Skip to content

Commit cbc8d61

Browse files
committed
up
1 parent 05efd6b commit cbc8d61

File tree

21 files changed

+48
-36
lines changed

21 files changed

+48
-36
lines changed

crawler/crawler/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
# http://scrapy.readthedocs.org/en/latest/topics/downloader-middleware.html
1010
# http://scrapy.readthedocs.org/en/latest/topics/spider-middleware.html
1111
import os,sys
12-
exp10it_module_path = os.path.expanduser("~")+"/mypypi"
12+
exp10it_module_path = os.path.expanduser("~")+"/exp10it"
1313
sys.path.insert(0, exp10it_module_path)
1414
exploit_path = os.path.abspath("...")
1515
sys.path.insert(0, exploit_path)

crawler/crawler/spiders/exp10it_spider.py

Lines changed: 24 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
import scrapy
77
from scrapy_splash import SplashRequest
88
from crawler.items import CrawlerItem
9-
exp10it_module_path = os.path.expanduser("~")+"/mypypi"
9+
exp10it_module_path = os.path.expanduser("~")+"/exp10it"
1010
sys.path.insert(0, exp10it_module_path)
1111
from exploit import get_url_cookie
1212
from exploit import get_url_belong_main_target_domain
@@ -78,10 +78,11 @@ def add_url_templet_to_collected_urls(self, url):
7878
url=re.sub(r"(#[^\?]*)$","",url)
7979
parsed = urlparse(url)
8080
if len(parsed)<4:
81-
pdb.set_trace()
81+
input(77777777777)
82+
#pdb.set_trace()
8283
url_page = parsed[0] + "://" + parsed[1] + \
8384
(parsed[2] if "^" not in parsed[2] else parsed[2].split('^')[0])
84-
param_part = parsed[2].split("^")[1] if "^" in url else parsed[4]
85+
param_part = parsed[4].split("^")[1] if "^" in url else parsed[4]
8586
param_list = param_part.split("&")
8687
pure_param_list = []
8788
if param_list != ['']:
@@ -161,9 +162,10 @@ def start_requests(self):
161162
args={'lua_source': self.lua_script, 'http_method': 'POST',
162163
'body': post_data})
163164
else:
164-
if url=="http://m.pingan.com/":
165-
input(6666666666)
166-
pdb.set_trace()
165+
if "m.pingan.com" in url:
166+
pass
167+
#input(6666666666)
168+
#pdb.set_trace()
167169
yield SplashRequest(url, self.parse_get, endpoint='execute',
168170
magic_response=True, meta={'handle_httpstatus_all': True},
169171
args={'lua_source': self.lua_script})
@@ -195,17 +197,21 @@ def parse_get(self, response):
195197
item['like_webshell_url'] == True
196198

197199
if item['current_url']=="http://m.pingan.com/":
198-
pdb.set_trace()
199-
yield item
200+
pass
201+
#input(111111)
202+
#pdb.set_trace()
203+
return item
200204

201205
url_main_target_domain = get_url_belong_main_target_domain(
202206
self.start_url)
203207

204208
for url in urls:
205209
url_templet_list=get_url_templet_list(url)
206210
url_http_domain = get_http_domain_from_url(url)
207-
if url=="http://m.pingan.com/":
208-
pdb.set_trace()
211+
if "m.pingan.com" in url:
212+
pass
213+
#input(22222222)
214+
#pdb.set_trace()
209215
if url_is_sub_domain_to_http_domain(url, urlparse(url)[0] + "://" + url_main_target_domain) and url_http_domain not in item['sub_domains_list']:
210216
item['sub_domains_list'].append(url_http_domain)
211217
if urlparse(url).hostname != self.domain:
@@ -241,8 +247,10 @@ def parse_get(self, response):
241247
elif match_logoff:
242248
pass
243249
else:
244-
if url=="http://m.pingan.com/":
245-
pdb.set_trace()
250+
if "m.pingan.com" in url:
251+
pass
252+
#input(3333333333)
253+
#pdb.set_trace()
246254
yield SplashRequest(url, self.parse_get, endpoint='execute', magic_response=True, meta={'handle_httpstatus_all': True}, args={'lua_source': self.lua_script})
247255

248256
def parse_post(self, response):
@@ -263,5 +271,7 @@ def parse_post(self, response):
263271
item['like_webshell_url'] == True
264272

265273
if item['current_url']=="http://m.pingan.com/":
266-
pdb.set_trace()
267-
yield item
274+
pass
275+
#input(66666666666)
276+
#pdb.set_trace()
277+
return item

develop.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,13 +41,13 @@ cms_url = get_cms_entry_from_start_url(target):
4141
4242
exploit.py文件中:
4343
44-
get_target_urls_from_db(target,"exp10itdb"):
44+
get_target_urls_from_db(target,"exploitdb"):
4545
简介:用于从数据库中取出已经完成的爬虫后的目标的所有url,用于漏洞检测
46-
参数:target为目标url,目前第2个参数固定为"exp10itdb"
46+
参数:target为目标url,目前第2个参数固定为"exploitdb"
4747
返回值:目标url列表,返回值是列表形式,列表中的第个值为url,但是有类特殊的url(url中包含"^"符号),这类特殊的url表示
4848
post类型的url,"^"之后的值为post的内容
4949
用法示例:
50-
get_target_urls_from_db("https://www.baidu.com/cms","exp10itdb")的返回值为:
50+
get_target_urls_from_db("https://www.baidu.com/cms","exploitdb")的返回值为:
5151
['https://www.baidu.com/cms/admin.php',
5252
'https://www.baidu.com/cms/index.php?a=1&b=2',
5353
'https://www.baidu.com/cms/upload.php^filename=1.php&Submit=Submit',

