【 Grey Hack 】万金油脚本:路由器漏洞检测
生活随笔
收集整理的這篇文章主要介紹了
【 Grey Hack 】万金油脚本:路由器漏洞检测
小編覺得挺不錯的,現(xiàn)在分享給大家,幫大家做個參考.
目錄
- 腳本源碼
- 用法
- 效果及示例
版本:Grey Hack v0.7.3618 - Alpha
腳本源碼
if params.len != 2 or params[0] == "-h" or params[0] == "--help" then exit("<b>Usage: "+program_path.split("/")[-1]+" [ip_address] [LAN_address]</b>") metaxploit = include_lib("/lib/metaxploit.so") if not metaxploit thenmetaxploit = include_lib(current_path + "/metaxploit.so") end if if not metaxploit then exit("Error: Can't find metaxploit library in the /lib path or the current folder")address = params[0] net_session = metaxploit.net_use( address ) if not net_session then exit("Error: can't connect to net session") libKernel = net_session.dump_libprint("Founded " + libKernel.lib_name + " "+ libKernel.version)if not libKernel then exit("Error: " + libName + " not found.")lanIp = params[1]kernel_router_exploits = metaxploit.scan(libKernel) for kernel_router_exploit in kernel_router_exploitsprint(kernel_router_exploit)result_lists = metaxploit.scan_address(libKernel, kernel_router_exploit).split("Unsafe check: ")[1:]for result_list in result_liststarget_str = result_list.split(".")[0]target_key = target_str.split(" ")[-1]result = libKernel.overflow(kernel_router_exploit, target_key[3:-4], lanIp)print(target_key + ": " + typeof(result))print(result_list)end for end for exit("Done...")用法
【腳本名】 【公網(wǎng)IP】 【局域網(wǎng)IP】
效果及示例
先檢測目標端口庫版本
再嘗試遍歷檢測對應(yīng)漏洞的內(nèi)存地址、關(guān)鍵字和漏洞類型
并打印觸發(fā)條件、所獲得的權(quán)限或失敗原因
如圖,本案例中目標IP尚未開放常見端口
總結(jié)
以上是生活随笔為你收集整理的【 Grey Hack 】万金油脚本:路由器漏洞检测的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: CSS3 FlexBox布局入门简析
- 下一篇: 【BZOJ】1679: [Usaco20