer(
                    cve_explorer, protocol_list[idx], fqdn_list[idx],
                    path_list[idx].replace('/', ''), port_list[idx],
                    path_list[idx], report))

        # Execute exploitation.
        if opt_exploit:
            exploit = Exploit(utility)
            exploit_product = list(
                map(
                    list,
                    set(
                        map(tuple, [[products[1], products[2]]
                                    for products in product_list]))))
            exploit.exploit({
                'ip': utility.forward_lookup(fqdn_list[idx]),
                'port': int(port_list[idx]),
                'prod_list': exploit_product
            })

            # Create exploiting report.
            report.create_exploit_report()