├── img ├── image-20240829092224067.png ├── image-20240829094227477.png ├── image-20240829094354293.png ├── image-20240829100019917.png ├── image-20240908233120141.png ├── image-20240908233510469.png ├── image-20240908233701996.png ├── image-20240908235659706.png ├── image-20240909000500045.png ├── image-20240909005651301.png ├── image-20241013191315747.png ├── image-20241022001135114.png ├── image-20241022001225844.png ├── image-20241022010715099.png ├── image-20241022140046945.png ├── image-20250115164812928.png ├── image-20250115172430938.png └── image-20250605215208788.png ├── main.go ├── LICENSE ├── 更新日志.md ├── P1soda - Poc文档.md ├── UpdateLog.md ├── README.md └── P1soda - 插件使用指南.md /img/image-20240829092224067.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240829092224067.png -------------------------------------------------------------------------------- /img/image-20240829094227477.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240829094227477.png -------------------------------------------------------------------------------- /img/image-20240829094354293.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240829094354293.png -------------------------------------------------------------------------------- /img/image-20240829100019917.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240829100019917.png -------------------------------------------------------------------------------- /img/image-20240908233120141.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240908233120141.png -------------------------------------------------------------------------------- /img/image-20240908233510469.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240908233510469.png -------------------------------------------------------------------------------- /img/image-20240908233701996.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240908233701996.png -------------------------------------------------------------------------------- /img/image-20240908235659706.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240908235659706.png -------------------------------------------------------------------------------- /img/image-20240909000500045.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240909000500045.png -------------------------------------------------------------------------------- /img/image-20240909005651301.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20240909005651301.png -------------------------------------------------------------------------------- /img/image-20241013191315747.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20241013191315747.png -------------------------------------------------------------------------------- /img/image-20241022001135114.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20241022001135114.png -------------------------------------------------------------------------------- /img/image-20241022001225844.