├── .DS_Store
├── README.md
├── TaskPython
├── .DS_Store
├── TaskInfo
│ ├── .DS_Store
│ ├── BBScan
│ │ ├── BBScan.py
│ │ ├── BBScan.pyc
│ │ ├── LICENSE
│ │ ├── README.md
│ │ ├── lib
│ │ │ ├── __init__.py
│ │ │ ├── __init__.pyc
│ │ │ ├── cmdline.py
│ │ │ ├── cmdline.pyc
│ │ │ ├── common.py
│ │ │ ├── common.pyc
│ │ │ ├── report.py
│ │ │ └── report.pyc
│ │ ├── report
│ │ │ ├── hosts_20190319_163935.html
│ │ │ ├── hosts_20190515_144510.html
│ │ │ ├── hosts_20190515_144514.html
│ │ │ └── hosts_20190515_162552.html
│ │ ├── requirements.txt
│ │ ├── rules
│ │ │ ├── backup_files.txt
│ │ │ ├── black.list
│ │ │ ├── common.txt
│ │ │ ├── directory_traversal.txt
│ │ │ ├── disabled
│ │ │ │ └── .gitignore
│ │ │ ├── java_web.txt
│ │ │ ├── phpinfo_and_test.txt
│ │ │ ├── request
│ │ │ │ └── .gitignore
│ │ │ ├── white.list
│ │ │ └── zabbix_jsrpc_sqli.txt
│ │ └── targets
│ │ │ └── .gitignore
│ ├── cmd.bat
│ ├── data.json
│ ├── fileinfo.php
│ ├── loginfo
│ │ ├── .DS_Store
│ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d
│ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-bbscan.txt
│ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-bugscancms.txt
│ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-domain.txt
│ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-nmap.txt
│ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-subdomain.txt
│ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-waf.txt
│ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-whatcms.txt
│ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-whatweb.txt
│ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-wyspider.txt
│ │ │ └── 0ddf68dcf63e0cc39aed76cd96d5773d.txt
│ │ ├── 177b45290f0e02fc4b6b717ee63e0993
│ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-bbscan.txt
│ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-bugscancms.txt
│ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-domain.txt
│ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-nmap.txt
│ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-subdomain.txt
│ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-waf.txt
│ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-whatcms.txt
│ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-whatweb.txt
│ │ │ └── 177b45290f0e02fc4b6b717ee63e0993-wyspider.txt
│ │ ├── 36f0ec6fe6399491ed166c2132493e0b
│ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-bbscan.txt
│ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-bugscancms.txt
│ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-domain.txt
│ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-nmap.txt
│ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-subdomain.txt
│ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-waf.txt
│ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-whatcms.txt
│ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-whatweb.txt
│ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-wyspider.txt
│ │ │ └── 36f0ec6fe6399491ed166c2132493e0b.txt
│ │ ├── 6560689483f8fd7793b67ce4f79803b9
│ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-bbscan.txt
│ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-bugscancms.txt
│ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-domain.txt
│ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-nmap.txt
│ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-subdomain.txt
│ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-waf.txt
│ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-whatcms.txt
│ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-whatweb.txt
│ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-wyspider.txt
│ │ │ └── 6560689483f8fd7793b67ce4f79803b9.txt
│ │ ├── 8058d809b01005a65e3f3359b21de527
│ │ │ ├── 8058d809b01005a65e3f3359b21de527-bbscan.txt
│ │ │ ├── 8058d809b01005a65e3f3359b21de527-bugscancms.txt
│ │ │ ├── 8058d809b01005a65e3f3359b21de527-domain.txt
│ │ │ ├── 8058d809b01005a65e3f3359b21de527-nmap.txt
│ │ │ ├── 8058d809b01005a65e3f3359b21de527-subdomain.txt
│ │ │ ├── 8058d809b01005a65e3f3359b21de527-waf.txt
│ │ │ ├── 8058d809b01005a65e3f3359b21de527-whatcms.txt
│ │ │ ├── 8058d809b01005a65e3f3359b21de527-whatweb.txt
│ │ │ ├── 8058d809b01005a65e3f3359b21de527-wyspider.txt
│ │ │ └── 8058d809b01005a65e3f3359b21de527.txt
│ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96
│ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-bbscan.txt
│ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-bugscancms.txt
│ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-domain.txt
│ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-nmap.txt
│ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-subdomain.txt
│ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-waf.txt
│ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-whatcms.txt
│ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-whatweb.txt
│ │ │ └── 9b20620a18e0ef7f542a1ef51ffa7b96-wyspider.txt
│ │ ├── da12fdc291fdc06b67455a640a865d93
│ │ │ ├── da12fdc291fdc06b67455a640a865d93-bbscan.txt
│ │ │ ├── da12fdc291fdc06b67455a640a865d93-bugscancms.txt
│ │ │ ├── da12fdc291fdc06b67455a640a865d93-domain.txt
│ │ │ ├── da12fdc291fdc06b67455a640a865d93-nmap.txt
│ │ │ ├── da12fdc291fdc06b67455a640a865d93-subdomain.txt
│ │ │ ├── da12fdc291fdc06b67455a640a865d93-waf.txt
│ │ │ ├── da12fdc291fdc06b67455a640a865d93-whatcms.txt
│ │ │ ├── da12fdc291fdc06b67455a640a865d93-whatweb.txt
│ │ │ ├── da12fdc291fdc06b67455a640a865d93-wyspider.txt
│ │ │ └── da12fdc291fdc06b67455a640a865d93.txt
│ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82
│ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-bbscan.txt
│ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-bugscancms.txt
│ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-domain.txt
│ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-nmap.txt
│ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-subdomain.txt
│ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-waf.txt
│ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-whatcms.txt
│ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-whatweb.txt
│ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-wyspider.txt
│ │ │ └── da7acffdbc450ed7a04e6ccf20fb5c82.txt
│ │ ├── ec1d0085488097c51c6e433520b2cc5b
│ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-bbscan.txt
│ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-bugscancms.txt
│ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-domain.txt
│ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-nmap.txt
│ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-subdomain.txt
│ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-waf.txt
│ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-whatcms.txt
│ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-whatweb.txt
│ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-wyspider.txt
│ │ │ └── ec1d0085488097c51c6e433520b2cc5b.txt
│ │ └── f71bcce3867466d807bac5200e63b33d
│ │ │ ├── f71bcce3867466d807bac5200e63b33d-bbscan.txt
│ │ │ ├── f71bcce3867466d807bac5200e63b33d-bugscancms.txt
│ │ │ ├── f71bcce3867466d807bac5200e63b33d-domain.txt
│ │ │ ├── f71bcce3867466d807bac5200e63b33d-nmap.txt
│ │ │ ├── f71bcce3867466d807bac5200e63b33d-subdomain.txt
│ │ │ ├── f71bcce3867466d807bac5200e63b33d-waf.txt
│ │ │ ├── f71bcce3867466d807bac5200e63b33d-whatcms.txt
│ │ │ ├── f71bcce3867466d807bac5200e63b33d-whatweb.txt
│ │ │ └── f71bcce3867466d807bac5200e63b33d-wyspider.txt
│ ├── scripts
│ │ └── banner.nse
│ ├── subDomainsBrute-master
│ │ ├── .DS_Store
│ │ ├── .gitignore
│ │ ├── README.md
│ │ ├── dict
│ │ │ ├── dns_servers.txt
│ │ │ ├── next_sub.txt
│ │ │ ├── next_sub_full.txt
│ │ │ ├── subnames - 副本.txt
│ │ │ ├── subnames.txt
│ │ │ ├── subnames_all_5_letters.txt
│ │ │ ├── subnames_full.txt
│ │ │ └── subnames_full_bak.txt
│ │ ├── extract_domain.py
│ │ ├── fast_sub.py
│ │ ├── ip_translate.py
│ │ ├── lib
│ │ │ ├── __init__.py
│ │ │ ├── consle_width.py
│ │ │ ├── database.py
│ │ │ └── threadpool.py
│ │ ├── out
│ │ │ └── zbedu.gov.cn.txt
│ │ ├── run.py
│ │ ├── subDomainsBrute.py
│ │ └── utils
│ │ │ ├── __init__.py
│ │ │ ├── alexa.py
│ │ │ ├── baidu.py
│ │ │ ├── banner.py
│ │ │ ├── bing.py
│ │ │ ├── bugbank.py
│ │ │ ├── captcha.py
│ │ │ ├── common.py
│ │ │ ├── config.py
│ │ │ ├── crt.py
│ │ │ ├── decorators.py
│ │ │ ├── dns_zone_transfer.py
│ │ │ ├── fileutils.py
│ │ │ ├── g_config.py
│ │ │ ├── get_by_ssl.py
│ │ │ ├── get_ssl.py
│ │ │ ├── get_whois.py
│ │ │ ├── globalresult.py
│ │ │ ├── hack_target.py
│ │ │ ├── i_links.py
│ │ │ ├── ip138.py
│ │ │ ├── juanluo.py
│ │ │ ├── netcraft.py
│ │ │ ├── page_catcher.py
│ │ │ ├── pz.py
│ │ │ ├── sitedossier.py
│ │ │ ├── sub_domains_brute.py
│ │ │ ├── threatcrowd.py
│ │ │ ├── threatminer.py
│ │ │ └── utils.py
│ ├── taskinfo-win.py
│ └── whatcms.py
├── Tide-WDScanner-bat.bat
├── Tide-proxy-bat.bat
├── bat
│ ├── 00dde594e5f4fbef569bf66947122478.bat
│ ├── 0ddf68dcf63e0cc39aed76cd96d5773d.bat
│ ├── 177b45290f0e02fc4b6b717ee63e0993.bat
│ ├── 2120d4819c0cbd0350097999399a818d.bat
