python脚本(渗透测试)

python爬取edusrc

通过此脚本,可以爬取edusrc的目标信息,生成目标字典,为下一步开发自动化测试工具做准备

import queue
import threading
import time

import requests
from bs4 import BeautifulSoup
import re
def get_edu_name():
    while not q.empty():
        x=q.get()
        url='https://src.sjtu.edu.cn/rank/firm/0/?page=%s'%str(x)
        try:
            s=requests.get(url).text
            print('->正在获取第%s页内容'%x)
            soup=BeautifulSoup(s,'lxml')
            edu1=soup.find_all('tr')
            for i in range(1,len(edu1)):
                edu=edu1[i].a.string
                print(edu)
                with open('eduName.txt', 'a+') as f:
                        f.write(edu + '\n')
                        f.close()
        except Exception as e:
            time.sleep(1)
            pass

if __name__=='__main__':
    q = queue.Queue()
    for i in range(1,209):
        q.put(i)
    for i in range(10):
        t=threading.Thread(target=get_edu_name)
        t.start()

python爆破shadow

 crypt这个模块只能在Linux下才能运行,此外,密码文件需要自己定义,爆破的成功率取决于字典的强大

import crypt


def testpass(shadow):
    user=shadow.split(":")[0] #获得用户名
    cryptpass=shadow.split(":")[1] #获得加密字段
    salt=cryptpass[0:cryptpass.rindex("$")] #获取盐值
    passdict=open("key.txt",'r')
    for passwd in passdict.readlines():
        passwd=passwd.strip('\n')
        cryptpasswd=crypt.crypt(passwd,salt) #将密码中的值和盐值一起加密
        if(cryptpasswd==cryptpass):
            print("[+]Found Password:", user, ":", passwd)


def main():
    shadowfile=open('/etc/shadow')
    for shadow in shadowfile.readlines():
        if "$" in shadow:
            testpass(shadow)

if __name__ == '__main__':
    main()

实验效果

python联动AWVS 

这里需要将API key和url等替换成自己的

import requests,json


api_add_url = "https://localhost:3443/api/v1/targets"
headers = {
    'X-Auth': '1986ad8c0a5b3df4d7028d5f3c06e936cc4ce04ea3d4b4ad69123594ad34b4c31',
    'Content-type': 'application/json'
}

data = '{"address":"http://vulnweb.com/","description":"create_by_reaper","criticality":"10"}'

r = requests.post(url=api_add_url, headers=headers, data=data,verify=False).json()
target_id=r['target_id']
print(r)

api_run_url='https://localhost:3443/api/v1/scans'
headers = {
    'X-Auth': '1986ad8c0a5b3df4d7028d5f3c06e936cc4ce04ea3d4b4ad69123594ad34b4c31',
    'Content-type': 'application/json'
}
data = '{"profile_id":"11111111-1111-1111-1111-111111111111","schedule":{"disable":false,"start_date":null,"time_sensitive":false},"target_id":"%s"}'% target_id

r = requests.post(url=api_run_url, headers=headers, data=data, verify=False).json()
print(r)

python联动sqlmap

实现自动添加任务进行sqlmap扫描

import requests,json
"""
python sqlmapapi.py -s  启动sqlmap-api服务
@get("/task/new")   1.创建新任务记录任务ID
@post("/option/<taskid>/set")   2.设置任务ID扫描信息
@post("/scan/<taskid>/start")   3.开始扫描对应ID任务
@get("/scan/<taskid>/status")   4.读取扫描状态判断结果
@get("/scan/<taskid>/data")     5.扫描结果查看
@get("/task/<taskid>/delete")   6.结束删除ID
"""

def new_id():
    url='http://127.0.0.1:8775/task/new'
    headers = {'Content-Type': 'application/json'}
    res=requests.get(url,headers=headers).json()
    if res['success'] is True:
        print('->1.创建新任务记录任务ID: '+res['taskid'])
        return res['taskid']
def set_id(id,scanurl):
    url = 'http://127.0.0.1:8775/option/%s/set'%id
    data={
        'url':scanurl
    }
    headers = {'Content-Type': 'application/json'}
    res = requests.post(url,data=json.dumps(data),headers=headers).json()
    if res['success'] is True:
        print('->2设置任务ID扫描信息成功 '+id+'\n'+'->3设置目标url扫描信息成功url: '+scanurl)
def start_id(id,scanurl):
    url='http://127.0.0.1:8775/scan/%s/start'%id
    data = {
        'url': scanurl
    }
    headers = {'Content-Type': 'application/json'}
    res=requests.post(url,data=json.dumps(data),headers=headers).json()
    if res['success'] is True:
        print('->4启动任务ID扫描信息成功  '+id+'url: '+scanurl)
def status_id(id):
    url='http://127.0.0.1:8775/scan/%s/status'%id
    headers = {'Content-Type': 'application/json'}
    print('->5开始扫描 ID:'+id)
    while True:
        res=requests.get(url,headers=headers).json()
        if res['status']=='running':
            continue
        else:
            print('扫描完成 ID:'+id)
            break
def data_id(id,scanurl):
    url='http://127.0.0.1:8775/scan/%s/data'%id
    headers = {'Content-Type': 'application/json'}
    resp = requests.get(url, headers=headers)
    res=requests.get(url,headers=headers).json()
    if res['data'][0]['status']==1:
        print('->6存在注入  ' + id + 'url: ' + scanurl)
        print('正在写入sqlresult.txt')
        with open('sqlresult.txt','a+') as f:
            f.write(resp.text)
            f.write('\n'+'---------------------------------')
            f.close()
            print('写入完成')
def del_id(id,scanurl):
    url='http://127.0.0.1:8775/task/%s/delete'%id
    headers = {'Content-Type': 'application/json'}
    res=requests.get(url,headers=headers).json()
    if res['success'] is True:
        print('->7删除任务信息成功  '+id+'url: '+scanurl)




if __name__ == '__main__':
    for url in open('vulnweb.txt'):
        id=new_id()
        set_id(id,url.replace('\n',''))
        start_id(id,url.replace('\n',''))
        start_id(id,url.replace('\n',''))
        status_id(id)
        data_id(id,url)
        del_id(id,url)
        print('------------------------------------')

python联动Xray并实现微信推送

这里需要用到server酱

import time

from flask import Flask, request
import requests

app = Flask(__name__)


@app.route('/webhook', methods=['POST'])
def test():
    wx = 'https://sctapi.ftqq.com/SCT222793TLvGVTGB4O6fpNbfmt7IBwEy.send?title=xray'
    try:
        vuln = request.json
        type = vuln.get('type')  # 使用.get()方法可以避免在键不存在时抛出KeyError
        plugin = vuln.get('data', {}).get('plugin')
        url = vuln.get('data', {}).get('target',{}).get('url')
        content = """## Xray发现了新漏洞  
        发现漏洞类型:{type}  
        发现漏洞插件:{plugin}  
        发现漏洞url:{url}  
        """.format(type=type, plugin=plugin, url=url)
        print(content)
        data = {
            'desp': content
        }
        print(data)
        requests.post(wx, data=data)
        return 'ok'
    except Exception as e:
        time.sleep(1)
        pass


if __name__ == '__main__':
    app.run()

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值