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20241022001225844.png -------------------------------------------------------------------------------- /img/image-20241022010715099.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20241022010715099.png -------------------------------------------------------------------------------- /img/image-20241022140046945.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20241022140046945.png -------------------------------------------------------------------------------- /img/image-20250115164812928.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20250115164812928.png -------------------------------------------------------------------------------- /img/image-20250115172430938.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20250115172430938.png -------------------------------------------------------------------------------- /img/image-20250605215208788.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/P001water/P1soda/HEAD/img/image-20250605215208788.png -------------------------------------------------------------------------------- /main.go: -------------------------------------------------------------------------------- 1 | package main 2 | 3 | import "fmt" 4 | 5 | func main() { 6 | 7 | fmt.Printf("this is P1soda") 8 | } 9 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2024 P001 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /更新日志.md: -------------------------------------------------------------------------------- 1 | v0.0.6 2 | 3 | 功能更新优化较多,建议尽快更新 4 | 5 | 1. [功能优化] 接入了最新P1finger指纹扫描工具,指纹识别结果更丰富 6 | 2. [功能优化] 优化了漏洞扫描引擎,添加了诸多Poc 7 | 3. [功能优化] 优化输出结果统计显示,方便观察和下一步使用 8 | 4. [功能增加] 优化了Netspy模块,优化了网段统计聚合显示 9 | 5. [功能增加] 增加了主机信息收集插件,详情参见 10 | 11 | 12 | 13 | v0.0.5 14 | 15 | 1. [功能增加] ping命令探测模式下增加目标主机类型模糊判断 16 | 2. [功能增加] 内网网段探测 17 | 3. [其他修改] 删除了 [-tc] 参数,可直接调用 [ -t ]参数 18 | 4. [其他修改] 修改了主机存活探测选项 [-pt],ping探测使用[-pt ping]; icmp探测使用[-pt icmp] 19 | 5. [其他修改] release 版本方便使用简写为 `soda` 20 | 21 | v0.0.4 22 | 23 | 1. [功能增加] redis 未授权检测和系统信息提取 24 | 25 | image-20241022001135114 26 | 27 | 2. [功能增加] ms17010永恒之蓝检测 (没研究过,抄的k8gege的) 28 | 29 | image-20241022001225844 30 | 31 | 3. [功能增加] hikivision版本信息检测和漏洞poc添加 32 | 33 | image-20241022010715099 34 | 35 | v0.0.3 36 | 37 | 1. 添加默认扫描端口(fofa上的vnc端口top 5) 38 | 2. 增加vnc服务未授权识别和爆破 39 | 40 | image-20241013191315747 41 | 42 | v0.0.2 43 | 44 | 1. 增加网段输入方法,比如扫描C段,P1soda -t 192.168.110.1/24 45 | 2. 修改http/https判断功能 46 | 3. 增加poc和指纹信息 47 | 48 | 49 | 50 | v0.0.1 51 | 52 | 1. 基本功能更新 53 | 54 | -------------------------------------------------------------------------------- /P1soda - Poc文档.md: -------------------------------------------------------------------------------- 1 | P1soda Poc库 2 | 3 | ``` 4 | |-- 74cms-weixin-sqli.yaml 5 | |-- UEditor 6 | | `-- ueditor_file_upload.yml 7 | |-- docker 8 | |-- exchange-version-Detection.yaml 9 | |-- exposed-docker-api.yaml 10 | |-- gitlab 11 | | `-- gitlab-CVE-2021-22205-Preauth-RCE-\264\355\316\363\316\264\321\351\326\244.yaml 12 | |-- hikivision 13 | | |-- hikivision-CVE-2021-7921-infoLeak.yaml 14 | | |-- hikivision-version-Detection.yaml 15 | | |-- hikvision-cve-2021-36260.yml 16 | | |-- hikvision-isecure-info-leak.yaml 17 | | |-- hikvision-ivms-file-upload-bypass.yaml 18 | | |-- hikvision-ivms-file-upload-rce.yaml 19 | | `-- hikvision-js-files-upload.yaml 20 | |-- jenkins 21 | | |-- jenkins-asyncpeople.yaml 22 | | |-- jenkins-script.yaml 23 | | |-- jenkins-stack-trace.yaml 24 | | `-- jenkins-unauthenticated.yaml 25 | |-- nacos 26 | | |-- nacos-auth-bypass.yaml 27 | | `-- nacos-version.yaml 28 | |-- phpmyadmin-unauth.yaml 29 | |-- sangfor-ba-rce.yaml 30 | |-- sangfor-edr-auth-bypass.yaml 31 | |-- sangfor-edr-rce.yaml 32 | |-- sangfor-login-rce.yaml 33 | |-- sangfor-ngaf-lfi.yaml 34 | |-- seeyon-config-exposure.yaml 35 | |-- seeyon-createmysql-exposure.yaml 36 | |-- seeyon-initdata-exposure.yaml 37 | |-- seeyon-oa-setextno-sqli.yaml 38 | |-- seeyon-oa-sp2-file-upload.yaml 39 | |-- thinkphp 40 | | |-- thinkphp-2-rce.yaml 41 | | |-- thinkphp-501-rce.yaml 42 | | |-- thinkphp-5022-rce.yaml 43 | | |-- thinkphp-5023-rce.yaml 44 | | |-- thinkphp-509-information-disclosure.yaml 45 | | `-- thinkphp6-arbitrary-write.yaml 46 | |-- tomcat 47 | | `-- tomcat_manager_leak.yml 48 | |-- vmwareEsxi 49 | | |-- Vmware_ESXI-Detection.yaml 50 | | |-- vcenter-CVE-2021-21972.yml 51 | | |-- vcenter-CVE-2021-21985.yml 52 | | |-- vcenter-CVE-2021-22005.yml 53 | | `-- vmware-CVE-2022-22954.yml 54 | |-- wooyun-2015-148227.yaml 55 | |-- zabbix 56 | | `-- zabbix-cve-2022-23231.yml 57 | |-- zhiyuan-file-upload.yaml 58 | |-- zhiyuan-oa-info-leak.yaml 59 | `-- zhiyuan-oa-session-leak.yaml 60 | ``` 61 | 62 | -------------------------------------------------------------------------------- /UpdateLog.md: -------------------------------------------------------------------------------- 1 | > 更新日志见README.md的底部 2 | 3 | 4 | 5 | # 碎碎念 6 | 7 | * 关于漏洞检测功能 8 | 9 | 漏洞检测功能用的是nuclei的poc。nuclei发展到现在,功能太多导致即使是直接调用SDK打包后的体积也不少于70M。 10 | 11 | 于是从头实现了nuclei的检测引擎,但是修改了nuclei Poc的Tag字段,整合poc的tag,并根据指纹识别的结果扫描对应标签内Poc 12 | 13 | * 默认扫描端口的选择 14 | 15 | 默认扫描端口由三部分组成 16 | 17 | 1. 著名服务的固定端口,如ssh 22,rdp 3389等 18 | 2. fofa、hunter等统计的服务端口top10端口,如ftp端口top10,其他同理 19 | 3. web服务的端口,统计fofa、hunter常见OA、cms系统top 10分布端口汇总 20 | 21 | 默认扫描端口如下 22 | 23 | ``` 24 | var WebPort = []int{21, 22, 25, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 98, 99, 135, 139, 143, 443, 445, 587, 800, 801, 808, 880, 888, 889, 1000, 1010, 1080, 1081, 1082, 1099, 1118, 1433, 1443, 1521, 1888, 2008, 2020, 2022, 2100, 2375, 2379, 3000, 3306, 3389, 3505, 5432, 5555, 6080, 6379, 6648, 6868, 7000, 7001, 7002, 7003, 7004, 7005, 7007, 7008, 7070, 7071, 7074, 7078, 7080, 7088, 7200, 7680, 7687, 7688, 7777, 7890, 8000, 8001, 8002, 8003, 8004, 8006, 8008, 8009, 8010, 8011, 8012, 8016, 8018, 8020, 8028, 8030, 8038, 8042, 8044, 8046, 8048, 8053, 8060, 8069, 8070, 8080, 8081, 8082, 8083, 8084, 8085, 8086, 8087, 8088, 8089, 8090, 8091, 8092, 8093, 8094, 8095, 8096, 8097, 8098, 8099, 8100, 