• [python]MS17-010自动化扫描脚本


    一种是3gstudent分享的调用Nsa泄露的smbtouch-1.1.1.exe实现验证,另一种是参考巡风的poc。这里整合学习了下两种不同的方法。

    import os
    import fileinput
    
    print "---This is Ms17010's tools for 139/445---"
    #ip开始
    BeginIP = raw_input(" [+] >输入开始ip:") #172.16.9.1
    #ip终点
    EndIP = raw_input(" [+] >输入终端ip:")
    
    #Log file
    fp = open('log.txt', 'w+')
    #向Smbtouch-1.1.1.xml里面按照xml的格式文档写入默认127.0.0.1
    OldIP = '      <value>127.0.0.1</value>'
    TempIP = OldIP
    print "------------------scaning----------------"
    print ""
    #切片操作
    IP1 =  BeginIP.split('.')[0]
    IP2 =  BeginIP.split('.')[1]
    IP3 =  BeginIP.split('.')[2]
    IP4 = BeginIP.split('.')[-1]
    EndIP_last = EndIP.split('.')[-1]
    
    for i in range(int(IP4)-1,int(EndIP_last)):
         ip = str(IP1+'.'+IP2+'.'+IP3+'.'+IP4)
         int_IP4 = int(IP4)
         int_IP4 += 1
         IP4 = str(int_IP4)
         NewIP= '      <value>'+ip+'</value>'
         for line in fileinput.input('Smbtouch-1.1.1.xml',inplace=1):  
         	print line.rstrip().replace(TempIP,NewIP)
         TempIP = NewIP			     
         Output = os.popen(r"Smbtouch-1.1.1.exe").read() 
         Output = Output[0:Output.find('<config',1)]
         fp.writelines(Output)
         Flag = Output.find('[-] Touch failed')
         if Flag == -1 :
    	print '[+] Touch success:	' +ip
         else:  
    	print '[-] Touch failed:	' +ip
    else:
         fp.close( )     
         for line in fileinput.input('Smbtouch-1.1.1.xml',inplace=1):  
         	print line.rstrip().replace(NewIP,OldIP)
    

      前两天看到freebuf的关于《如何转换永恒之蓝(Eternalblue)的POC》

      ms17-010 poc

    #!/usr/bin/python
    # coding: utf-8
    '''
    The poc is used to detecte MS17-010
    '''
    
    import binascii
    import socket
    import struct
    import sys
    import threading
    
    negotiate_protocol_request = binascii.unhexlify(
        "00000085ff534d4272000000001853c00000000000000000000000000000fffe00004000006200025043204e4554574f524b2050524f4752414d20312e3000024c414e4d414e312e30000257696e646f777320666f7220576f726b67726f75707320332e316100024c4d312e325830303200024c414e4d414e322e3100024e54204c4d20302e313200")
    session_setup_request = binascii.unhexlify(
        "00000088ff534d4273000000001807c00000000000000000000000000000fffe000040000dff00880004110a000000000000000100000000000000d40000004b000000000000570069006e0064006f007700730020003200300030003000200032003100390035000000570069006e0064006f007700730020003200300030003000200035002e0030000000")
    tree_connect_request = binascii.unhexlify(
        "00000060ff534d4275000000001807c00000000000000000000000000000fffe0008400004ff006000080001003500005c005c003100390032002e003100360038002e003100370035002e003100320038005c00490050004300240000003f3f3f3f3f00")
    trans2_session_setup = binascii.unhexlify(
        "0000004eff534d4232000000001807c00000000000000000000000000008fffe000841000f0c0000000100000000000000a6d9a40000000c00420000004e0001000e000d0000000000000000000000000000")
    
    
    def main(ips):
        ip = ips
        if ip != "":
            check_ip(ip)
    
        if filename != "":
            with open(filename, "r") as fp:
                for line in fp:
                    semaphore.acquire()
                    ip_address = line.strip()
                    t = threading.Thread(target=threaded_check, args=(ip_address,))
                    t.start()
    
    num_threads = 10
    timeout = 10
    filename = ""
    print_lock = threading.Lock()
    
    if len(sys.argv) == 5:
        ip = sys.argv[1]
        filename = sys.argv[2]
        timeout = sys.argv[3]
        num_threads = sys.argv[4]
        semaphore = threading.BoundedSemaphore(value=num_threads)
    else:
        print "[!] >............... "
    
    
    def print_status(ip, message):
        global print_lock
    
        with print_lock:
            print "[*] [%s] %s" % (ip, message)
    
    
    def check_ip(ip):
        global negotiate_protocol_request, session_setup_request, tree_connect_request, trans2_session_setup, timeout, verbose
        # Connect to socket
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        s.settimeout(float(timeout) if timeout else None)
        host = ip
        port = 445
        s.connect((host, port))
    
