def getCnvd(request): DATABASE = settings.DATABASES['ics_scan'] try: start_date, end_date = process_request(request) sql = 'select * from knowledgeBase_vulnerability where rhzz_update_time >='+'\''+start_date+'\''+' and rhzz_update_time <= '+'\''+end_date+'\'' cursor = Connect(DATABASE) cursor.execute(sql) rows = cursor.fetchall() logger.info("count cnvd vulnerability of this time: "+str(len(rows))) print('----sql-----',len(rows)) result = [] for row in rows: cnvd = {} cnvd["name"] = row[0] cnvd["vendor"] = row[1] cnvd["level"] = row[2] cnvd["description"] = row[3] cnvd["url"] = row[4] cnvd["mitigation"] = row[5] cnvd["provider"] = row[6] cnvd["date"] = row[7] cnvd["update_time"] = row[8] result.append(cnvd) return json_response(success_msg(result)) except Exception as e: logger.error("get cnvd error :%s"%e) return json_response(error_msg(E000.code,E000.msg))
def getAttack(request): DATABASE = settings.DATABASES['default'] try: start_date, end_date = process_request(request) sql = 'select * from conpot_log where date >='+'\''+start_date+'\''+' and date <= '+'\''+end_date+'\'' cursor = Connect(DATABASE) cursor.execute(sql) rows = cursor.fetchall() logger.info("count conpot_log of this time: "+str(len(rows))) print('----sql-----',len(rows)) result = [] for row in rows: conpot_log = {} conpot_log["date"] = str(row[0]) conpot_log["time"] = str(row[1]) conpot_log["function_id"] = row[2] conpot_log["protocol"] = row[3] conpot_log["request"] = row[4] conpot_log["destIP"] = row[5] conpot_log["sourcePort"] = row[6] conpot_log["DestPort"] = row[7] conpot_log["slaveID"] = row[8] conpot_log["sourceIP"] = row[9] conpot_log["response"] = row[10] conpot_log["country"] = row[11] conpot_log["subdivision"] = row[12] conpot_log["city"] = row[13] conpot_log["coordinate"] = row[14] result.append(conpot_log) return json_response(success_msg(result)) except Exception as e: logger.error("get conpot_log error :%s"%e) return json_response(error_msg(E000.code,E000.msg))
def getInstanceport(request): DATABASE = settings.DATABASES['ics_scan'] try: start_date, end_date = process_request(request) sql = 'select * from knowledgeBase_instanceport where rhzz_update_time >=' + '\'' + start_date + '\'' + ' and rhzz_update_time <= ' + '\'' + end_date + '\'' cursor = Connect(DATABASE) cursor.execute(sql) rows = cursor.fetchall() logger.info("count instanceport of this time: " + str(len(rows))) result = [] for row in rows: instanceport = {} instanceport["id"] = row[0] instanceport["ip"] = row[1] instanceport["port"] = row[2] instanceport['nw_proto'] = row[3] instanceport['protocol'] = row[4] instanceport['banner'] = row[5] instanceport['status'] = row[6] instanceport['add_time'] = row[7] instanceport['update_time'] = row[8] instanceport['instance_id'] = row[9] result.append(instanceport) return json_response(success_msg(result)) except Exception as e: logger.error("get instanceport error :%s" % e) return json_response(error_msg(E000.code, E000.msg))
def __wrapper(*args, **kwargs): if args[0].method == method: return func(*args, **kwargs) else: msg = E001.msg % (args[0].method, method) logger.error(msg) r = error_msg(E001.code, msg) return json_response(r)
def getInstance(request): DATABASE = settings.DATABASES['ics_scan'] try: start_date, end_date = process_request(request) sql = 'select * from knowledgeBase_instance where rhzz_update_time >='+'\''+start_date+'\''+' and rhzz_update_time <= '+'\''+end_date+'\'' cursor = Connect(DATABASE) cursor.execute(sql) rows = cursor.fetchall() logger.info("count instance of this time: "+str(len(rows))) result = [] for row in rows: print(len(row)) instance = {} instance["name"] = row[0] instance["vendor"] = row[1] instance["ip"] = row[2] instance['city'] = row[3] instance['country'] = row[4] instance['continent'] = row[5] instance['asn'] = row[6] instance['lat'] = row[7] instance['lon'] = row[8] instance['hostname'] = row[9] instance['service'] = row[10] instance['os'] = row[11] instance['app'] = row[12] instance['extrainfo'] = row[13] instance['version'] = row[14] instance['timestamp'] = row[15] instance['type_index'] = row[16] instance['update_time'] = row[17] instance['from_scan'] = row[18] instance['from_spider'] = row[19] instance['isp'] = row[20] instance['organization'] = row[21] instance['from_web'] = row[22] result.append(instance) return json_response(success_msg(result)) except Exception as e: logger.error("get instance error :%s"%e) return json_response(error_msg(E000.code,E000.msg))
def getDev2vul(request): DATABASE = settings.DATABASES['ics_scan'] try: start_date, end_date = process_request(request) sql = 'select * from knowledgeBase_dev2vul where rhzz_update_time >='+'\''+start_date+'\''+' and rhzz_update_time <= '+'\''+end_date+'\'' cursor = Connect(DATABASE) cursor.execute(sql) rows = cursor.fetchall() logger.info("count dev2vul of this time: "+str(len(rows))) print('----sql-----',len(rows)) result = [] for row in rows: dev2vul = {} dev2vul["name"] = row[0] dev2vul["device"] = row[1] dev2vul["vulnerability"] = row[2] result.append(dev2vul) return json_response(success_msg(result)) except Exception as e: logger.error("get dev2vul error :%s"%e) return json_response(error_msg(E000.code,E000.msg))
def getCve(request): DATABASE = settings.DATABASES['default'] try: start_date,end_date = process_request(request) sql = 'select * from cve where rhzz_update_time >='+'\''+start_date+'\''+' and rhzz_update_time <= '+'\''+end_date+'\'' cursor = Connect(DATABASE) cursor.execute(sql) rows = cursor.fetchall() logger.info("count cve vulnerability of this time: "+str(len(rows))) print('----sql-----',len(rows)) result = [] for row in rows: cves = {} cves["id"] = row[0] cves["num"] = row[1] cves["score"] = row[2] cves["secrecy"] = row[3] cves["integrity"] = row[4] cves["usability"] = row[5] cves["complexity"] = row[6] cves["vectorofattack"] = row[7] cves["identify"] = row[8] cves["kind"] = row[9] cves["cpe"] = row[10] cves["finddate"] = row[11] cves["summary"] = row[12] cves["update_time"] = row[13] result.append(cves) return json_response(success_msg(result)) except Exception as e: logger.error("get cve error :%s"%e) return json_response(error_msg(E000.code,E000.msg))