8101, 8108, 8118, 8161, 8172, 8180, 8181, 8200, 8222, 8244, 8258, 8280, 8288, 8300, 8360, 8443, 8448, 8484, 8500, 8800, 8834, 8838, 8848, 8858, 8868, 8879, 8880, 8881, 8888, 8889, 8899, 8917, 8983, 8989, 9000, 9001, 9002, 9008, 9010, 9043, 9060, 9080, 9081, 9082, 9083, 9084, 9085, 9086, 9087, 9088, 9089, 9090, 9091, 9092, 9093, 9094, 9095, 9096, 9097, 9098, 9099, 9100, 9190, 9200, 9443, 9448, 9458, 9800, 9981, 9986, 9988, 9998, 9999, 10000, 10001, 10002, 10004, 10008, 10010, 10250, 10443, 11211, 12018, 12443, 14000, 16080, 18000, 19001, 20000, 20720, 20880, 21000, 30000, 50000, 50001} 25 | ``` 26 | 27 | 默认端口会持续更新 28 | 29 | 30 | 31 | * ftp、mysql等爆破模块的设计 32 | 33 | 爆破模块更具智能化,根据端口响应判断是否继续爆破,减少爆破模块的动静。 34 | 35 | 36 | 37 | * 和现有的内网扫描工具的区别 38 | 39 | P1soda工具的定位是内网扫描工具,同类型最出名的就是fscan了,笔者也做过fscan的二开,但是二开总会被工具原有的架构限制。于是从头设计了这款P1soda,寻求一个自己的解决方案 40 | 41 | 个人感觉goland对于安全工具的开发已经进入到了一个什么类型的工具都有,都可以找到借鉴。 42 | 但是每个开发者又都有自己的使用习惯和思考。P1soda则是我结合实战需求在工具开发上的尝试。 43 | 44 | 45 | 46 | * 后续功能开发 47 | 48 | 原本计划的功能还包括网段探测,redis未授权检测等等,只是当前计划有变,于是暂缓了 49 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | ![image-20240829092224067](./img/image-20240829092224067.png) 2 | 3 |

P1soda 一款更高、更快、更强的全方位内网扫描工具

4 | 5 | --- 6 | 7 | 8 | 9 | P1soda (苏打水)是一款常规内网渗透场景下的全方位漏洞扫描工具,Powered by P001water 10 | 11 | 12 | 13 | ## Version 14 | 15 | 当前最新版本 `v0.0.6` (2025/6/08更新)[更新日志参见](https://github.com/P001water/P1soda/blob/master/更新日志.md) 16 | 17 | 18 | 19 | # 功能特色 20 | 21 | * 主机存活探测 22 | 23 | 充分适应内网场景,支持多种格式输入 24 | 25 | 例如`[-t 10.0.10.60/24]; [-t 10.0.10.60]; [-t 10.0.10.60-255]; [-t 10.0.10.60,10.0.10.61]` 26 | 27 | 支持ping命令探测( version > 0.0.5 默认选择ping命令探测),ICMP echo发包探测 28 | 29 | * 内网网段探测 30 | 31 | 快速探测内网可达网段,参考插件模式调用 32 | 33 | 例子:探测B段,`[-plg netspy -cidr 192.168.8.10/16]` 34 | 35 | * 端口指纹识别 36 | 37 | 基于nmap-service-probes指纹实现的Mini nmap端口指纹识别引擎,出于工具体积和最小化请求原则只是从全部指纹中提取关键指纹 38 | 39 | 如下14条nmap Probe,支持指纹识别如下协议服务: 40 | 41 | ``` 42 | ftp、monetdb、mysql、ssh、postgresql、 43 | socks5、socks4、JDWP、mssql、memcached 44 | redis、adb、VNC 45 | ``` 46 | 47 | * web 侧信息探测 48 | 49 | http请求时User-Agent头随机化,基本web信息探测,http响应状态码,webTitle标题等 50 | 51 | * web 重点资产指纹识别 52 | 53 | 从P1finger中精简的内网常见系统的指纹 54 | 55 | * web 漏洞检测 56 | 57 | 从头实现的Mini Nuclei引擎,体积小于 2 M,支持nuclei的POC 58 | 59 | * OXID Resolver DCOM接口未授权网卡探测 60 | 61 | socket Raw连接发包解决,避免调包,最小化工具体积 62 | 63 | * NetBIOS 137 139 主机信息探测 64 | 65 | 137 NBNS、139 NTLMSSP协议中的主机信息提取,137 NBNS协议域控识别 66 | 67 | * 常见服务爆破功能,例如ssh、ftp、mysql、vnc等等 68 | 69 | 根据返回报文更加智能化的服务爆破,减少无用的爆破,目前支持爆破模块 70 | 71 | ``` 72 | Ftp 73 | mysql 74 | ssh 75 | vnc 76 | ``` 77 | 78 | * socks5、http代理使用 79 | 80 | 支持socks5、http代理使用 81 | 82 | * MS-17010检测,redis未授权,vnc未授权检测等等 83 | 84 | 85 | 86 | # 基本使用 87 | 88 | 工具参数如下图,默认情况下不开启服务爆破功能 89 | 90 | ![image-20250115172430938](./img/image-20250115172430938.png) 91 | 92 | * 入门使用 93 | 94 | 单个、多个目标探测,支持CIDR网段输入 95 | 96 | ``` 97 | P1soda.exe -t 192.168.110.235 // 单个目标 98 | P1soda.exe -t 192.168.110.2-235 // 多个目标 99 | P1soda.exe -t 192.168.110.143,192.168.110.251 // 多个目标 100 | P1soda.exe -t 192.168.110.235/24 // 扫描110 C段 101 | ``` 102 | 103 | ![image-20240908233120141](./img/image-20240908233120141.png) 104 | 105 | * 内网网段探测 106 | 107 | ``` 108 | .