def do_transform(self, request, response, config): # TODO: write your code here. scan_request = request.entity scan_id = "".join(random.choice("0123456789abcdef") for x in range(32)) scan_request.ports = scan_request.ports.split( ', ') if scan_request.ports is not None else None scan_request.usernames = scan_request.usernames.split( ', ') if scan_request.usernames is not None else None scan_request.passwords = scan_request.passwords.split( ', ') if scan_request.passwords is not None else None start(scan_request.host, scan_request.usernames, scan_request.passwords, scan_request.ports, scan_request.timeout_sec, scan_request.thread_no, 1, 1, 'abcd', 0, "en", scan_request.verbose, scan_request.socks_proxy, scan_request.retries, [], scan_id, "Through Maltego") results = find_log(scan_id, "en") for result in results: response += NettackerBrute(host=result["HOST"], ports=result["PORT"], usernames=result["USERNAME"], passwords=result["PASSWORD"], thread_no=request.entity.thread_no, socks_proxy=request.entity.socks_proxy, timeout_sec=request.entity.timeout_sec, verbose=request.entity.verbose, retries=request.entissty.retries, link_label='Telnet Brute found ' + result["USERNAME"] + ':' + result["PASSWORD"]) return response
def do_transform(self, request, response, config): # TODO: write your code here. scan_request = request.entity scan_id = "".join(random.choice("0123456789abcdef") for x in range(32)) scan_request.ports = scan_request.ports.split(', ') if scan_request.ports is not None else None start(scan_request.host, [], [], scan_request.ports, scan_request.timeout_sec, scan_request.thread_no, 1, 1, 'abcd', 0, "en", scan_request.verbose, scan_request.socks_proxy, scan_request.retries, [], scan_id, "Through Maltego") results = find_log(scan_id, "en") for result in results: url = result["DESCRIPTION"].split()[0] response += URL(url=url, title=result["DESCRIPTION"], short_title=url, link_label='dir_scan') return response
def do_transform(self, request, response, config): # TODO: write your code here. scan_request = request.entity scan_id = "".join(random.choice("0123456789abcdef") for x in range(32)) scan_request.ports = scan_request.ports.split( ', ') if scan_request.ports is not None else None start(scan_request.host, [], [], scan_request.ports, scan_request.timeout_sec, scan_request.thread_no, 1, 1, 'abcd', 0, "en", scan_request.verbose, scan_request.socks_proxy, scan_request.retries, [], scan_id, "Through Maltego") results = find_log(scan_id, "en") for result in results: url = result["HOST"] + ":" + result["PORT"] response += URL(url=url, title=result["DESCRIPTION"], short_title="Wordpress DOS CVE 2018 6389 Found!", link_label='weak_signature_algorithm_vuln') return response
def do_transform(self, request, response, config): # TODO: write your code here. scan_request = request.entity scan_id = "".join(random.choice("0123456789abcdef") for x in range(32)) scan_request.ports = scan_request.ports.split( ', ') if scan_request.ports is not None else None start(scan_request.host, [], [], scan_request.ports, scan_request.timeout_sec, scan_request.thread_no, 1, 1, 'abcd', 0, "en", scan_request.verbose, scan_request.socks_proxy, scan_request.retries, [], scan_id, "Through Maltego") results = find_log(scan_id, "en") for result in results: url = result["DESCRIPTION"] response += NettackerScan( host=url, ports=result["PORT"], thread_no=request.entity.thread_no, socks_proxy=request.entity.socks_proxy, timeout_sec=request.entity.timeout_sec, verbose=request.entity.verbose, retries=request.entity.retries, link_label='viewdns_reverse_ip_lookup_scan') return response