Пример #1
0
def execMod(fingerengine):
    """
    """

    if fingerengine.options.deploy:
        deployer.run(fingerengine)

    if fingerengine.options.undeploy:
        undeployer.run(fingerengine)
Пример #2
0
def execMod(fingerengine):
    """
    """

    if fingerengine.options.deploy:
        deployer.run(fingerengine)

    if fingerengine.options.undeploy:
        undeployer.run(fingerengine)
Пример #3
0
def auxengine(fingerengine):
    """ Our core auxiliary engine runs as such:

            1. While building the command parser, we load all modules and append their
               CLI flags to a hidden argument parser.

            2. After fingerprinting the remote service, we load all of the platform's
               modules and run check(); this will return True/False as to whether or
               not it applies to the fingerprint.

            3. If the fingerprint applies, we check for --fingerprint, which will
               simply list that it is acceptable.  We also check for the auxiliarys
               hidden flag and, if it exists, we run the auxiliary.
    """

    fpath = [abspath("./src/platform/%s/auxiliary" % fingerengine.service)]
    modules = list(pkgutil.iter_modules(fpath))
    found = []

    for fingerprint in fingerengine.fingerprints:
        for auxiliary in modules:

            mod = auxiliary[0].find_module(auxiliary[1]).load_module(
                auxiliary[1])

            try:
                mod = mod.Auxiliary()
            except:
                # logged in build_platform_flags
                continue

            if mod.name not in found and mod.check(fingerprint):
                if fingerengine.options.fp and not mod.show:
                    utility.Msg(
                        "Vulnerable to %s (--%s)" % (mod.name, mod.flag),
                        LOG.SUCCESS)
                elif vars(fingerengine.options)[mod.flag]:
                    mod.run(fingerengine, fingerprint)

                found.append(mod.name)

    if fingerengine.options.deploy:
        deployer.run(fingerengine)

    # also check for undeploy
    if fingerengine.options.undeploy:
        undeployer.run(fingerengine)
Пример #4
0
def auxengine(fingerengine):
    """ Our core auxiliary engine runs as such:

            1. While building the command parser, we load all modules and append their
               CLI flags to a hidden argument parser.

            2. After fingerprinting the remote service, we load all of the platform's
               modules and run check(); this will return True/False as to whether or
               not it applies to the fingerprint.

            3. If the fingerprint applies, we check for --fingerprint, which will
               simply list that it is acceptable.  We also check for the auxiliarys
               hidden flag and, if it exists, we run the auxiliary.
    """

    fpath = [abspath("./src/platform/%s/auxiliary" % fingerengine.service)]
    modules = list(pkgutil.iter_modules(fpath))
    found = []

    for fingerprint in fingerengine.fingerprints:
        for auxiliary in modules:

            mod = auxiliary[0].find_module(auxiliary[1]).load_module(auxiliary[1])

            try:
                mod = mod.Auxiliary()
            except:
                # logged in build_platform_flags
                continue

            if mod.name not in found and mod.check(fingerprint):
                if fingerengine.options.fp and not mod.show:
                    utility.Msg("Vulnerable to %s (--%s)" % (mod.name, mod.flag),
                                                            LOG.SUCCESS)
                elif vars(fingerengine.options)[mod.flag]:
                    mod.run(fingerengine, fingerprint)

                found.append(mod.name)

    if fingerengine.options.deploy:
        deployer.run(fingerengine)

    # also check for undeploy
    if fingerengine.options.undeploy:
        undeployer.run(fingerengine)