\P1soda.exe -plg netspy -cidr 192.168.0.0/16 109 | ``` 110 | 111 | ![image-20250115164812928](./img/image-20250115164812928.png) 112 | 113 | * 指定用户名密码爆破 114 | 115 | ``` 116 | .\P1soda.exe -t 127.0.0.1 -br -user root,admin -pwd 123456 // -br 开启爆破模式,默认情况不开启 117 | ``` 118 | 119 | ![image-20240908233510469](./img/image-20240908233510469.png) 120 | 121 | * 输出保存文件 122 | 123 | ``` 124 | .\P1soda.exe -t 127.0.0.1 -br -nc -o // -br开启爆破模式, -o输出重定向到p1.txt, -nc取消颜色输出 125 | ``` 126 | 127 | ![image-20240908233701996](./img/image-20240908233701996.png) 128 | 129 | * 针对url的检测 130 | 131 | 单个url目标 132 | 133 | ``` 134 | .\P1soda.exe -u http://192.168.110.251 135 | ``` 136 | 137 | ![image-20240909000500045](./img/image-20240909000500045.png) 138 | 139 | 多个目标 140 | 141 | ``` 142 | .\P1soda.exe -uf .\targets.txt 143 | ``` 144 | 145 | ![image-20240908235659706](./img/image-20240908235659706.png) 146 | 147 | * Debug 测试信息 148 | 149 | ``` 150 | .\P1soda.exe -u http://192.168.110.143:8888 -dbg 151 | ``` 152 | 153 | debug显示一些poc信息,http请求信息 154 | 155 | ![image-20240909005651301](./img/image-20240909005651301.png) 156 | -------------------------------------------------------------------------------- /P1soda - 插件使用指南.md: -------------------------------------------------------------------------------- 1 | ## Netspy 网段探测插件 2 | 3 | 需要的参数如下 4 | 5 | ``` 6 | -plg netspy //指定插件 7 | -spymode rapid (默认值) / depth //rapid 急速探测,depth 深度探测 8 | -cidr 10.10.10.10/16 //指定网段 9 | ``` 10 | 11 | 命令行使用示例 `P1soda.exe -plg netspy -cidr 38.45.22.41/22,101.43.3.46/16` 12 | 13 | ``` 14 | P1soda (苏打水) 是一款迈向更高、更快、更强的全方位内网扫描工具, Powered by P001water 15 | beta_version: 0.0.6 16 | 17 | [INF] 38.45.22.41/22 is from 38.45.20.0 to 38.45.23.255 18 | [INF] 101.43.3.46/16 is from 101.43.0.0 to 101.43.255.255 19 | [INF] NetSpy mode: rapid 20 | [INF] NetSpy num 520 ; spy example: [38.45.20.1 38.45.20.252] 21 | [INF] 38.45.23.1 up --> 38.45.23.1/24 22 | [INF] 38.45.22.1 up --> 38.45.22.1/24 23 | [INF] 101.43.10.111 up --> 101.43.10.111/24 24 | [INF] 101.43.2.135 up --> 101.43.2.135/24 25 | [INF] 101.43.9.170 up --> 101.43.9.170/24 26 | [INF] 101.43.4.75 up --> 101.43.4.75/24 27 | [INF] 101.43.27.17 up --> 101.43.27.17/24 28 | [INF] 101.43.34.196 up --> 101.43.34.196/24 29 | [INF] 101.43.33.84 up --> 101.43.33.84/24 30 | [INF] 101.43.16.173 up --> 101.43.16.173/24 31 | [INF] 101.43.29.83 up --> 101.43.29.83/24 32 | [INF] 101.43.6.8 up --> 101.43.6.8/24 33 | [INF] 101.43.31.223 up --> 101.43.31.223/24 34 | [INF] 101.43.1.218 up --> 101.43.1.218/24 35 | [INF] 101.43.22.37 up --> 101.43.22.37/24 36 | [INF] 101.43.21.16 up --> 101.43.21.16/24 37 | [INF] 101.43.15.86 up --> 101.43.15.86/24 38 | [INF] 101.43.28.116 up --> 101.43.28.116/24 39 | [INF] 101.43.19.32 up --> 101.43.19.32/24 40 | [INF] 101.43.35.189 up --> 