│ ├── 358066961ec043941983855238c65619.bat
│ ├── 36f0ec6fe6399491ed166c2132493e0b.bat
│ ├── 45c20358adc310212646795fc0986a3e.bat
│ ├── 6560689483f8fd7793b67ce4f79803b9.bat
│ ├── 8058d809b01005a65e3f3359b21de527.bat
│ ├── 9b20620a18e0ef7f542a1ef51ffa7b96.bat
│ ├── da12fdc291fdc06b67455a640a865d93.bat
│ ├── da7acffdbc450ed7a04e6ccf20fb5c82.bat
│ └── ec1d0085488097c51c6e433520b2cc5b.bat
├── cmd.bat
├── filters.txt
├── logspider
│ ├── .DS_Store
│ ├── 0ddf68dcf63e0cc39aed76cd96d5773d
│ │ ├── done.txt
│ │ ├── urlall.txt
│ │ └── urllog.txt
│ ├── 36f0ec6fe6399491ed166c2132493e0b
│ │ ├── done.txt
│ │ ├── urlall.txt
│ │ └── urllog.txt
│ ├── 45c20358adc310212646795fc0986a3e
│ │ ├── done.txt
│ │ ├── urlall.txt
│ │ └── urllog.txt
│ ├── 6560689483f8fd7793b67ce4f79803b9
│ │ ├── done.txt
│ │ ├── urlall.txt
│ │ └── urllog.txt
│ ├── 8058d809b01005a65e3f3359b21de527
│ │ ├── done.txt
│ │ ├── urlall.txt
│ │ └── urllog.txt
│ ├── 9b20620a18e0ef7f542a1ef51ffa7b96
│ │ ├── done.txt
│ │ ├── urlall.txt
│ │ └── urllog.txt
│ ├── da12fdc291fdc06b67455a640a865d93
│ │ ├── done.txt
│ │ ├── urlall.txt
│ │ └── urllog.txt
│ ├── da7acffdbc450ed7a04e6ccf20fb5c82
│ │ ├── urlall.txt
│ │ └── urllog.txt
│ ├── ec1d0085488097c51c6e433520b2cc5b
│ │ ├── done.txt
│ │ ├── urlall.txt
│ │ └── urllog.txt
│ └── fcee4c56499a9d717304040dbf2e2590
│ │ ├── done.txt
│ │ ├── urlall.txt
│ │ └── urllog.txt
├── proxy
│ ├── assess_logger.log
│ ├── assess_quality.py
│ ├── cmd.bat
│ ├── config.py
│ ├── config.pyc
│ └── ip_pool.py
├── requirements.txt
├── taskscan.py
└── taskspider.py
├── ajax.php
├── css
├── .DS_Store
├── bootstrap-combined.min.css
├── frame-all.css
├── ie.css
├── img
│ ├── bg.png
│ ├── glyphicons-halflings-white.png
│ └── glyphicons-halflings.png
├── layoutit.css
├── securitysearch.css
└── vendor.css
├── file.php
├── fileinfo.php
├── filespider.php
├── html
├── .DS_Store
├── cusinfo.html
├── customer.html
├── index.html
├── info.html
├── login.html
├── manager.html
├── point.html
├── pro.html
├── proxy.html
├── report.html
├── scan.html
├── search.html
├── set.html
├── siteinfo.html
├── spider.html
├── spiderinfo.html
├── spidersearch.html
└── vul.html
├── images
├── ewm.png
├── logo.png
├── pic1.jpg
├── pic10.jpg
├── pic11.jpg
├── pic12.jpg
├── pic13.jpg
├── pic14.jpg
├── pic14_1.jpg
├── pic14_2.jpg
├── pic15.jpg
├── pic16.jpg
├── pic17.jpg
├── pic18.jpg
├── pic2.jpg
├── pic3.jpg
├── pic4.jpg
├── pic5.jpg
├── pic6.jpg
├── pic7.jpg
├── pic8.jpg
├── pic9.jpg
├── vul_cn.jpg
└── zjwf.png
├── include
├── .DS_Store
├── IExcel.php
├── XmlExcel.php
├── common.fun.php
├── config.inc.php
├── doc.class.php
├── index.action.php
├── ip.conf
├── mysql.class.php
├── report.action.php
├── sqlsafe.php
├── vhost-demo.conf
├── xml.action.php
└── xml.class.php
├── index.php
├── js
├── action.js
├── bootstrap.min.js
├── html5shiv.js
├── jquery-1.9.1.min.js
├── jquery-2.0.0.min.js
├── jquery-ui.js
├── jquery.htmlClean.js
├── jquery.ui.touch-punch.min.js
├── scripts.js
└── shims.js
├── proxy-ip.php
├── proxy.php
├── readme.txt
├── report
├── 0ddf68dcf63e0cc39aed76cd96d5773d
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019031916004400.csv
├── 177b45290f0e02fc4b6b717ee63e0993
│ └── wvs_log_2019051516514600.csv
├── 358066961ec043941983855238c65619
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019031915453000.csv
├── 36f0ec6fe6399491ed166c2132493e0b
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019051514483300.csv
├── 45c20358adc310212646795fc0986a3e
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019051514435700.csv
├── 6560689483f8fd7793b67ce4f79803b9
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019031916005000.csv
├── 8058d809b01005a65e3f3359b21de527
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019031915583600.csv
├── 9b20620a18e0ef7f542a1ef51ffa7b96
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019031915404100.csv
├── da12fdc291fdc06b67455a640a865d93
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019051514483300.csv
├── da7acffdbc450ed7a04e6ccf20fb5c82
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019051515105300.csv
├── ec1d0085488097c51c6e433520b2cc5b
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2019051514381500.csv
└── fcee4c56499a9d717304040dbf2e2590
│ ├── export.xml
│ ├── scan-results.wvs
│ └── wvs_log_2017093005184300.csv
├── taskinfo.php
├── taskscan.php
├── taskspider.php
└── wdscanner.sql.zip
/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/.DS_Store
--------------------------------------------------------------------------------
/TaskPython/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/.DS_Store
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/.DS_Store
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/BBScan.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/BBScan.pyc
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/lib/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/__init__.py
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/lib/__init__.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/__init__.pyc
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/lib/cmdline.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/cmdline.pyc
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/lib/common.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | #
3 | # Common functions
4 | #
5 |
6 | import time
7 | import urlparse
8 |
9 |
10 | def get_time():
11 | return time.strftime('%H:%M:%S', time.localtime())
12 |
13 |
14 | def parse_url(url):
15 | _ = urlparse.urlparse(url, 'http')
16 | if not _.netloc:
17 | _ = urlparse.urlparse('http://' + url, 'http')
18 | return _.scheme, _.netloc, _.path if _.path else '/'
19 |
20 |
21 | def decode_response_text(txt, charset=None):
22 | if charset:
23 | try:
24 | return txt.decode(charset)
25 | except:
26 | pass
27 |
28 | for _ in ['UTF-8', 'GB2312', 'GBK', 'iso-8859-1', 'big5']:
29 | try:
30 | return txt.decode(_)
31 | except:
32 | pass
33 |
34 | try:
35 | return txt.decode('ascii', 'ignore')
36 | except:
37 | pass
38 |
39 | raise Exception('Fail to decode response Text')
40 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/lib/common.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/common.pyc
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/lib/report.py:
--------------------------------------------------------------------------------
1 | # -*- encoding: utf-8 -*-
2 | # report template
3 |
4 |
5 | # template for html
6 | html_general = """
7 |
8 |
9 | BBScan Report
10 |
11 |
22 |
23 |
24 | Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2
25 | Current Scan finished in ${cost_min} min ${cost_seconds} seconds.
26 | ${content}
27 |
28 |
29 | """
30 |
31 | html_host = """
32 | ${host}
33 |
36 | """
37 |
38 | html_list_item = """
39 | [${status}] [${title}] ${url}
40 | """
41 |
42 | html = {
43 | 'general': html_general,
44 | 'host': html_host,
45 | 'list_item': html_list_item,
46 | 'suffix': '.html'
47 | }
48 |
49 |
50 | # template for markdown
51 | markdown_general = """
52 | # BBScan Report
53 | Please consider to contribute some rules to make BBScan more efficient.
54 | Version:v 1.2
55 | TimeUsage: ${cost_min} min ${cost_seconds} seconds
56 | ${content}
57 | """
58 |
59 | markdown_host = """
60 | ## ${host}
61 | ${list}
62 | """
63 |
64 | markdown_list_item = """* ${status} ${title} ${url}
65 | """
66 |
67 | markdown = {
68 | 'general': markdown_general,
69 | 'host': markdown_host,
70 | 'list_item': markdown_list_item,
71 | 'suffix': '.md'
72 | }
73 |
74 |
75 | # summary
76 | template = {
77 | 'html': html,
78 | 'markdown': markdown
79 | }
80 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/lib/report.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/report.pyc
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/report/hosts_20190319_163935.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | BBScan Report
5 |
6 |
17 |
18 |
19 | Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2
20 | Current Scan finished in 3 min 3.81 seconds.
21 |
22 | www.lvquan.cn
23 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/report/hosts_20190515_144510.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | BBScan Report
5 |
6 |
17 |
18 |
19 | Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2
20 | Current Scan finished in 3 min 12.47 seconds.
21 |
22 | testhtml5.vulnweb.com
23 |
28 |
29 |
30 |
31 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/report/hosts_20190515_144514.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | BBScan Report
5 |
6 |
17 |
18 |
19 | Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2
20 | Current Scan finished in 3 min 8.90 seconds.
21 |
22 | testphp.vulnweb.com
23 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/report/hosts_20190515_162552.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | BBScan Report
5 |
6 |
17 |
18 |
19 | Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2
20 | Current Scan finished in 20 min 3.20 seconds.
