Exemplo n.º 1
0
def getCnvd(request):
    DATABASE = settings.DATABASES['ics_scan']
    try:
        start_date, end_date = process_request(request)
        sql = 'select * from knowledgeBase_vulnerability where rhzz_update_time >='+'\''+start_date+'\''+' and rhzz_update_time <= '+'\''+end_date+'\''
        cursor = Connect(DATABASE)
        cursor.execute(sql)
        rows = cursor.fetchall()
        logger.info("count cnvd vulnerability of this time: "+str(len(rows)))
        print('----sql-----',len(rows))

        result = []
        for row in rows:
            cnvd = {}
            cnvd["name"] = row[0]
            cnvd["vendor"] = row[1]
            cnvd["level"] = row[2]
            cnvd["description"] = row[3]
            cnvd["url"] = row[4]
            cnvd["mitigation"] = row[5]
            cnvd["provider"] = row[6]
            cnvd["date"] = row[7]
            cnvd["update_time"] = row[8]
            result.append(cnvd)

        return json_response(success_msg(result))

    except Exception as e:
        logger.error("get cnvd error :%s"%e)
        return json_response(error_msg(E000.code,E000.msg))
Exemplo n.º 2
0
def getAttack(request):
    DATABASE = settings.DATABASES['default']
    try:
        start_date, end_date = process_request(request)
        sql = 'select * from conpot_log where date >='+'\''+start_date+'\''+' and date <= '+'\''+end_date+'\''
        cursor = Connect(DATABASE)
        cursor.execute(sql)
        rows = cursor.fetchall()
        logger.info("count conpot_log of this time: "+str(len(rows)))
        print('----sql-----',len(rows))

        result = []
        for row in rows:
            conpot_log = {}
            conpot_log["date"] = str(row[0])
            conpot_log["time"] = str(row[1])
            conpot_log["function_id"] = row[2]
            conpot_log["protocol"] = row[3]
            conpot_log["request"] = row[4]
            conpot_log["destIP"] = row[5]
            conpot_log["sourcePort"] = row[6]
            conpot_log["DestPort"] = row[7]
            conpot_log["slaveID"] = row[8]
            conpot_log["sourceIP"] = row[9]
            conpot_log["response"] = row[10]
            conpot_log["country"] = row[11]
            conpot_log["subdivision"] = row[12]
            conpot_log["city"] = row[13]
            conpot_log["coordinate"] = row[14]
            result.append(conpot_log)
        return json_response(success_msg(result))

    except Exception as e:
        logger.error("get conpot_log error :%s"%e)
        return json_response(error_msg(E000.code,E000.msg))
Exemplo n.º 3
0
def getInstanceport(request):

    DATABASE = settings.DATABASES['ics_scan']
    try:
        start_date, end_date = process_request(request)
        sql = 'select * from knowledgeBase_instanceport where rhzz_update_time >=' + '\'' + start_date + '\'' + ' and rhzz_update_time <= ' + '\'' + end_date + '\''
        cursor = Connect(DATABASE)
        cursor.execute(sql)
        rows = cursor.fetchall()
        logger.info("count instanceport of this time: " + str(len(rows)))

        result = []
        for row in rows:
            instanceport = {}
            instanceport["id"] = row[0]
            instanceport["ip"] = row[1]
            instanceport["port"] = row[2]
            instanceport['nw_proto'] = row[3]
            instanceport['protocol'] = row[4]
            instanceport['banner'] = row[5]
            instanceport['status'] = row[6]
            instanceport['add_time'] = row[7]
            instanceport['update_time'] = row[8]
            instanceport['instance_id'] = row[9]

            result.append(instanceport)
        return json_response(success_msg(result))

    except Exception as e:
        logger.error("get instanceport error :%s" % e)
        return json_response(error_msg(E000.code, E000.msg))
Exemplo n.º 4
0
        def __wrapper(*args, **kwargs):

