コード例 #1
0
def identify_main(head='',
                  context='',
                  ip='',
                  port='',
                  productname='',
                  protocol='',
                  nmapscript=''):
    keywords = ''
    hackinfo = ''
    #     print '运行前状态'
    #     gc.collect()
    #     objgraph.show_growth()
    print ip, port, '正在纳入检测的队列'
    try:
        from httpdect import headdect
        from fluzzdetect import fuzztask
        from poc_file import pocsearchtask
        keywords, hackinfo = headdect.dect(head=head,
                                           context=context,
                                           ip=ip,
                                           port=port,
                                           protocol=protocol)
        fuz = fuzztask.getObject()
        fuz.add_work([(head, context, ip, port, productname, keywords,
                       nmapscript, protocol)])
        temp = pocsearchtask.getObject()
        temp.add_work([(head, context, ip, port, productname, keywords,
                        nmapscript, protocol)])
    except Exception, e:
        print e

        pass
コード例 #2
0
ファイル: port_identify.py プロジェクト: 0x-Jin/toolforspider
def port_deal(ip='',port='',name='',productname='',head=None,context=None,nmapscript=None):
    head=None
    ans=None
    keywords=name
    hackinfo=''
    port_function=getFunc(name,port,productname)
    if port_function !=None:
        head,ans,keywords,hackinfo=port_function(ip=ip,port=port,name=name,productname=productname)
    else:
        temp=pocsearchtask.getObject()
        temp.add_work([(head,context,ip,port,productname,keywords,nmapscript,name)])
    return head,ans,keywords,hackinfo
コード例 #3
0
def identify_main(head='',context='',ip='',port='',productname='',protocol='',nmapscript=''):
    keywords=''
    hackinfo=''
#     print '运行前状态'
#     gc.collect()
#     objgraph.show_growth()
    
    keywords,hackinfo=headdect.dect(head=head,context=context,ip=ip,port=port,protocol=protocol)
    fuz=fuzztask.getObject()
    fuz.add_work([(head,context,ip,port,productname,keywords,nmapscript,protocol)])
    temp=pocsearchtask.getObject()
    temp.add_work([(head,context,ip,port,productname,keywords,nmapscript,protocol)])
     
#     gc.collect()
#     objgraph.show_growth()
#     print '检测运行后状态'
    return keywords,hackinfo
コード例 #4
0
ファイル: page_identify.py プロジェクト: MaloneQQ/Scan-T
def identify_main(head='',context='',ip='',port='',productname='',protocol='',nmapscript=''):
    keywords=''
    hackinfo=''
#     print '运行前状态'
#     gc.collect()
#     objgraph.show_growth()
    print ip,port,'正在纳入检测的队列'
    try:
        from httpdect import headdect
        from fluzzdetect import fuzztask
        from poc_file import pocsearchtask
        keywords,hackinfo=headdect.dect(head=head,context=context,ip=ip,port=port,protocol=protocol)
        fuz=fuzztask.getObject()
        fuz.add_work([(head,context,ip,port,productname,keywords,nmapscript,protocol)])
        temp=pocsearchtask.getObject()
        temp.add_work([(head,context,ip,port,productname,keywords,nmapscript,protocol)])
    except Exception ,e:
        print e


        pass
コード例 #5
0
def port_deal(ip='',
              port='',
              name='',
              productname='',
              head=None,
              context=None,
              nmapscript=None):
    head = None
    ans = None
    keywords = name
    hackinfo = ''
    port_function = getFunc(name, port, productname)
    if port_function != None:
        head, ans, keywords, hackinfo = port_function(ip=ip,
                                                      port=port,
                                                      name=name,
                                                      productname=productname)
    else:
        temp = pocsearchtask.getObject()
        temp.add_work([(head, context, ip, port, productname, keywords,
                        nmapscript, name)])
    return head, ans, keywords, hackinfo