找回密码
 立即注册
首页 业界区 业界 批量漏洞挖掘思路

批量漏洞挖掘思路

钦娅芬 11 小时前
批量漏洞挖掘思路

1、在线文库查询


使用在线漏洞文库收集nday或者1day的漏洞payload对网站进行漏洞挖掘。

佩奇漏洞文库:
https://www.yuque.com/peiqiwiki/peiqi-poc-wiki
http://wiki.peiqi.tech/
白阁漏洞文库:
https://wiki.bylibrary.cn/%E6%BC%8F%E6%B4%9E%E5%BA%93/01-CMS%E6%BC%8F%E6%B4%9E/ActiveMQ/ActiveMQ%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E/
狼组安全团队公开知识库:
https://wiki.wgpsec.org/knowledge/
Morker文库:
https://wiki.96.mk/
风炫漏洞库:
https://evalshell.com/
exploit-db漏洞库:
https://www.exploit-db.com/

2、使用语句定位到产品,然后看到这些资产,使用工具批量收集对应网站


fofax:https://github.com/xiecat/fofax

这里通过fofa_viewer进行资产获取,将我们刚刚在fofa搜索到的资产进行导出

3、批量探测网站存活状态


httpx.exe -timeout 15 -l 上一步保存文件.txt -o result.txt -mc 200

使用工具httpx对上面收集到的url做一个存活验证,首先筛选出存活的url来,然后再进行测试,不然会浪费我们很多时间,这里我们使用httpx把存活的url保存到文件中

4、批量测试漏洞


根据泛微OA E-Cology BshServlet 远程代码执行漏洞漏洞命令执行的特征,我们简单写一个多线程检测脚本

from os import O_EXCL
import requests
import threading

def POC_1(target_url,ss):
vuln_url = target_url + r"/weaver/bsh.servlet.BshServlet"
headers = {
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36",
"Content-Type": "application/x-www-form-urlencoded",
}
try:
response = requests.get(url=vuln_url, headers=headers, timeout=5,verify=False)
if response.status_code == 200 and "BeanShell Test" in response.text:
with open("存在漏洞的url.txt", 'a', encoding='UTF-8') as f:
print("\033[32m[o] 目标{}存在漏洞".format(target_url))
f.write(vuln_url + "\n")
else:
print("\033[31m[x] 目标不存在漏洞")
except Exception as e:
print("\033[31m[x] 请求失败", e)

with open("fanwei.txt","r",encoding='UTF-8')as f:
for i in f.readlines():
ss = i.replace('\n','')
ip = i.replace('\n','')
threading.Thread(target=POC_1,args=(ip,ss)).start()

就可以通过脚本来实现检测这些存活的url是否有漏洞

5、处理数据


漏洞url

->根据url(因为有些网站是ip站)反查域名

->根据域名反查域名权重

->根据有权重的域名反查域名备案名称

->根据备案名称查询公司的基本信息,例如公司的所在地方和行业等等,

1、域名和权重和公司的批量检测


爱站:https://rank.aizhan.com/

我们需要对上边收集过来的存在漏洞的url列表去做一个根据ip反查域名,然后域名反查权重

#-- coding:UTF-8 --
import re, time
from urllib.parse import urlparse
import requests
from fake_useragent import UserAgent
from tqdm import tqdm
import os

# 爱站
def aizhan_chaxun(ip, ua):
aizhan_headers = {
'Host': 'dns.aizhan.com',
'User-Agent': ua.random,
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',
'Accept-Language': 'zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2',
'Accept-Encoding': 'gzip, deflate, br',
'Referer': 'https://dns.aizhan.com/'}
aizhan_url = 'https://dns.aizhan.com/' + str(ip) + '/'
try:
aizhan_r = requests.get(url=aizhan_url, headers=aizhan_headers, timeout=2).text
aizhan_nums = re.findall(r'''(.*?)''', aizhan_r)
if int(aizhan_nums[0]) > 0:
aizhan_domains = re.findall(r'''rel="nofollow" target="_blank">(.*?)''', aizhan_r)
return aizhan_domains
except:
pass

def catch_result(i):
ua_header = UserAgent()
i = i.strip()
if "http://" not in i:
i="http://"+i
try:
ip = urlparse(i).netloc
aizhan_result = aizhan_chaxun(ip, ua_header)
time.sleep(1)
if (aizhan_result != None ):
with open("ip反查结果.txt", 'a') as f:
result = "[url]:" + i + " " + " [aizhan]:" + str(aizhan_result[0])
print(result)
f.write(result + "\n")
else:
with open("反查失败列表.txt", 'a') as f:
f.write(i + "\n")
except:
pass


if __name__ == '__main__':
url_list = open("待ip反查.txt", 'r').readlines()
url_len = len(open("待ip反查.txt", 'r').readlines())
#每次启动时清空两个txt文件
if os.path.exists("反查失败列表.txt"):
f = open("反查失败列表.txt", 'w')
f.truncate()
if os.path.exists("ip反查结果.txt"):
f = open("ip反查结果.txt", 'w')
f.truncate()
for i in tqdm(url_list):
catch_result(i)

