コード例 #1
0
        if opt_explore:
            product_list.extend(
                content_explorer.content_explorer(
                    cve_explorer, protocol_list[idx], fqdn_list[idx],
                    port_list[idx], path_list[idx], report, max_target_byte))

        # Execute exploitation.
        if opt_exploit:
            exploit = Exploit(utility)
            exploit_product = list(
                map(
                    list,
                    set(
                        map(tuple, [[products[1], products[2]]
                                    for products in product_list]))))
            exploit.exploit({
                'fqdn': fqdn_list[idx],
                'ip': utility.forward_lookup(fqdn_list[idx]),
                'port': int(port_list[idx]),
                'prod_list': exploit_product,
                'path': path_list[idx].replace('/', '')
            })

            # Create exploiting report.
            report.create_exploit_report(fqdn_list[idx], port_list[idx])

        utility.write_log(20, 'End ' + msg)

    print(os.path.basename(__file__) + ' finish!!')
    utility.write_log(20, '[Out] IndroML2 [{}].'.format(file_name))
コード例 #2
0
        # Check unnecessary contents using Explore contents.
        if opt_explore:
            product_list.extend(
                content_explorer.content_explorer(
                    cve_explorer, protocol_list[idx], fqdn_list[idx],
                    path_list[idx].replace('/', ''), port_list[idx],
                    path_list[idx], report))

        # Execute exploitation.
        if opt_exploit:
            exploit = Exploit(utility)
            exploit_product = list(
                map(
                    list,
                    set(
                        map(tuple, [[products[1], products[2]]
                                    for products in product_list]))))
            exploit.exploit({
                'ip': utility.forward_lookup(fqdn_list[idx]),
                'port': int(port_list[idx]),
                'prod_list': exploit_product
            })

            # Create exploiting report.
            report.create_exploit_report()

        utility.write_log(20, 'End ' + msg)

    print(os.path.basename(__file__) + ' finish!!')
    utility.write_log(20, '[Out] GyoiThon [{}].'.format(file_name))