if opt_explore: product_list.extend( content_explorer.content_explorer( cve_explorer, protocol_list[idx], fqdn_list[idx], port_list[idx], path_list[idx], report, max_target_byte)) # Execute exploitation. if opt_exploit: exploit = Exploit(utility) exploit_product = list( map( list, set( map(tuple, [[products[1], products[2]] for products in product_list])))) exploit.exploit({ 'fqdn': fqdn_list[idx], 'ip': utility.forward_lookup(fqdn_list[idx]), 'port': int(port_list[idx]), 'prod_list': exploit_product, 'path': path_list[idx].replace('/', '') }) # Create exploiting report. report.create_exploit_report(fqdn_list[idx], port_list[idx]) utility.write_log(20, 'End ' + msg) print(os.path.basename(__file__) + ' finish!!') utility.write_log(20, '[Out] IndroML2 [{}].'.format(file_name))
# Check unnecessary contents using Explore contents. if opt_explore: product_list.extend( content_explorer.content_explorer( cve_explorer, protocol_list[idx], fqdn_list[idx], path_list[idx].replace('/', ''), port_list[idx], path_list[idx], report)) # Execute exploitation. if opt_exploit: exploit = Exploit(utility) exploit_product = list( map( list, set( map(tuple, [[products[1], products[2]] for products in product_list])))) exploit.exploit({ 'ip': utility.forward_lookup(fqdn_list[idx]), 'port': int(port_list[idx]), 'prod_list': exploit_product }) # Create exploiting report. report.create_exploit_report() utility.write_log(20, 'End ' + msg) print(os.path.basename(__file__) + ' finish!!') utility.write_log(20, '[Out] GyoiThon [{}].'.format(file_name))