21 |
22 | testphp.vulnweb.com
23 |
34 |
35 |
36 |
37 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/requirements.txt:
--------------------------------------------------------------------------------
1 | BeautifulSoup4>=4.3.2
2 | py2-ipaddress>=3.4.1
3 | dnspython>=1.15.0
4 | gevent>=1.2.1
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/rules/black.list:
--------------------------------------------------------------------------------
1 | # text to exclude in html doc
2 | # regex can be used
3 | # 匹配的条目将被丢弃
4 |
5 |
6 | {text="/404/search_children.js"}
7 |
8 | {text="qzone.qq.com/gy/404/data.js"}
9 |
10 | {text="访问的页面不存在"}
11 |
12 | {text="404 Not Found"}
13 |
14 | {text="The server encountered an internal error or"}
15 |
16 | {text="http://www.qq.com/babygohome/?pgv_ref=404"}
17 |
18 | {text="
410 Gone
"}
19 |
20 | {regex_text="controller.*not found"}
21 |
22 | {text="404 Page Not Found"}
23 |
24 | {text="You do not have permission to get URL"}
25 |
26 | {text="403 Forbidden"}
27 |
28 | {text="Whoops, looks like something went wrong.
"}
29 |
30 | {text="invalid service url:"}
31 |
32 | {text="You don't have permission to access this page"}
33 |
34 | {text="当前页面不存在或已删除"}
35 |
36 | {text="No direct script access allowed"}
37 |
38 | {text="args not correct"}
39 |
40 | {text="Controller Not Found"}
41 |
42 | {text="url error"}
43 |
44 | {text="Bad Request"}
45 |
46 | {text="http://appmedia.qq.com/media/flcdn/404.png"}
47 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/rules/directory_traversal.txt:
--------------------------------------------------------------------------------
1 | # Directory traversal
2 |
3 | /../../../../../../../../../../../../../etc/passwd {tag="root:x:"}
4 | /../../../../../../../../../../../../../etc/hosts {tag="127.0.0.1"}
5 | /../../../../../../../../../../../../../etc/sysconfig/network-scripts/ifcfg-eth1 {tag="GATEWAY="}
6 | /%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/hosts {tag="127.0.0.1"}
7 | /..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd {tag="root:x:"}
8 | /..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252Fetc%252Fpasswd {tag="root:x:"}
9 | /%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd {tag="root:x:"}
10 | //././././././././././././././././././././././././../../../../../../../../etc/passwd {tag="root:x:"}
11 | /etc/passwd {tag="root:x:"}
12 | /file:///etc/passwd {tag="root:x:"}
13 | /etc/hosts {tag="127.0.0.1"}
14 | /aa/../../cc/../../bb/../../dd/../../aa/../../cc/../../bb/../../dd/../../bb/../../dd/../../bb/../../dd/../../bb/../../dd/../../ee/../../etc/hosts {status=200} {tag="127.0.0.1"}
15 |
16 | /proc/meminfo {tag="MemTotal"} {status=200}
17 | /etc/profile {tag="/etc/profile.d/*.sh"} {status=200}
18 |
19 | /resource/tutorial/jndi-appconfig/test?inputFile=/etc/passwd {tag="root:x:"}
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/rules/disabled/.gitignore:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/rules/disabled/.gitignore
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/rules/java_web.txt:
--------------------------------------------------------------------------------
1 | # Java web
2 |
3 | /WEB-INF/web.xml {tag="APC INFO"}
16 | /test.sh {status=206}
17 | /logs.sh {status=206}
18 |
19 |
20 | /test/ {status=200}
21 | /test.php {status=200} {type="html"}
22 | /temp.php {status=200} {type="html"}
23 | /tmp.php {status=200} {type="html"}
24 | /test2.php {status=200} {type="html"}
25 | /test2.php {status=200} {type="html"}
26 | /test.html {status=200} {type="html"}
27 | /test2.html {status=200} {type="html"}
28 | /test.txt {status=200} {type="text/plain"}
29 | /test2.txt {status=200} {type="text/plain"}
30 | /debug.php {status=200} {type="html"}
31 | /a.php {status=200} {type="html"}
32 | /b.php {status=200} {type="html"}
33 | /t.php {status=200} {type="html"}
34 | /i.php {status=200} {type="html"}
35 | /x.php {status=200} {type="html"}
36 | /1.php {status=200} {type="html"}
37 | /123.php {status=200} {type="html"}
38 |
39 |
40 | # Test CGI {tag="SERVER_NAME"}
41 | /test.cgi {status=200} {type="html"}
42 | /test-cgi {status=200} {type="html"}
43 | /cgi-bin/test-cgi {status=200} {type="html"}
44 | /cgi-bin/test {status=200} {type="html"}
45 | /cgi-bin/test.cgi {status=200} {type="html"}
46 |
47 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/rules/request/.gitignore:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/rules/request/.gitignore
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/rules/white.list:
--------------------------------------------------------------------------------
1 | # text to search in doc
2 | # regex can be used
3 |
4 | # 匹配的条目将被立即标记命中
5 |
6 |
7 | {text="Index of"}
8 |
9 | {text="phpMyAdmin"}
10 |
11 | {text="allow_url_fopen"}
12 |
13 | {text="MemAdmin"}
14 |
15 | {text="This is the default start page for the Resin server"}
16 |
17 | # {text="Apache Tomcat"}
18 |
19 | {text="request_uri"}
20 |
21 | {text="Login to Cacti"}
22 |
23 | {text="Zabbix"}
24 |
25 | {text="Dashboard [Jenkins]"}
26 |
27 | {text="Graphite Browser"}
28 |
29 | # {regex_text=" on line "}
42 |
43 | {text="The proxy server could not handle the request"}
44 |
45 | {regex_text=".*后台.*"}
46 |
47 | {regex_text=".*管理系统.*"}
48 |
49 |
50 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/rules/zabbix_jsrpc_sqli.txt:
--------------------------------------------------------------------------------
1 | # Zabbix SQLi
2 |
3 |
4 | /zabbix/jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&tamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=1zabbix/jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&tim%20estamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=hi%20story.php&profileIdx=web.item.graph&profileIdx2=(select%201%20from%20(select%20count(*),concat(floor(rand(0)*2),%20user())x%20from%20information_schema.character_sets%20group%20by%20x)y)&updateProfil%20e=true&screenitemid=&period=3600&stime=20160817050632&resourcetype=%2017&itemids%5B23297%5D=23297&action=showlatest&filter=&filter_task=&%20mark_color=1 {tag="Duplicate entry"} {status=200} {type="text/plain"}
5 |
6 | /jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&stamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=1zabbix/jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&tim%20estamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=hi%20story.php&profileIdx=web.item.graph&profileIdx2=(select%201%20from%20(select%20count(*),concat(floor(rand(0)*2),%20user())x%20from%20information_schema.character_sets%20group%20by%20x)y)&updateProfil%20e=true&screenitemid=&period=3600&stime=20160817050632&resourcetype=%2017&itemids%5B23297%5D=23297&action=showlatest&filter=&filter_task=&%20mark_color=1 {tag="Duplicate entry"} {status=200} {type="text/plain"}
7 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/BBScan/targets/.gitignore:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/targets/.gitignore
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/cmd.bat:
--------------------------------------------------------------------------------
1 | cmd.exe
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/fileinfo.php:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/.DS_Store
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-bbscan.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-bbscan.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-bugscancms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-bugscancms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-domain.txt:
--------------------------------------------------------------------------------
1 | [
2 | "www.tyanhome.com.cn"
3 | ]
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Tue Mar 19 16:01:34 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\0ddf68dcf63e0cc39aed76cd96d5773d\0ddf68dcf63e0cc39aed76cd96d5773d-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 --top-port 200 www.tyanhome.com.cn
2 | Nmap scan report for www.tyanhome.com.cn (114.215.147.51)
3 | Host is up (0.0088s latency).
4 | Not shown: 198 filtered ports
5 | PORT STATE SERVICE VERSION
6 | 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
7 | |_banner: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.2
8 | 80/tcp open tcpwrapped
9 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
10 | Device type: firewall
11 | Running (JUST GUESSING): Fortinet embedded (98%)
12 | OS CPE: cpe:/h:fortinet:fortigate_200b
13 | Aggressive OS guesses: Fortinet FortiGate 200B firewall (98%)
14 | No exact OS matches for host (test conditions non-ideal).
15 | Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
16 |
17 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
18 | # Nmap done at Tue Mar 19 16:01:51 2019 -- 1 IP address (1 host up) scanned in 17.38 seconds
19 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-subdomain.txt:
--------------------------------------------------------------------------------
1 | en.tyanhome.com.cn
2 | www.tyanhome.com.cn
3 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-waf.txt:
--------------------------------------------------------------------------------
1 |
2 | ^ ^
3 | _ __ _ ____ _ __ _ _ ____
4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
5 | | V V // o // _/ | V V // 0 // 0 // _/
6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
7 | <
8 | ...'
9 |
10 | WAFW00F - Web Application Firewall Detection Tool
11 |
12 | By Sandro Gauci && Wendel G. Henrique
13 |
14 | Checking http://www.tyanhome.com.cn/
15 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-whatcms.txt:
--------------------------------------------------------------------------------
1 | southidc
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-whatweb.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-whatweb.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-wyspider.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-wyspider.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d.txt:
--------------------------------------------------------------------------------
1 | {"whatcms_text": "southidc", "weakfile_num": 0, "ip": "114.215.147.51", "waf": "UnDetect", "domain_info": "www.tyanhome.com.cn
en.tyanhome.com.cn
", "weakfile": "", "port_info": "22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)\n
80/tcp open tcpwrapped\n
", "whatweb_text": "", "os_info": "Running OS:
Fortinet embedded (98%
Fortinet FortiGate 200B firewall
OS Details:
Fortinet FortiGate 200B firewall (98%)\n", "httpserver": "", "title": "", "xpb": "", "port_num": 2, "domain_num": 2, "os": " Fortinet FortiGate 200B firewall "}
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-bbscan.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-bbscan.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-bugscancms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-bugscancms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-domain.txt:
--------------------------------------------------------------------------------
1 | [
2 | "www.jxzls.com"
3 | ]
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Wed May 15 16:57:33 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\177b45290f0e02fc4b6b717ee63e0993\177b45290f0e02fc4b6b717ee63e0993-nmap.txt -sT -sV -O --script=banner --open --top-port 200 www.jxzls.com
2 | Nmap scan report for www.jxzls.com (125.211.216.229)
3 | Host is up (0.015s latency).