exploit.py

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
import re
44
import os
55
import sys
6-
exp10it_module_path = os.path.expanduser("~")+"/mypypi"
6+
exp10it_module_path = os.path.expanduser("~")+"/exp10it"
77
sys.path.insert(0, exp10it_module_path)
88
import warnings
99
from concurrent import futures
@@ -1236,7 +1236,8 @@ def get_target_table_name_info(target):
12361236
if not target_is_pang_domain and not target_is_sub_domain:
12371237
# 这时target为主要目标
12381238
if target == "http://m.pingan.com/":
1239-
pdb.set_trace()
1239+
input(78787878)
1240+
# pdb.set_trace()
12401241
if get_main_target_table_name(target) == "targets":
12411242
target_is_main_and_table_is_targets = True
12421243
elif get_main_target_table_name(target) == "first_targets":

exps/cmdi/cmdi.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
import time
44
import sys
55

6-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
6+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
77
sys.path.insert(0, exp10it_module_path)
88
from exp10it import CLIOutput
99

exps/code_leak/code_leak.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
import os
33
import sys
44

5-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
5+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
66
sys.path.insert(0, exp10it_module_path)
77

88
from exp10it import get_request

exps/heartbleed/heartbleed.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
import re
22
import os
33
import sys
4-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
4+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
55
sys.path.insert(0, exp10it_module_path)
66
from urllib.parse import urlparse
77
from exp10it import get_string_from_command

exps/iis/iis.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
import re
22
import os
33
import sys
4-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
4+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
55
sys.path.insert(0, exp10it_module_path)
66
from exp10it import get_server_type
77
from exp10it import get_string_from_command

exps/j_security_check/j_security_check.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
import sys
44
from requests.packages.urllib3.exceptions import InsecureRequestWarning
55

6-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
6+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
77
sys.path.insert(0, exp10it_module_path)
88

99
from exp10it import COMMON_NOT_WEB_PORT_LIST

exps/joomla_rce/joomla_rce.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
# joomla_exp write php shell to joomla root dir
66
import os
77
import sys
8-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
8+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
99
sys.path.insert(0, exp10it_module_path)
1010
import re
1111
import time

exps/lfi/lfi.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
import sys
44
import requests
55

6-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
6+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
77
sys.path.insert(0, exp10it_module_path)
88
from exp10it import CLIOutput
99

exps/ms08-067/ms08-067.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
import os
22
import sys
33

4-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
4+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
55
sys.path.insert(0, exp10it_module_path)
66

77
import re

exps/ms17-010/ms17-010.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
import re
22
import os
33
import sys
4-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
4+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
55
sys.path.insert(0, exp10it_module_path)
66
import time
77
from urllib.parse import urlparse

exps/shellshock/shellshock.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
import sys
66
from urllib.parse import urlparse
77

8-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
8+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
99
sys.path.insert(0, exp10it_module_path)
1010
from exploit import get_target_urls_from_db
1111
from exploit import execute_sql_in_db

exps/solr/solr.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
import sys
44
from requests.packages.urllib3.exceptions import InsecureRequestWarning
55

6-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
6+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
77
sys.path.insert(0, exp10it_module_path)
88

99
from requests.packages.urllib3.exceptions import InsecureRequestWarning

exps/struts2/struts2.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
import re
88
import os
99
import sys
10-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
10+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
1111
sys.path.insert(0, exp10it_module_path)
1212
from urllib.parse import urlparse
1313
from exp10it import CLIOutput

exps/uddiexplorer_SearchPublicRegistries/uddiexplorer_SearchPublicRegistries.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
import os
44
import sys
55

6-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
6+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
77
sys.path.insert(0, exp10it_module_path)
88

99
from exploit import get_target_table_name_list

exps/unauthorize/unauthorize.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
import os
22
import sys
33
import re
4-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
4+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
55
sys.path.insert(0, exp10it_module_path)
66
import requests
77
from exp10it import CLIOutput

exps/weblogic/weblogic.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
import os
44
import sys
55
from urllib.parse import urlparse
6-
exp10it_module_path = os.path.expanduser("~") + "/mypypi"
6+
exp10it_module_path = os.path.expanduser("~") + "/exp10it"
77
sys.path.insert(0, exp10it_module_path)
88

99

ipproxypool_scrapysplash_server.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
import os
22
import sys
33

4-
exp10it_module_path = os.path.expanduser("~")+"/mypypi"
4+
exp10it_module_path = os.path.expanduser("~")+"/exp10it"
55
sys.path.insert(0, exp10it_module_path)
66

77
from exp10it import start_ipproxypool

readme.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ assume no liability and are not responsible for any misuse or damage caused by t
77
### Install
88

99
git clone https://github.com/3xp10it/exploit.git
10+
cd exploit && pip3 install -r requirements.txt
1011

1112
### Usage
1213

0 commit comments

Comments
 (0)