        # Send/receive negotiate protocol request
    
        print_status(ip, "正在准备协议!")
        s.send(negotiate_protocol_request)
        s.recv(1024)
    
        # Send/receive session setup request
        print_status(ip, "正在设置请求!")
        s.send(session_setup_request)
        session_setup_response = s.recv(1024)
    
        # Extract user ID from session setup response
        user_id = session_setup_response[32:34]
        print_status(ip, "用户 ID = %s" % struct.unpack("<H", user_id)[0])
    
        # Replace user ID in tree connect request packet
        modified_tree_connect_request = list(tree_connect_request)
        modified_tree_connect_request[32] = user_id[0]
        modified_tree_connect_request[33] = user_id[1]
        modified_tree_connect_request = "".join(modified_tree_connect_request)
    
        # Send tree connect request
        print_status(ip, "发送连接!!!")
        s.send(modified_tree_connect_request)
        tree_connect_response = s.recv(1024)
    
        # Extract tree ID from response
        tree_id = tree_connect_response[28:30]
        print_status(ip, "Tree ID = %s" % struct.unpack("<H", tree_id)[0])
    
        # Replace tree ID and user ID in trans2 session setup packet
        modified_trans2_session_setup = list(trans2_session_setup)
        modified_trans2_session_setup[28] = tree_id[0]
        modified_trans2_session_setup[29] = tree_id[1]
        modified_trans2_session_setup[32] = user_id[0]
        modified_trans2_session_setup[33] = user_id[1]
        modified_trans2_session_setup = "".join(modified_trans2_session_setup)
    
        # Send trans2 sessions setup request
        print_status(ip, "发送成功!正在返回!")
        s.send(modified_trans2_session_setup)
        final_response = s.recv(1024)
    
        s.close()
    
        # Check for 0x51 response to indicate DOUBLEPULSAR infection
        if final_response[34] == "x51":
            with print_lock:
                print("33[0;31m%s33[0m" % "[*]  存在:DOUBLEPULSAR !!!
    " )
    
        else:
            with print_lock:
                print "[-]  不存在DOUBLEPULSAR !!!
    "
    
    
    def threaded_check(ip_address):
        global semaphore
    
        try:
            check_ip(ip_address)
        except Exception as e:
            with print_lock:
                print "[错误] [%s] - %s" % (ip_address, e)
        finally:
            semaphore.release()
    
    
    
    
    
    if __name__ == '__main__':
        ip = '192.168.1.1'
        main(ip)
    

      扫描这里使用IPy模块处理输入扫描网段和使用multiprocessing机制

    # coding: utf-8
    # by:adislj
    import socket
    from datetime import datetime
    from multiprocessing.dummy import Pool as ThreadPool  #多线程
    import IPy
    from MS17_010_poc import *
    
    
    try:
        print '[*] >请输入你要扫描的ip段/如:192.168.1.0/24'
        remote_server = raw_input("[+] >输入ip段:") #172.16.9.0/24
        ip_list = []
        ips = IPy.IP(remote_server) #Class and tools for handling of IPv4 and IPv6 addresses and networks
        for ipx in ips:
            ip_list.append(ipx)
        ip_list = ip_list[1:-1]
        print '-' * 41
        print '[*] >你扫描的网段是:', remote_server
        print '-' * 41
        socket.setdefaulttimeout(0.5)
    except:
        pass
    
    
    def scan_port(ip_list):
        try:
            port_list = [445]
            for port in port_list:
                s = socket.socket(2, 1)
                res = s.connect_ex((str(ip_list), port))
                if res == 0:  # 如果端口开启
                    if port == 445:
                        print ip_list
                        print '[*] >端口:{}开放,正在发送MS17-010 Poc'.format(port)
                        main(str(ip_list))
                        s.close()
                    else:
                        print '.' * 41
                s.close()
    
        except Exception, e:
            print str(e.message)
    
    if remote_server != '':
        t1 = datetime.now()
        pool = ThreadPool(processes=5)
        results = pool.map(scan_port, ip_list)
        pool.close()
        pool.join()
    else:
        print '请输入ip段!'
        exit(0)
    
    
    print '[*] >MS17-010扫描完成时间:', datetime.now() - t1
    

      

  • 相关阅读:
    fastcgi性能调优(转)
    nginx location配置(转)
    elasticsearch配置文件详解(转)
    linux常用信号集
    phpstorm快捷键总结
    浅谈MVC中的service层(转)
    php中的内存管理的介绍(转)
    使用C语言开发PHP扩展(转)
    Linux恢复误删除的文件或者目录(转)
    笔记整理3——python实现MAC分析地理位置
  • 原文地址:https://www.cnblogs.com/adislj777/p/6970771.html
Copyright © 2020-2023  润新知