4 | Not shown: 199 filtered ports
5 | Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
6 | PORT STATE SERVICE VERSION
7 | 21/tcp open tcpwrapped
8 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
9 | Device type: specialized|WAP|phone
10 | Running: iPXE 1.X, Linux 2.4.X|2.6.X, Sony Ericsson embedded
11 | OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:sonyericsson:u8i_vivaz
12 | OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
13 |
14 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
15 | # Nmap done at Wed May 15 16:58:21 2019 -- 1 IP address (1 host up) scanned in 48.06 seconds
16 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-subdomain.txt:
--------------------------------------------------------------------------------
1 | www.jxzls.com
2 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-waf.txt:
--------------------------------------------------------------------------------
1 |
2 | ^ ^
3 | _ __ _ ____ _ __ _ _ ____
4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
5 | | V V // o // _/ | V V // 0 // 0 // _/
6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
7 | <
8 | ...'
9 |
10 | WAFW00F - Web Application Firewall Detection Tool
11 |
12 | By Sandro Gauci && Wendel G. Henrique
13 |
14 | Checking http://www.jxzls.com/
15 | Generic Detection results:
16 | The site http://www.jxzls.com/ seems to be behind a WAF or some sort of security solution
17 | Reason: Blocking is being done at connection/packet level.
18 | Number of requests: 10
19 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-whatcms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-whatcms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-whatweb.txt:
--------------------------------------------------------------------------------
1 | http://www.jxzls.com/ [200 OK] ActiveX[D27CDB6E-AE6D-11cf-96B8-444553540000], Adobe-Flash, Cookies[ASPSESSIONIDSADRBSSR], Country[CHINA][CN], Email[chiqun1973@163.com,jixigsgs@163.com], HTTPServer[Microsoft-IIS/7.5], IP[125.211.216.229], Microsoft-IIS[7.5], Object[http://fpdownload.macromedia.com/pub/shockwave/cabs/hotdeploy/flash/swflash.cab#version=6,0,0,0][clsid:D27CDB6E-AE6D-11cf-96B8-444553540000], Script[javascript,text/javascript,text/javascript>], Title[-鸡西市供水公司], X-Powered-By[ASP.NET]
2 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-wyspider.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-wyspider.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-bbscan.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-bbscan.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-bugscancms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-bugscancms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-domain.txt:
--------------------------------------------------------------------------------
1 | [
2 | "rank.chinaz.com",
3 | "down.chinaz.com",
4 | "whois.chinaz.com",
5 | "ping.chinaz.com",
6 | "d.chinaz.com",
7 | "upload.chinaz.com",
8 | "aq.chinaz.com",
9 | "my.chinaz.com",
10 | "mtop.chinaz.com",
11 | "tool.chinaz.com",
12 | "chinaz.com",
13 | "live.chinaz.com",
14 | "link.chinaz.com",
15 | "font.chinaz.com",
16 | "index.chinaz.com",
17 | "seo.chinaz.com",
18 | "wapseo.chinaz.com",
19 | "outlink.chinaz.com",
20 | "m.chinaz.com",
21 | "alexa.chinaz.com",
22 | "top.chinaz.com",
23 | "icp.chinaz.com",
24 | "bbs.chinaz.com",
25 | "ciku.chinaz.com",
26 | "sc.chinaz.com",
27 | "pr.chinaz.com",
28 | "ip.chinaz.com"
29 | ]
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Wed May 15 16:38:04 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\36f0ec6fe6399491ed166c2132493e0b\36f0ec6fe6399491ed166c2132493e0b-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 --top-port 200 testaspnet.vulnweb.com
2 | Nmap scan report for testaspnet.vulnweb.com (5.175.17.140)
3 | Host is up (0.00s latency).
4 | rDNS record for 5.175.17.140: vs231689.vs.hosteurope.de
5 | All 200 scanned ports on testaspnet.vulnweb.com (5.175.17.140) are filtered
6 | Too many fingerprints match this host to give specific OS details
7 |
8 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
9 | # Nmap done at Wed May 15 16:38:20 2019 -- 1 IP address (1 host up) scanned in 16.12 seconds
10 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-subdomain.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-subdomain.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-waf.txt:
--------------------------------------------------------------------------------
1 |
2 | ^ ^
3 | _ __ _ ____ _ __ _ _ ____
4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
5 | | V V // o // _/ | V V // 0 // 0 // _/
6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
7 | <
8 | ...'
9 |
10 | WAFW00F - Web Application Firewall Detection Tool
11 |
12 | By Sandro Gauci && Wendel G. Henrique
13 |
14 | Checking http://testaspnet.vulnweb.com/
15 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-whatcms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-whatcms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-whatweb.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-whatweb.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-wyspider.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-wyspider.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b.txt:
--------------------------------------------------------------------------------
1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "5.175.17.140", "waf": "UnDetect", "domain_info": "wapseo.chinaz.com
pr.chinaz.com
sc.chinaz.com
ip.chinaz.com
ciku.chinaz.com
alexa.chinaz.com
icp.chinaz.com
top.chinaz.com
bbs.chinaz.com
m.chinaz.com
outlink.chinaz.com
seo.chinaz.com
index.chinaz.com
font.chinaz.com
link.chinaz.com
live.chinaz.com
chinaz.com
tool.chinaz.com
mtop.chinaz.com
my.chinaz.com
aq.chinaz.com
upload.chinaz.com
d.chinaz.com
ping.chinaz.com
whois.chinaz.com
down.chinaz.com
rank.chinaz.com
", "weakfile": "", "port_info": "", "whatweb_text": "", "os_info": "Running OS:", "httpserver": "", "title": "", "xpb": "", "port_num": 0, "domain_num": 27, "os": ""}
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-bbscan.txt:
--------------------------------------------------------------------------------
1 | http://www.lvquan.cn/views/default/images/shell.php
2 | http://www.lvquan.cn/views/default/images/1.php
3 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-bugscancms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-bugscancms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-domain.txt:
--------------------------------------------------------------------------------
1 | [
2 | "www.lvquan.cn"
3 | ]
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Tue Mar 19 16:07:43 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\6560689483f8fd7793b67ce4f79803b9\6560689483f8fd7793b67ce4f79803b9-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 --top-port 200 www.lvquan.cn
2 | Nmap scan report for www.lvquan.cn (218.5.76.86)
3 | Host is up (0.00s latency).
4 | All 200 scanned ports on www.lvquan.cn (218.5.76.86) are filtered
5 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
6 | Device type: firewall
7 | Running: Fortinet embedded
8 | OS CPE: cpe:/h:fortinet:fortigate_200b
9 | OS details: Fortinet FortiGate 200B firewall
10 |
11 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
12 | # Nmap done at Tue Mar 19 16:07:56 2019 -- 1 IP address (1 host up) scanned in 13.47 seconds
13 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-subdomain.txt:
--------------------------------------------------------------------------------
1 | www.lvquan.cn
2 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-waf.txt:
--------------------------------------------------------------------------------
1 |
2 | ^ ^
3 | _ __ _ ____ _ __ _ _ ____
4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
5 | | V V // o // _/ | V V // 0 // 0 // _/
6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
7 | <
8 | ...'
9 |
10 | WAFW00F - Web Application Firewall Detection Tool
11 |
12 | By Sandro Gauci && Wendel G. Henrique
13 |
14 | Checking http://www.lvquan.cn/
15 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-whatcms.txt:
--------------------------------------------------------------------------------
1 | southidc
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-whatweb.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-whatweb.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-wyspider.txt:
--------------------------------------------------------------------------------
1 | http://www.lvquan.cn/index.php.bak
2 | http://www.lvquan.cn/index.php.BAK
3 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9.txt:
--------------------------------------------------------------------------------
1 | {"whatcms_text": "southidc", "weakfile_num": 2, "ip": "218.5.76.86", "waf": "UnDetect", "domain_info": "www.lvquan.cn
", "weakfile": "http://www.lvquan.cn/index.php.BAK\n
http://www.lvquan.cn/index.php.bak\n
", "port_info": "", "whatweb_text": "", "os_info": "Running OS:
Fortinet embedde
OS Details:
Fortinet FortiGate 200B firewall\n", "httpserver": "", "title": "", "xpb": "", "port_num": 0, "domain_num": 1, "os": " Fortinet embedde"}
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-bbscan.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-bbscan.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-bugscancms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-bugscancms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-domain.txt:
--------------------------------------------------------------------------------
1 | []
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Tue Mar 19 15:59:33 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\8058d809b01005a65e3f3359b21de527\8058d809b01005a65e3f3359b21de527-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 --top-port 200 www.chngec.com.cn
2 | Nmap scan report for www.chngec.com.cn (123.233.120.98)
3 | Host is up (0.010s latency).
4 | Not shown: 199 filtered ports
5 | PORT STATE SERVICE VERSION
6 | 80/tcp open http nginx 1.8.0
7 | |_http-server-header: nginx/1.8.0
8 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
9 | Device type: firewall
10 | Running (JUST GUESSING): Fortinet embedded (98%)
11 | OS CPE: cpe:/h:fortinet:fortigate_200b
12 | Aggressive OS guesses: Fortinet FortiGate 200B firewall (98%)
13 | No exact OS matches for host (test conditions non-ideal).
