def parse_attack(self, result): output = Output(self) if result: output.success(result) else: output.fail('Internet nothing returned') return output
def parse_output(self, result): output = Output(self) if result: output.success(result) else: output.fail('Internet nothing returned') return output
def save_output(self, result): output = Output(self) if result: output.success(result) else: output.fail() return output
def parse_attack(self, result): output = Output(self) if result: output.success(result) else: output.fail("Internet nothing returned") return output
def parse_output(self, result): print 'parse_output' output = Output(self) if result: output.success(result) else: output.fail('failed connect') return output
def parse_attack(self, result): output = Output(self) if result: output.success(result) else: output.fail('target is not vulnerable') return output
def parse_attack(self, response): output = Output(self) result = {} if response: result['VerifyInfo'] = {} result['VerifyInfo']['URL'] = '%s' % self.url output.success(result) else: output.fail('Fail test') return output
def _verify(self): result = {} output = Output(self) target_ip = url2ip(self.url) url = urlparse.urlparse(self.url) port = url.port or 443 if check_poodle(target_ip, port): output.success(result) else: output.fail('Not support SSLv3 connection. Not Vulnerable') return output
def save_output(self, result): #判断有无结果并输出 output = Output(self) if result: output.success(result) #生产报告错误,在这里记得 #data = result['VerifyInfo']['URL'] + result['VerifyInfo']['whoami'] + "\n" #with open('result.txt','a+') as f: # f.write(str(data)) else: output.fail() return output
# coding: utf-8