101.43.35.189/24 41 | [INF] 101.43.20.214 up --> 101.43.20.214/24 42 | [INF] 101.43.37.136 up --> 101.43.37.136/24 43 | [INF] 101.43.53.154 up --> 101.43.53.154/24 44 | [INF] 101.43.55.241 up --> 101.43.55.241/24 45 | [INF] 101.43.48.241 up --> 101.43.48.241/24 46 | [INF] 101.43.40.30 up --> 101.43.40.30/24 47 | [INF] 101.43.47.235 up --> 101.43.47.235/24 48 | [INF] 101.43.39.166 up --> 101.43.39.166/24 49 | [INF] 101.43.43.196 up --> 101.43.43.196/24 50 | [INF] 101.43.66.89 up --> 101.43.66.89/24 51 | [INF] 101.43.59.222 up --> 101.43.59.222/24 52 | [INF] 101.43.65.149 up --> 101.43.65.149/24 53 | [INF] 101.43.62.253 up --> 101.43.62.253/24 54 | [INF] 101.43.67.47 up --> 101.43.67.47/24 55 | [INF] 101.43.73.133 up --> 101.43.73.133/24 56 | [INF] 101.43.69.110 up --> 101.43.69.110/24 57 | [INF] 101.43.77.103 up --> 101.43.77.103/24 58 | [INF] 101.43.74.65 up --> 101.43.74.65/24 59 | [INF] 101.43.82.123 up --> 101.43.82.123/24 60 | [INF] 101.43.70.46 up --> 101.43.70.46/24 61 | [INF] 101.43.83.124 up --> 101.43.83.124/24 62 | [INF] 101.43.71.191 up --> 101.43.71.191/24 63 | [INF] 101.43.85.84 up --> 101.43.85.84/24 64 | [INF] 101.43.95.188 up --> 101.43.95.188/24 65 | [INF] 101.43.89.30 up --> 101.43.89.30/24 66 | [INF] 101.43.96.6 up --> 101.43.96.6/24 67 | [INF] 101.43.101.40 up --> 101.43.101.40/24 68 | [INF] 101.43.90.35 up --> 101.43.90.35/24 69 | [INF] 101.43.108.189 up --> 101.43.108.189/24 70 | [INF] 101.43.86.224 up --> 101.43.86.224/24 71 | [INF] 101.43.93.224 up --> 101.43.93.224/24 72 | [INF] 101.43.97.43 up --> 101.43.97.43/24 73 | [INF] 101.43.91.221 up --> 101.43.91.221/24 74 | [INF] 101.43.110.186 up --> 101.43.110.186/24 75 | [INF] 101.43.122.244 up --> 101.43.122.244/24 76 | [INF] 101.43.120.28 up --> 101.43.120.28/24 77 | [INF] 101.43.132.148 up --> 101.43.132.148/24 78 | [INF] 101.43.117.3 up --> 101.43.117.3/24 79 | [INF] 101.43.128.248 up --> 101.43.128.248/24 80 | [INF] 101.43.127.30 up --> 101.43.127.30/24 81 | [INF] 101.43.131.58 up --> 101.43.131.58/24 82 | [INF] 101.43.151.202 up --> 101.43.151.202/24 83 | [INF] 101.43.156.13 up --> 101.43.156.13/24 84 | [INF] 101.43.142.12 up --> 101.43.142.12/24 85 | [INF] 101.43.152.37 up --> 101.43.152.37/24 86 | [INF] 101.43.149.130 up --> 101.43.149.130/24 87 | [INF] 101.43.140.10 up --> 101.43.140.10/24 88 | [INF] 101.43.165.181 up --> 101.43.165.181/24 89 | [INF] 101.43.166.81 up --> 101.43.166.81/24 90 | [INF] 101.43.162.211 up --> 101.43.162.211/24 91 | [INF] 101.43.172.145 up --> 101.43.172.145/24 92 | [INF] 101.43.161.106 up --> 101.43.161.106/24 93 | [INF] 101.43.192.38 up --> 101.43.192.38/24 94 | [INF] 101.43.200.90 up --> 101.43.200.90/24 95 | [INF] 101.43.184.66 up --> 101.43.184.66/24 96 | [INF] 101.43.199.41 up --> 101.43.199.41/24 97 | [INF] 101.43.188.227 up --> 101.43.188.227/24 98 | [INF] 101.43.206.226 up --> 101.43.206.226/24 99 | [INF] 101.43.203.152 up --> 101.43.203.152/24 100 | [INF] 101.43.210.168 up --> 101.43.210.168/24 101 | [INF] 101.43.243.126 