14 |
15 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
16 | # Nmap done at Tue Mar 19 16:00:06 2019 -- 1 IP address (1 host up) scanned in 33.16 seconds
17 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-subdomain.txt:
--------------------------------------------------------------------------------
1 | test.chngec.com.cn
2 | www2.chngec.com.cn
3 | www1.chngec.com.cn
4 | work.chngec.com.cn
5 | yx.chngec.com.cn
6 | www.chngec.com.cn
7 | zfb.chngec.com.cn
8 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-waf.txt:
--------------------------------------------------------------------------------
1 |
2 | ^ ^
3 | _ __ _ ____ _ __ _ _ ____
4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
5 | | V V // o // _/ | V V // 0 // 0 // _/
6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
7 | <
8 | ...'
9 |
10 | WAFW00F - Web Application Firewall Detection Tool
11 |
12 | By Sandro Gauci && Wendel G. Henrique
13 |
14 | Checking http://www.chngec.com.cn/
15 | Generic Detection results:
16 | The site http://www.chngec.com.cn/ seems to be behind a WAF or some sort of security solution
17 | Reason: The server returned a different response code when a string trigged the blacklist.
18 | Normal response code is "404", while the response code to an attack is "502"
19 | Number of requests: 11
20 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-whatcms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-whatcms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-whatweb.txt:
--------------------------------------------------------------------------------
1 | http://www.chngec.com.cn/ [200 OK] Cookies[JSESSIONID], Country[CHINA][CN], HTTPServer[nginx/1.8.0], IP[123.233.120.98], JQuery[1.12.3], Java, PasswordField, Script[text/javascript], Title[华能热力用户服务平台], X-UA-Compatible[IE=9,IE=edge], nginx[1.8.0]
2 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-wyspider.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-wyspider.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527.txt:
--------------------------------------------------------------------------------
1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "123.233.120.98", "waf": "Unknown", "domain_info": "zfb.chngec.com.cn
work.chngec.com.cn
yx.chngec.com.cn
test.chngec.com.cn
www1.chngec.com.cn
www2.chngec.com.cn
www.chngec.com.cn
", "weakfile": "", "port_info": "80/tcp open http nginx 1.8.0\n
", "whatweb_text": "http://www.chngec.com.cn/ [200 OK] Cookies[JSESSIONID], Country[CHINA][CN], HTTPServer[nginx/1.8.0], IP[123.233.120.98], JQuery[1.12.3], Java, PasswordField, Script[text/javascript], Title[华能热力用户服务平台], X-UA-Compatible[IE=9,IE=edge], nginx[1.8.0]\n", "os_info": "Running OS:
Fortinet embedded (98%
Fortinet FortiGate 200B firewall
OS Details:
Fortinet FortiGate 200B firewall (98%)\n", "httpserver": "nginx/1.8.0", "title": "华能热力用户服务平台", "xpb": "", "port_num": 1, "domain_num": 8, "os": " Fortinet FortiGate 200B firewall "}
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-bbscan.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-bbscan.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-bugscancms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-bugscancms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-domain.txt:
--------------------------------------------------------------------------------
1 | []
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Tue Mar 19 15:47:21 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\9b20620a18e0ef7f542a1ef51ffa7b96\9b20620a18e0ef7f542a1ef51ffa7b96-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 -p T:1-65535 www.kongziyjy.org
2 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-subdomain.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-subdomain.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-waf.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-waf.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-whatcms.txt:
--------------------------------------------------------------------------------
1 | southidc
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-whatweb.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-whatweb.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-wyspider.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-wyspider.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-bbscan.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-bbscan.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-bugscancms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-bugscancms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-domain.txt:
--------------------------------------------------------------------------------
1 | [
2 | "rank.chinaz.com",
3 | "down.chinaz.com",
4 | "whois.chinaz.com",
5 | "ping.chinaz.com",
6 | "d.chinaz.com",
7 | "upload.chinaz.com",
8 | "aq.chinaz.com",
9 | "my.chinaz.com",
10 | "mtop.chinaz.com",
11 | "tool.chinaz.com",
12 | "chinaz.com",
13 | "live.chinaz.com",
14 | "link.chinaz.com",
15 | "font.chinaz.com",
16 | "index.chinaz.com",
17 | "seo.chinaz.com",
18 | "wapseo.chinaz.com",
19 | "outlink.chinaz.com",
20 | "m.chinaz.com",
21 | "alexa.chinaz.com",
22 | "top.chinaz.com",
23 | "icp.chinaz.com",
24 | "bbs.chinaz.com",
25 | "ciku.chinaz.com",
26 | "sc.chinaz.com",
27 | "pr.chinaz.com",
28 | "ip.chinaz.com"
29 | ]
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Wed May 15 19:09:11 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\da12fdc291fdc06b67455a640a865d93\da12fdc291fdc06b67455a640a865d93-nmap.txt -sT -sV -O --script=banner --top-port 200 testasp.vulnweb.com
2 | Nmap scan report for testasp.vulnweb.com (5.175.17.140)
3 | Host is up (0.00s latency).
4 | rDNS record for 5.175.17.140: vs231689.vs.hosteurope.de
5 | All 200 scanned ports on testasp.vulnweb.com (5.175.17.140) are filtered
6 | Too many fingerprints match this host to give specific OS details
7 |
8 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
9 | # Nmap done at Wed May 15 19:09:24 2019 -- 1 IP address (1 host up) scanned in 13.92 seconds
10 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-subdomain.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-subdomain.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-waf.txt:
--------------------------------------------------------------------------------
1 |
2 | ^ ^
3 | _ __ _ ____ _ __ _ _ ____
4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
5 | | V V // o // _/ | V V // 0 // 0 // _/
6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
7 | <
8 | ...'
9 |
10 | WAFW00F - Web Application Firewall Detection Tool
11 |
12 | By Sandro Gauci && Wendel G. Henrique
13 |
14 | Checking http://testasp.vulnweb.com/
15 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-whatcms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-whatcms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-whatweb.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-whatweb.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-wyspider.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-wyspider.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93.txt:
--------------------------------------------------------------------------------
1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "5.175.17.140", "waf": "UnDetect", "domain_info": "wapseo.chinaz.com
pr.chinaz.com
sc.chinaz.com
ip.chinaz.com
ciku.chinaz.com
alexa.chinaz.com
icp.chinaz.com
top.chinaz.com
bbs.chinaz.com
m.chinaz.com
outlink.chinaz.com
seo.chinaz.com
index.chinaz.com
font.chinaz.com
link.chinaz.com
live.chinaz.com
chinaz.com
tool.chinaz.com
mtop.chinaz.com
my.chinaz.com
aq.chinaz.com
upload.chinaz.com
d.chinaz.com
ping.chinaz.com
whois.chinaz.com
down.chinaz.com
rank.chinaz.com
", "weakfile": "", "port_info": "", "whatweb_text": "", "os_info": "Running OS:", "httpserver": "", "title": "", "xpb": "", "port_num": 0, "domain_num": 27, "os": ""}
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-bbscan.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-bbscan.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-bugscancms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-bugscancms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-domain.txt:
--------------------------------------------------------------------------------
1 | [
2 | "webscantest.com"
3 | ]
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Wed May 15 18:55:11 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\da7acffdbc450ed7a04e6ccf20fb5c82\da7acffdbc450ed7a04e6ccf20fb5c82-nmap.txt -sT -sV -O --script=banner --top-port 200 www.webscantest.com
2 | Failed to resolve "www.webscantest.com".
3 | WARNING: No targets were specified, so 0 hosts scanned.
4 | # Nmap done at Wed May 15 18:55:24 2019 -- 0 IP addresses (0 hosts up) scanned in 13.49 seconds
5 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-subdomain.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-subdomain.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-waf.txt:
--------------------------------------------------------------------------------
1 |
2 | ^ ^
3 | _ __ _ ____ _ __ _ _ ____
4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
5 | | V V // o // _/ | V V // 0 // 0 // _/
6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
7 | <
8 | ...'
9 |
10 | WAFW00F - Web Application Firewall Detection Tool
11 |
12 | By Sandro Gauci && Wendel G. Henrique
13 |
14 | Checking http://www.webscantest.com/
15 | Generic Detection results:
16 | No WAF detected by the generic detection
17 | Number of requests: 14
18 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-whatcms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-whatcms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-whatweb.txt:
--------------------------------------------------------------------------------
1 | http://www.webscantest.com/ [200 OK] Apache[2.4.7], Cookies[NB_SRVID,TEST_SESSIONID], Country[UNITED STATES][US], HTTPServer[Ubuntu Linux][Apache/2.4.7 (Ubuntu)], IP[69.164.223.208], PHP[5.5.9-1ubuntu4.29], Script[javascript], Title[Test Site], X-Powered-By[PHP/5.5.9-1ubuntu4.29]
2 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-wyspider.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-wyspider.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82.txt:
--------------------------------------------------------------------------------
1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "", "waf": "UnDetect", "domain_info": "
", "weakfile": "", "port_info": "", "whatweb_text": "", "os_info": "Running OS:", "httpserver": "", "title": "", "xpb": "", "port_num": 0, "domain_num": 1, "os": ""}
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-bbscan.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-bbscan.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-bugscancms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-bugscancms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-domain.txt:
--------------------------------------------------------------------------------
1 | [
2 | "rank.chinaz.com",
3 | "down.chinaz.com",
4 | "whois.chinaz.com",
5 | "ping.chinaz.com",
6 | "d.chinaz.com",
7 | "upload.chinaz.com",
8 | "aq.chinaz.com",
9 | "my.chinaz.com",
10 | "mtop.chinaz.com",
11 | "tool.chinaz.com",
12 | "chinaz.com",
13 | "live.chinaz.com",
14 | "link.chinaz.com",
15 | "font.chinaz.com",
16 | "index.chinaz.com",
17 | "seo.chinaz.com",
18 | "wapseo.chinaz.com",
19 | "outlink.chinaz.com",
20 | "m.chinaz.com",
21 | "alexa.chinaz.com",
22 | "top.chinaz.com",
23 | "icp.chinaz.com",
24 | "bbs.chinaz.com",
25 | "ciku.chinaz.com",
26 | "sc.chinaz.com",
27 | "pr.chinaz.com",
28 | "ip.chinaz.com"
29 | ]
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Wed May 15 18:09:50 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\ec1d0085488097c51c6e433520b2cc5b\ec1d0085488097c51c6e433520b2cc5b-nmap.txt -sT -sV -O --script=banner --top-port 200 testhtml5.vulnweb.com
2 | Nmap scan report for testhtml5.vulnweb.com (176.28.50.165)
3 | Host is up (0.024s latency).
