【 Grey Hack 】万金油脚本:路由器漏洞检测
生活随笔
收集整理的这篇文章主要介绍了
【 Grey Hack 】万金油脚本:路由器漏洞检测
小编觉得挺不错的,现在分享给大家,帮大家做个参考.
目录
- 脚本源码
- 用法
- 效果及示例
版本:Grey Hack v0.7.3618 - Alpha
脚本源码
if params.len != 2 or params[0] == "-h" or params[0] == "--help" then exit("<b>Usage: "+program_path.split("/")[-1]+" [ip_address] [LAN_address]</b>") metaxploit = include_lib("/lib/metaxploit.so") if not metaxploit thenmetaxploit = include_lib(current_path + "/metaxploit.so") end if if not metaxploit then exit("Error: Can't find metaxploit library in the /lib path or the current folder")address = params[0] net_session = metaxploit.net_use( address ) if not net_session then exit("Error: can't connect to net session") libKernel = net_session.dump_libprint("Founded " + libKernel.lib_name + " "+ libKernel.version)if not libKernel then exit("Error: " + libName + " not found.")lanIp = params[1]kernel_router_exploits = metaxploit.scan(libKernel) for kernel_router_exploit in kernel_router_exploitsprint(kernel_router_exploit)result_lists = metaxploit.scan_address(libKernel, kernel_router_exploit).split("Unsafe check: ")[1:]for result_list in result_liststarget_str = result_list.split(".")[0]target_key = target_str.split(" ")[-1]result = libKernel.overflow(kernel_router_exploit, target_key[3:-4], lanIp)print(target_key + ": " + typeof(result))print(result_list)end for end for exit("Done...")用法
【脚本名】 【公网IP】 【局域网IP】
效果及示例
先检测目标端口库版本
再尝试遍历检测对应漏洞的内存地址、关键字和漏洞类型
并打印触发条件、所获得的权限或失败原因
如图,本案例中目标IP尚未开放常见端口
总结
以上是生活随笔为你收集整理的【 Grey Hack 】万金油脚本:路由器漏洞检测的全部内容,希望文章能够帮你解决所遇到的问题。
- 上一篇: CSS3 FlexBox布局入门简析
- 下一篇: 【BZOJ】1679: [Usaco20