up --> 101.43.243.126/24 102 | [INF] 101.43.240.20 up --> 101.43.240.20/24 103 | [INF] 101.43.252.143 up --> 101.43.252.143/24 104 | [INF] Net Segment Statistics: 105 | 101.43.0.0 [The Number of CSegment: 79] 106 | 101.43.59.0/24 [1] 107 | 101.43.95.0/24 [1] 108 | 101.43.2.0/24 [1] 109 | 101.43.33.0/24 [1] 110 | 101.43.16.0/24 [1] 111 | 101.43.4.0/24 [1] 112 | 101.43.140.0/24 [1] 113 | 101.43.240.0/24 [1] 114 | 101.43.252.0/24 [1] 115 | 101.43.31.0/24 [1] 116 | 101.43.1.0/24 [1] 117 | 101.43.77.0/24 [1] 118 | 101.43.192.0/24 [1] 119 | 101.43.34.0/24 [1] 120 | 101.43.21.0/24 [1] 121 | 101.43.28.0/24 [1] 122 | 101.43.43.0/24 [1] 123 | 101.43.70.0/24 [1] 124 | 101.43.89.0/24 [1] 125 | 101.43.108.0/24 [1] 126 | 101.43.91.0/24 [1] 127 | 101.43.6.0/24 [1] 128 | 101.43.243.0/24 [1] 129 | 101.43.156.0/24 [1] 130 | 101.43.71.0/24 [1] 131 | 101.43.85.0/24 [1] 132 | 101.43.10.0/24 [1] 133 | 101.43.128.0/24 [1] 134 | 101.43.151.0/24 [1] 135 | 101.43.117.0/24 [1] 136 | 101.43.120.0/24 [1] 137 | 101.43.199.0/24 [1] 138 | 101.43.65.0/24 [1] 139 | 101.43.35.0/24 [1] 140 | 101.43.40.0/24 [1] 141 | 101.43.66.0/24 [1] 142 | 101.43.83.0/24 [1] 143 | 101.43.27.0/24 [1] 144 | 101.43.55.0/24 [1] 145 | 101.43.110.0/24 [1] 146 | 101.43.149.0/24 [1] 147 | 101.43.172.0/24 [1] 148 | 101.43.15.0/24 [1] 149 | 101.43.19.0/24 [1] 150 | 101.43.48.0/24 [1] 151 | 101.43.73.0/24 [1] 152 | 101.43.101.0/24 [1] 153 | 101.43.97.0/24 [1] 154 | 101.43.142.0/24 [1] 155 | 101.43.22.0/24 [1] 156 | 101.43.165.0/24 [1] 157 | 101.43.210.0/24 [1] 158 | 101.43.47.0/24 [1] 159 | 101.43.74.0/24 [1] 160 | 101.43.86.0/24 [1] 161 | 101.43.161.0/24 [1] 162 | 101.43.37.0/24 [1] 163 | 101.43.96.0/24 [1] 164 | 101.43.127.0/24 [1] 165 | 101.43.166.0/24 [1] 166 | 101.43.9.0/24 [1] 167 | 101.43.67.0/24 [1] 168 | 101.43.90.0/24 [1] 169 | 101.43.93.0/24 [1] 170 | 101.43.132.0/24 [1] 171 | 101.43.152.0/24 [1] 172 | 101.43.162.0/24 [1] 173 | 101.43.200.0/24 [1] 174 | 101.43.62.0/24 [1] 175 | 101.43.203.0/24 [1] 176 | 101.43.188.0/24 [1] 177 | 101.43.20.0/24 [1] 178 | 101.43.53.0/24 [1] 179 | 101.43.69.0/24 [1] 180 | 101.43.82.0/24 [1] 181 | 101.43.122.0/24 [1] 182 | 101.43.131.0/24 [1] 183 | 101.43.184.0/24 [1] 184 | 101.43.29.0/24 [1] 185 | 38.45.0.0 [The Number of CSegment: 2] 186 | 38.45.23.0/24 [1] 187 | 38.45.22.0/24 [1] 188 | 189 | ``` 190 | 191 | 192 | 193 | ## 主机信息收集插件 194 | 195 | 目前只支持Windows基本信息收集 196 | 197 | 需要的参数如下 198 | 199 | ``` 200 | -plg infospy //指定插件 201 | -collect basic // 基础信息收集模式 202 | ``` 203 | 204 | 基础信息收集包括 205 | 206 | ``` 207 | 系统基本信息、磁盘和共享信息、网络信息(网卡、arp缓存等等)、补丁、环境变量信息 208 | ``` 209 | 210 | 命令行使用示例,`-plg infospy -collect basic`, 211 | 212 | 报告以`Html`形式输出在当前目录,命名格式为 `Hostnmae_Report.html` 213 | 214 | image-20250605215208788 215 | 216 | 217 | 218 | 219 | 220 | ## 主机敏感文件收集插件 221 | 222 | 目前只支持Windows 223 | 224 | 需要的参数如下 225 | 226 | ``` 227 | -plg filespy //指定插件 228 | ``` 229 | 230 | 算了,下个版本再放吧 --------------------------------------------------------------------------------