将前边收集到存在漏洞的url存在一个叫ip反查.txt的文件里,然后运行脚本

拿到解析的域名后,继续对域名权重进行检测,继续采用爱站进行权重检测,批量检测权重脚本

# -- coding:UTF-8 --
import requests
import re
import getopt
import sys
import threadpool
import urllib.parse
import urllib.request
import ssl
from urllib.error import HTTPError,URLError
import time
ssl._create_default_https_context = ssl._create_stdlib_context


headers={
'Host': 'baidurank.aizhan.com',
'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.163 Safari/537.36',
'Sec-Fetch-Dest': 'document',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9',
'Cookie': ''
}


def google_simple(url, j):
google_pc = "https://pr.aizhan.com/{}/".format(url)
bz = 0
http_or_find = 0
try:
response = requests.get(google_pc, timeout=10).text
http_or_find = 1
result_pc = re.findall(re.compile(r'谷歌PR:(.*?)/>'), response)[0]
result_num = result_pc.split('alt="')[1].split('"')[0].strip()
if int(result_num) > 0:
bz = 1
result = '[+] 谷歌权重:' + result_num + ' ' + j
return result, bz
except:
if (http_or_find != 0):
result = "[!]格式错误:" + "j"
return result, bz
else:
time.sleep(3)
return google_simple(url, j)


def getPc(domain):
aizhan_pc = 'https://baidurank.aizhan.com/api/br?domain={}&style=text'.format(domain)
try:

req = urllib.request.Request(aizhan_pc, headers=headers)
response = urllib.request.urlopen(req,timeout=10)
b = response.read()
a = b.decode("utf8")
result_pc = re.findall(re.compile(r'>(.*?)'),a)
pc = result_pc[0]

except HTTPError as u:
time.sleep(3)
return getPc(domain)

return pc

def getMobile(domain):
aizhan_pc = 'https://baidurank.aizhan.com/api/mbr?domain={}&style=text'.format(domain)
try:
# b = requests.post(url=post_url,headers=headers, proxies=proxy, timeout = 7)
# res = urllib.request.urlopen(aizhan_pc,timeout=10)
# # res = opener.open(aizhan_pc,timeout=10)
# a = res.read().decode('UTF-8')
req = urllib.request.Request(aizhan_pc, headers=headers)
response = urllib.request.urlopen(req,timeout=10)
b = response.read()
a = b.decode("utf8")
result_m = re.findall(re.compile(r'>(.*?)'),a)
mobile = result_m[0]
except HTTPError as u:
time.sleep(3)
return getMobile(domain)


return mobile
# 权重查询
def seo(name,url):

try:

result_pc = getPc(name)
result_mobile = getMobile(name)

except Exception as u:
# print(u)
result_pc = '0'
result_mobile = '0'

print('[- 目标{}获取权重失败,自动设为0'.format(url))
# print('运行正常')
print('[+ 百度权重:'+result_pc+' 移动权重:'+result_mobile+' Url:'+url)
with open('vul.txt','a',encoding='utf-8') as y:
y.write('[百度权重:'+result_pc+','+"移动权重:"+result_mobile+','+url+']'+'\n')

return True

def exp(name1):
# opts, args = getopt.getopt(sys.argv[1:], '-u:-r:', ['url', 'read'])
# print(name1)
try:
name = name1[name1.rfind('/'):].strip('/')
# print(name)
rew = seo(name,name1)

except Exception as u:
# except:
print(u)
print('[- 目标{}检测失败,已写入fail.txt等待重新检测'.format(name1))
# file_fail.write(name1+'\n')
with open('fail.txt',mode='a',encoding='utf-8') as o:
o.write(name1+'\n')


def multithreading(funcname, params=[], filename="ip.txt", pools=15):
works = []
with open(filename, "r") as f:
for i in f:
func_params = [i.rstrip("\n")] + params
works.append((func_params, None))
pool = threadpool.ThreadPool(pools)
reqs = threadpool.makeRequests(funcname, works)

[pool.putRequest(req) for req in reqs]
pool.wait()

def main():
multithreading(exp, [], "存在漏洞的url.txt", 15) # 默认15线程
print("全部check完毕,请查看当前目录下的vul.txt")

if __name__ == "__main__":
# st = False
# main(st)
main()



然后拿着有权重的站,批量根据域名反查备案名称, ip2domain , 该工具可用于对跑到的ip批量查询域名及百度权重、备案信息,快速确定ip所属企业,方便提交漏洞。
工具链接:https://github.com/Sma11New/ip2domain

python ip2domain.py -f 存在漏洞的url.txt -t 10 --icp -o 根据域名反查厂商.txt

1.png


2、查找公司基本工商信息,例如说:注册公司的所在地区,所属行业等

使用企查查或天眼查

来源:程序园用户自行投稿发布,如果侵权,请联系站长删除
免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!

相关推荐

您需要登录后才可以回帖 登录 | 立即注册