4 | rDNS record for 176.28.50.165: rs202995.rs.hosteurope.de
5 | All 200 scanned ports on testhtml5.vulnweb.com (176.28.50.165) are filtered
6 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
7 | Device type: WAP|general purpose
8 | Running: Actiontec embedded, Linux 2.4.X|3.X
9 | OS CPE: cpe:/h:actiontec:mi424wr-gen3i cpe:/o:linux:linux_kernel cpe:/o:linux:linux_kernel:2.4.37 cpe:/o:linux:linux_kernel:3.2 cpe:/o:linux:linux_kernel:4.4
10 | OS details: Actiontec MI424WR-GEN3I WAP, DD-WRT v24-sp2 (Linux 2.4.37), Linux 3.2, Linux 4.4
11 |
12 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
13 | # Nmap done at Wed May 15 18:10:03 2019 -- 1 IP address (1 host up) scanned in 12.82 seconds
14 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-subdomain.txt:
--------------------------------------------------------------------------------
1 | dev.testhtml5.vulnweb.com
2 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-waf.txt:
--------------------------------------------------------------------------------
1 |
2 | ^ ^
3 | _ __ _ ____ _ __ _ _ ____
4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
5 | | V V // o // _/ | V V // 0 // 0 // _/
6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
7 | <
8 | ...'
9 |
10 | WAFW00F - Web Application Firewall Detection Tool
11 |
12 | By Sandro Gauci && Wendel G. Henrique
13 |
14 | Checking http://testhtml5.vulnweb.com
15 | Generic Detection results:
16 | No WAF detected by the generic detection
17 | Number of requests: 14
18 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-whatcms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-whatcms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-whatweb.txt:
--------------------------------------------------------------------------------
1 | http://testhtml5.vulnweb.com [200 OK] Country[GERMANY][DE], HTML5, HTTPServer[nginx/1.4.1], IP[176.28.50.165], JQuery[1.9.1], PasswordField[password], Script, Title[SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner], UncommonHeaders[access-control-allow-origin], nginx[1.4.1]
2 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-wyspider.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-wyspider.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b.txt:
--------------------------------------------------------------------------------
1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "176.28.50.165", "waf": "NoWaf", "domain_info": "wapseo.chinaz.com
pr.chinaz.com
sc.chinaz.com
ip.chinaz.com
ciku.chinaz.com
alexa.chinaz.com
icp.chinaz.com
top.chinaz.com
bbs.chinaz.com
m.chinaz.com
outlink.chinaz.com
dev.testhtml5.vulnweb.com
seo.chinaz.com
index.chinaz.com
font.chinaz.com
link.chinaz.com
live.chinaz.com
chinaz.com
tool.chinaz.com
mtop.chinaz.com
my.chinaz.com
aq.chinaz.com
upload.chinaz.com
d.chinaz.com
ping.chinaz.com
whois.chinaz.com
down.chinaz.com
rank.chinaz.com
", "weakfile": "", "port_info": "", "whatweb_text": "http://testhtml5.vulnweb.com [200 OK] Country[GERMANY][DE], HTML5, HTTPServer[nginx/1.4.1], IP[176.28.50.165], JQuery[1.9.1], PasswordField[password], Script, Title[SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner], UncommonHeaders[access-control-allow-origin], nginx[1.4.1]\n", "os_info": "Running OS:
Actiontec embedded
Linux 2.4.X|3.
OS Details:
Actiontec MI424WR-GEN3I WAP
DD-WRT v24-sp2 (Linux 2.4.37)
Linux 3.2
Linux 4.4\n", "httpserver": "nginx/1.4.1", "title": "SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner", "xpb": "", "port_num": 0, "domain_num": 28, "os": " Actiontec embedded"}
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-bbscan.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-bbscan.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-bugscancms.txt:
--------------------------------------------------------------------------------
1 | Unknown
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-domain.txt:
--------------------------------------------------------------------------------
1 | [
2 | "www.zt10jwz.com",
3 | "zt10jwz.com",
4 | "chaozhinenzuqiuwangluoyouxi.q33.zt10jwz.com"
5 | ]
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-nmap.txt:
--------------------------------------------------------------------------------
1 | # Nmap 7.60 scan initiated Sun Sep 17 16:05:06 2017 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\f71bcce3867466d807bac5200e63b33d\f71bcce3867466d807bac5200e63b33d-nmap.txt -sT -P0 -sV -O --script=banner -p T:21-25,80-89,110,143,443,513,873,1080,1433,1521,1158,3306-3308,3389,3690,5900,6379,7001,8000-8090,9000,9418,27017-27019,50060,111,11211,2049 www.zt10jwz.com
2 | Nmap scan report for www.zt10jwz.com (124.128.159.112)
3 | Host is up (0.0053s latency).
4 | Not shown: 131 filtered ports
5 | PORT STATE SERVICE VERSION
6 | 80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
7 | | http-server-header:
8 | | Microsoft-HTTPAPI/2.0
9 | |_ Microsoft-IIS/7.0
10 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
11 | Device type: firewall
12 | Running: Fortinet embedded
13 | OS CPE: cpe:/h:fortinet:fortigate_200b
14 | OS details: Fortinet FortiGate 200B firewall
15 | Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
16 |
17 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
18 | # Nmap done at Sun Sep 17 16:05:36 2017 -- 1 IP address (1 host up) scanned in 30.78 seconds
19 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-subdomain.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-subdomain.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-waf.txt:
--------------------------------------------------------------------------------
1 |
2 | ^ ^
3 | _ __ _ ____ _ __ _ _ ____
4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
5 | | V V // o // _/ | V V // 0 // 0 // _/
6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
7 | <
8 | ...'
9 |
10 | WAFW00F - Web Application Firewall Detection Tool
11 |
12 | By Sandro Gauci && Wendel G. Henrique
13 |
14 | Checking http://www.zt10jwz.com
15 | Generic Detection results:
16 | No WAF detected by the generic detection
17 | Number of requests: 13
18 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-whatcms.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-whatcms.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-whatweb.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-whatweb.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-wyspider.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-wyspider.txt
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/subDomainsBrute-master/.DS_Store
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/.gitignore:
--------------------------------------------------------------------------------
1 | *.py[cod]
2 | .idea/*
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/README.md:
--------------------------------------------------------------------------------
1 | subDomainsBrute 1.0.6
2 | ======
3 |
4 | A simple and fast sub domain brute tool for pentesters. It can rearch as fast as 1000 DNS queries per second.
5 |
6 | 这个脚本的主要目标是发现其他工具无法探测到的域名, 如Google,aizhan,fofa。高频扫描每秒DNS请求数可超过1000次。
7 |
8 | ## Change Log (2017-6-3) ##
9 | * 增加CNAME扫描,扫描时间将增加
10 | * Bug fix: normal_lines remove deep copy issus, thanks @BlueIce
11 |
12 |
13 | ## Change Log (2017-5-4) ##
14 | * 使用协程替代了多线程
15 | * 使用了优化级队列,来减小队列的长度
16 | * 增加了占位符{next_sub}
17 |
18 |
19 | ## Dependencies ##
20 | > pip install dnspython gevent pymysql DBUtils pexpect
21 |
22 |
23 | ## Usage ##
24 |
25 | Usage: subDomainsBrute.py [options] target.com
26 |
27 | Options:
28 | --version show program's version number and exit
29 | -h, --help show this help message and exit
30 | -f FILE A file contains new line delimited subs, default is
31 | subnames.txt.