            if args[0].method == method:
                return func(*args, **kwargs)
            else:
                msg = E001.msg % (args[0].method, method)
                logger.error(msg)
                r = error_msg(E001.code, msg)
                return json_response(r)
Exemplo n.º 5
0
def getInstance(request):
    DATABASE = settings.DATABASES['ics_scan']
    try:
        start_date, end_date = process_request(request)
        sql = 'select * from knowledgeBase_instance where rhzz_update_time >='+'\''+start_date+'\''+' and rhzz_update_time <= '+'\''+end_date+'\''
        cursor = Connect(DATABASE)
        cursor.execute(sql)
        rows = cursor.fetchall()
        logger.info("count instance of this time: "+str(len(rows)))

        result = []
        for row in rows:
            print(len(row))
            instance = {}
            instance["name"] = row[0]
            instance["vendor"] = row[1]
            instance["ip"] = row[2]
            instance['city'] = row[3]
            instance['country'] = row[4]
            instance['continent'] = row[5]
            instance['asn'] = row[6]
            instance['lat'] = row[7]
            instance['lon'] = row[8]
            instance['hostname'] = row[9]
            instance['service'] = row[10]
            instance['os'] = row[11]
            instance['app'] = row[12]
            instance['extrainfo'] = row[13]
            instance['version'] = row[14]
            instance['timestamp'] = row[15]
            instance['type_index'] = row[16]
            instance['update_time'] = row[17]
            instance['from_scan'] = row[18]
            instance['from_spider'] = row[19]
            instance['isp'] = row[20]
            instance['organization'] = row[21]
            instance['from_web'] = row[22]
            result.append(instance)
        return json_response(success_msg(result))

    except Exception as e:
        logger.error("get instance error :%s"%e)
        return json_response(error_msg(E000.code,E000.msg))
Exemplo n.º 6
0
def getDev2vul(request):
    DATABASE = settings.DATABASES['ics_scan']
    try:
        start_date, end_date = process_request(request)
        sql = 'select * from knowledgeBase_dev2vul where rhzz_update_time >='+'\''+start_date+'\''+' and rhzz_update_time <= '+'\''+end_date+'\''
        cursor = Connect(DATABASE)
        cursor.execute(sql)
        rows = cursor.fetchall()
        logger.info("count dev2vul of this time: "+str(len(rows)))
        print('----sql-----',len(rows))

        result = []
        for row in rows:
            dev2vul = {}
            dev2vul["name"] = row[0]
            dev2vul["device"] = row[1]
            dev2vul["vulnerability"] = row[2]
            result.append(dev2vul)
        return json_response(success_msg(result))

    except Exception as e:
        logger.error("get dev2vul error :%s"%e)
        return json_response(error_msg(E000.code,E000.msg))
Exemplo n.º 7
0
def getCve(request):
    DATABASE = settings.DATABASES['default']
    try:
        start_date,end_date = process_request(request)
        sql = 'select * from cve where rhzz_update_time >='+'\''+start_date+'\''+' and rhzz_update_time <= '+'\''+end_date+'\''
        cursor = Connect(DATABASE)
        cursor.execute(sql)
        rows = cursor.fetchall()
        logger.info("count cve vulnerability of this time: "+str(len(rows)))
        print('----sql-----',len(rows))

        result = []
        for row in rows:
            cves = {}
            cves["id"] = row[0]
            cves["num"] = row[1]
            cves["score"] = row[2]
            cves["secrecy"] = row[3]
            cves["integrity"] = row[4]
            cves["usability"] = row[5]
            cves["complexity"] = row[6]
            cves["vectorofattack"] = row[7]
            cves["identify"] = row[8]
            cves["kind"] = row[9]
            cves["cpe"] = row[10]
            cves["finddate"] = row[11]
            cves["summary"] = row[12]
            cves["update_time"] = row[13]
            result.append(cves)

        return json_response(success_msg(result))

    except Exception as e:

        logger.error("get cve error :%s"%e)
        return json_response(error_msg(E000.code,E000.msg))