32 | --full Full scan, NAMES FILE subnames_full.txt will be used
33 | to brute
34 | -i, --ignore-intranet
35 | Ignore domains pointed to private IPs
36 | -t THREADS, --threads=THREADS
37 | Num of scan threads, 300 by default
38 | -o taskid, --output=taskid
39 | taskid
40 |
41 |
42 | ## Screenshot ##
43 |
44 | 如下图所示,小字典扫描qq.com,发现758个域名,耗时在100s以内。
45 |
46 | 
47 |
48 | Output file could be like: [https://github.com/lijiejie/subDomainsBrute/blob/master/dict/sample_qq.com.txt](https://github.com/lijiejie/subDomainsBrute/blob/master/dict/sample_qq.com.txt)
49 |
50 | From [http://www.lijiejie.com](http://www.lijiejie.com)
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/dict/dns_servers.txt:
--------------------------------------------------------------------------------
1 | 223.5.5.5
2 | 223.6.6.6
3 | 119.29.29.29
4 | 182.254.116.116
5 | 180.76.76.76
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/dict/next_sub.txt:
--------------------------------------------------------------------------------
1 | test
2 | test2
3 | t
4 | dev
5 | 1
6 | 2
7 | 3
8 | s1
9 | s2
10 | s3
11 | admin
12 | adm
13 | a
14 | ht
15 | adminht
16 | webht
17 | web
18 | gm
19 | sys
20 | system
21 | manage
22 | manager
23 | mgr
24 | b
25 | c
26 | passport
27 | bata
28 | wei
29 | weixin
30 | wechat
31 | wx
32 | wiki
33 | upload
34 | ftp
35 | pic
36 | jira
37 | zabbix
38 | nagios
39 | bug
40 | bugzilla
41 | sql
42 | mysql
43 | db
44 | stmp
45 | pop
46 | imap
47 | mail
48 | zimbra
49 | exchange
50 | forum
51 | bbs
52 | list
53 | count
54 | counter
55 | img
56 | img01
57 | img02
58 | img03
59 | img04
60 | api
61 | cache
62 | js
63 | css
64 | app
65 | apps
66 | wap
67 | m
68 | sms
69 | zip
70 | monitor
71 | proxy
72 | update
73 | upgrade
74 | stat
75 | stats
76 | data
77 | portal
78 | blog
79 | autodiscover
80 | en
81 | search
82 | so
83 | oa
84 | database
85 | home
86 | sso
87 | help
88 | vip
89 | s
90 | w
91 | down
92 | download
93 | downloads
94 | dl
95 | svn
96 | git
97 | log
98 | staff
99 | vpn
100 | sslvpn
101 | ssh
102 | scanner
103 | sandbox
104 | ldap
105 | lab
106 | go
107 | demo
108 | console
109 | cms
110 | auth
111 | crm
112 | erp
113 | res
114 | static
115 | old
116 | new
117 | beta
118 | image
119 | service
120 | login
121 | 3g
122 | docs
123 | it
124 | e
125 | live
126 | library
127 | files
128 | i
129 | d
130 | cp
131 | connect
132 | gateway
133 | lib
134 | preview
135 | backup
136 | share
137 | status
138 | assets
139 | user
140 | vote
141 | bugs
142 | cas
143 | feedback
144 | id
145 | edm
146 | survey
147 | union
148 | ceshi
149 | dev1
150 | updates
151 | phpmyadmin
152 | pma
153 | edit
154 | master
155 | xml
156 | control
157 | profile
158 | zhidao
159 | tool
160 | toolbox
161 | boss
162 | activity
163 | www
164 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/dict/subnames_all_5_letters.txt:
--------------------------------------------------------------------------------
1 | {alphnum}
2 | {alphnum}{alphnum}
3 | {alphnum}{alphnum}{alphnum}
4 | {alphnum}{alphnum}{alphnum}{alphnum}
5 | {alphnum}{alphnum}{alphnum}{alphnum}{alphnum}
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/extract_domain.py:
--------------------------------------------------------------------------------
1 | file = open('all.txt','r')
2 |
3 | domain = file.readlines()
4 | obuff = []
5 |
6 | for a in domain:
7 | b = a.rstrip()+'\n'
8 |
9 | if b in obuff:
10 | continue
11 | obuff.append(b)
12 |
13 | with open('out3.txt', 'a+') as handle:
14 | handle.writelines(obuff)
15 |
16 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/fast_sub.py:
--------------------------------------------------------------------------------
1 | #! /usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | import socket
4 | from utils.alexa import Alexa
5 | from utils.threatcrowd import Threatcrowd
6 | from utils.threatminer import Threatminer
7 | from utils.crt import Crt
8 | from utils.i_links import ILinks
9 | from utils.ip138 import Ip138
10 | from utils.netcraft import Netcraft
11 | from utils.bugbank import Bugbank
12 | from utils.bing import Bing
13 | from utils.baidu import Baidu
14 | from utils.hack_target import HackTarget
15 |
16 | '''
17 | - alexa
18 | - page catcher
19 | - ssl crt
20 | - ilinks
21 | - ip138
22 | '''
23 | def get_subd(domain):
24 | subdomains = []
25 | realdomains = []
26 | subdomains.extend(Ip138(domain).execute())
27 | subdomains.extend(Alexa(domain).execute())
28 | subdomains.extend(Crt(domain).execute())
29 | subdomains.extend(ILinks(domain).execute())
30 | subdomains.extend(Threatcrowd(domain).execute())
31 | subdomains.extend(Threatminer(domain).execute())
32 | subdomains.extend(Netcraft(domain).execute())
33 | subdomains.extend(Bugbank(domain).execute())
34 | subdomains.extend(Bing(domain).execute())
35 | subdomains.extend(Baidu(domain).execute())
36 | subdomains.extend(HackTarget(domain).execute())
37 |
38 | subdomains = list(set(subdomains))
39 |
40 | for target in subdomains:
41 | try:
42 | mainHost, mainHost, C_ip = socket.gethostbyname_ex('wildcardfake.' + target)
43 | except:
44 | if target.endswith(domain):
45 | realdomains.append(str(target))
46 | pass
47 |
48 | realdomains = list(set(realdomains))
49 | return realdomains
50 |
51 | if __name__ == '__main__':
52 | import sys,time
53 | target = sys.argv[1] if len(sys.argv) > 1 else 'gznu.edu.cn'
54 | start = time.time()
55 | print get_subd(target)
56 | print (time.time()-start)/60
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/ip_translate.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding:utf-8 -*-
3 | import json
4 | import time
5 | import datetime
6 | import pexpect
7 | from lib.threadpool import ThreadPool as Pool
8 |
9 | def interpret(results,domain):
10 |
11 | iplist = []
12 | ipcount = []
13 |
14 | for x in results:
15 | iplist.extend(str(x['ip']))
16 |
17 | #获取ip范围值
18 | #192.168.1
19 | ip={'.'.join(r.split(".")[0:3]) for r in iplist}
20 | ip = list(ip)
21 |
22 | #如果取值c段在范围内
23 | for i in range(0,len(ip)):
24 | for ipaddr in list(iplist):
25 | #会出现192.168.1 与192.168.11的问题.增加.
26 | if ip[i]+"." in ipaddr:
27 | #采用id来区分
28 | res = {"id":i,"ip":ipaddr,"ipc":ip[i]}
29 | if res not in ipcount:
30 | ipcount.append(res)
31 |
32 | def is_intranet(ip):
33 | """
34 | 匹配内网ip地址
35 | """
36 | ret = ip.split('.')
37 | if not len(ret) == 4:
38 | return True
39 | if ret[0] == '10':
40 | return True
41 | if ret[0] == '127' and ret[1] == '0':
42 | return True
43 | if ret[0] == '172' and 16 <= int(ret[1]) <= 32:
44 | return True
45 | if ret[0] == '192' and ret[1] == '168':
46 | return True
47 | return False
48 |
49 | def getnum(a):
50 | #经典的排序法
51 | for i in range(0,len(a)):
52 | for j in range(i+1,len(a)):
53 | first=int(a[i])
54 | second=int(a[j])
55 | if first0:
104 | ret = {"domain":"get_crpret."+domain,"ip":ipclist}
105 | results.append(ret)
106 | return results
107 |
108 | def run_comand32(runcmd):
109 | scanner = ''
110 | try:
111 | child1 = pexpect.spawn(runcmd,timeout=2400)
112 | out = child1.readlines()
113 | for out_item in out:
114 | if len(out_item) == 0:
115 | return scanner
116 | else:
117 | scanner = out_item.strip()
118 | return scanner
119 | except Exception as e:
120 | print runcmd,str(e)
121 | pass
122 |
123 |
124 | def trs(args):
125 | import os
126 | iplist,domain = args
127 | tp = Pool(3)
128 | path = os.path.split(os.path.realpath(__file__))[0]
129 | for ip in iplist:
130 | command = "python {path}/../whatcms/portscan.py --host {ip} --domain {domain}"
131 | if domain.find('get_crpret')==-1:
132 | runcmd = command.format(path=path,ip=ip,domain=domain)
133 | else:
134 | runcmd = command.format(path=path,ip=ip,domain=ip)
135 | tp.push(run_comand32, runcmd)
136 | tp.wait()
137 | tp.busy()
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/lib/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/subDomainsBrute-master/lib/__init__.py
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/lib/consle_width.py:
--------------------------------------------------------------------------------
1 | """ getTerminalSize()
2 | - get width and height of console
3 | - works on linux,os x,windows,cygwin(windows)
4 | """
5 |
6 | __all__ = ['getTerminalSize']
7 |
8 |
9 | def getTerminalSize():
10 | import platform
11 | current_os = platform.system()
12 | tuple_xy = None
13 | if current_os == 'Windows':
14 | tuple_xy = _getTerminalSize_windows()
15 | if tuple_xy is None:
16 | tuple_xy = _getTerminalSize_tput()
17 | # needed for window's python in cygwin's xterm!
18 | if current_os == 'Linux' or current_os == 'Darwin' or current_os.startswith('CYGWIN'):
19 | tuple_xy = _getTerminalSize_linux()
20 | if tuple_xy is None:
21 | print "default"
22 | tuple_xy = (80, 25) # default value
23 | return tuple_xy
24 |
25 |
26 | def _getTerminalSize_windows():
27 | res = None
28 | try:
29 | from ctypes import windll, create_string_buffer
30 |
31 | # stdin handle is -10
32 | # stdout handle is -11
33 | # stderr handle is -12
34 |
35 | h = windll.kernel32.GetStdHandle(-12)
36 | csbi = create_string_buffer(22)
37 | res = windll.kernel32.GetConsoleScreenBufferInfo(h, csbi)
38 | except:
39 | return None
40 | if res:
41 | import struct
42 | (bufx, bufy, curx, cury, wattr,
43 | left, top, right, bottom, maxx, maxy) = struct.unpack("hhhhHhhhhhh", csbi.raw)
44 | sizex = right - left + 1
45 | sizey = bottom - top + 1
46 | return sizex, sizey
47 | else:
48 | return None
49 |
50 |
51 | def _getTerminalSize_tput():
52 | # get terminal width
53 | # src: http://stackoverflow.com/questions/263890/how-do-i-find-the-width-height-of-a-terminal-window
54 | try:
55 | import subprocess
56 | proc = subprocess.Popen(["tput", "cols"], stdin=subprocess.PIPE, stdout=subprocess.PIPE)
57 | output = proc.communicate(input=None)
58 | cols = int(output[0])
59 | proc = subprocess.Popen(["tput", "lines"], stdin=subprocess.PIPE, stdout=subprocess.PIPE)
60 | output = proc.communicate(input=None)
61 | rows = int(output[0])
62 | return (cols, rows)
63 | except:
64 | return None
65 |
66 |
67 | def _getTerminalSize_linux():
68 | def ioctl_GWINSZ(fd):
69 | try:
70 | import fcntl, termios, struct, os
71 | cr = struct.unpack('hh', fcntl.ioctl(fd, termios.TIOCGWINSZ, '1234'))
72 | except:
73 | return None
74 | return cr
75 |
76 | cr = ioctl_GWINSZ(0) or ioctl_GWINSZ(1) or ioctl_GWINSZ(2)
77 | if not cr:
78 | try:
79 | fd = os.open(os.ctermid(), os.O_RDONLY)
80 | cr = ioctl_GWINSZ(fd)
81 | os.close(fd)
82 | except:
83 | pass
84 | if not cr:
85 | try:
86 | cr = (env['LINES'], env['COLUMNS'])
87 | except:
88 | return None
89 | return int(cr[1]), int(cr[0])
90 |
91 |
92 | if __name__ == "__main__":
93 | sizex, sizey = getTerminalSize()
94 | print 'width =', sizex, 'height =', sizey
95 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/lib/database.py:
--------------------------------------------------------------------------------
1 | # -*- coding: UTF-8 -*-
2 | '''
3 | Created on 2017年5月15日
4 | @author: Saline
5 | '''
6 | import pymysql
7 | from DBUtils.PooledDB import PooledDB
8 |
9 | mysqldb_conn = {
10 | #数据库信息
11 | 'host' : 'localhost',
12 | 'user' : 'root',
13 | 'port' : '3306',
14 | 'password' : 'mysqlroot',
15 | 'db' : 'wyproxy',
16 | #数据库连接编码
17 | 'charset' : 'utf8',
18 | #mincached : 启动时开启的闲置连接数量(缺省值 0 以为着开始时不创建连接)
19 | "DB_MIN_CACHED":"10",
20 | #maxcached : 连接池中允许的闲置的最多连接数量(缺省值 0 代表不闲置连接池大小)
21 | "DB_MAX_CACHED":"10",
22 | #maxshared : 共享连接数允许的最大数量(缺省值 0 代表所有连接都是专用的)如果达到了最大数量,被请求为共享的连接将会被共享使用
23 | "DB_MAX_SHARED":"20",
24 | #maxconnecyions : 创建连接池的最大数量(缺省值 0 代表不限制)
25 | "DB_MAX_CONNECYIONS":"100",
26 | #blocking : 设置在连接池达到最大数量时的行为(缺省值 0 或 False 代表返回一个错误; 其他代表阻塞直到连接数减少,连接被分配)
27 | "DB_BLOCKING":True,
28 | #maxusage : 单个连接的最大允许复用次数(缺省值 0 或 False 代表不限制的复用).当达到最大数时,连接会自动重新连接(关闭和重新打开)
29 | "DB_MAX_USAGE":"0",
30 | #setsession : 一个可选的SQL命令列表用于准备每个会话,如["set datestyle to german", ...]
31 | "DB_SET_SESSION":None
32 | }
33 | '''
34 | @功能:数据库连接池
35 | '''
36 | class PTConnectionPool(object):
37 | __pool = None
38 | def __enter__(self):
39 | self.conn = self.getConn()
40 | self.cursor = self.conn.cursor()
41 | return self
42 |
43 | def getConn(self):
44 | if self.__pool is None:
45 | self.__pool = PooledDB(
46 | creator=pymysql, cursorclass= pymysql.cursors.DictCursor,
47 | mincached=int(mysqldb_conn.get('DB_MIN_CACHED')),
48 | maxcached=int(mysqldb_conn.get('DB_MAX_CACHED')),
49 | maxshared=int(mysqldb_conn.get('DB_MAX_SHARED')),
50 | maxconnections=int(mysqldb_conn.get('DB_MAX_CONNECYIONS')),
51 | blocking=mysqldb_conn.get('DB_BLOCKING'),
52 | setsession=mysqldb_conn.get('DB_SET_SESSION'),
53 | maxusage=int(mysqldb_conn.get('DB_MAX_USAGE')),
54 | host=mysqldb_conn.get('host'),
55 | port=int(mysqldb_conn.get('port')),
56 | user=mysqldb_conn.get('user'),
57 | passwd=mysqldb_conn.get('password'),
58 | db=mysqldb_conn.get('db') , use_unicode=False,
59 | charset=mysqldb_conn.get('charset')
60 | )
61 |
62 | return self.__pool.connection()
63 |
64 | """
65 | @summary: 释放连接池资源
66 | """
67 | def __exit__(self, type, value, trace):
68 | self.cursor.close()
69 | self.conn.close()
70 |
71 | '''
72 | @功能:获取数据库连接
73 | '''
74 | def getPTConnection():
75 | return PTConnectionPool()
76 |
77 |
78 | def query(sql,args= None):
79 | with getPTConnection() as db:
80 | try:
81 | cur = db.cursor
82 | cur.execute(sql,args)
83 | return db.cursor.fetchall()
84 | except Exception, e:
85 | print str(e)
86 | db.conn.rollback()
87 | raise Exception(e)
88 |
89 |
90 | def execute(sql, args=None):
91 | with getPTConnection() as db:
92 | try:
93 | cur = db.cursor
94 | result = cur.execute(sql, args)
95 | db.conn.commit()
96 | return result
97 | except Exception, e:
98 | print str(e)
99 | db.conn.rollback()
100 | raise Exception(e)
101 |
102 | def executmany(sql, args=None):
103 | with getPTConnection() as db:
104 | try:
105 | cur = db.cursor
106 | result = cur.executemany(sql, args)
107 | db.conn.commit()
108 | return result
109 | except Exception, e:
110 | print e
111 | db.conn.rollback()
112 | raise Exception(e)
113 |
114 | if __name__ == "__main__":
115 | res = execute('select count(*) from movies')
116 | print str(res)
117 |
118 | res = query('select * from movies limit 10')
119 | print str(res)
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/out/zbedu.gov.cn.txt:
--------------------------------------------------------------------------------
1 | www.zbedu.gov.cn 218.56.105.79
2 | m.zbedu.gov.cn 218.56.105.79
3 | zb.zbedu.gov.cn 218.56.105.118
4 | lx.zbedu.gov.cn 218.201.121.52
5 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/run.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 |
3 | import os
4 | file = open('temp.txt','r')
5 | domain = file.readlines()
6 | for a in domain:
7 | #print a
8 | cmd = "python subDomainsBrute.py -t 120 "+a
9 | print cmd
10 | os.system(cmd)
11 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/__init__.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import sys
5 |
6 | reload(sys)
7 | sys.setdefaultencoding('utf-8')
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/alexa.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | """从Alexa和chinaz中的相关网页获取子域名"""
5 |
6 |
7 | import logging
8 | import re
9 |
10 | import sys
11 |
12 | from common import http_request_get, http_request_post, is_domain
13 |
14 |
15 | class Alexa(object):
16 | """docstring for Alexa"""
17 |
18 | def __init__(self, domain):
19 | super(Alexa, self).__init__()
20 | self.domain = domain
21 | self.subset = []
22 |
23 | def run(self):
24 | try:
25 | self.fetch_chinaz()
26 | self.fetch_alexa_cn()
27 | return list(set(self.subset))
28 | except Exception as e:
29 | logging.info(str(e))
30 | return self.subset
31 |
32 | def fetch_chinaz(self):
33 | """get subdomains from alexa.chinaz.com"""
34 |
35 | url = 'http://alexa.chinaz.com/?domain={0}'.format(self.domain)
36 | r = http_request_get(url).content
37 | subs = re.compile(r'(?<=\"\>\r\n).*?(?=)')
38 | result = subs.findall(r)
39 | for sub in result:
40 | if is_domain(sub):
41 | self.subset.append(sub)
42 |
43 | def fetch_alexa_cn(self):
44 | """get subdomains from alexa.cn"""
45 | sign = self.get_sign_alexa_cn()
46 | if sign is None:
47 | raise Exception("sign_fetch_is_failed")
48 | else:
49 | (domain, sig, keyt) = sign
50 |
51 | pre_domain = self.domain.split('.')[0]
52 |
53 | url = 'http://www.alexa.cn/api_150710.php'
54 | payload = {
55 | 'url': domain,
56 | 'sig': sig,
57 | 'keyt': keyt,
58 | }
59 | r = http_request_post(url, payload=payload).text
60 |
61 | for sub in r.split('*')[-1:][0].split('__'):
62 | if sub.split(':')[0:1][0] == 'OTHER':
63 | break
64 | else:
65 | sub_name = sub.split(':')[0:1][0]
66 | sub_name = ''.join((sub_name.split(pre_domain)[0], domain))
67 | if is_domain(sub_name):
68 | self.subset.append(sub_name)
69 |
70 | def get_sign_alexa_cn(self):
71 | """alexa.cn dectect signtrue, sig & keyt"""
72 |
73 | url = 'http://www.alexa.cn/index.php?url={0}'.format(self.domain)
74 | r = http_request_get(url).text
75 | sign = re.compile(r'(?<=showHint\(\').*?(?=\'\);)').findall(r)
76 | if len(sign) >= 1:
77 | return sign[0].split(',')
78 | else:
79 | return None
80 |
81 | def execute(self):
82 | return self.run()
83 |
84 |
85 | if __name__ == '__main__':
86 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn'
87 | alexa = Alexa(target)
88 | print alexa.execute()
89 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/banner.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import os
5 |
6 | import logging
7 | import traceback
8 |
9 | import requests
10 |
11 |
12 | class GetBanner(object):
13 | def __init__(self, raw_domain='180.97.33.108'):
14 | self.raw_domain = raw_domain
15 | self.result = dict()
16 |
17 | def execute_old(self):
18 | cmd = 'curl -I {0} 2>&1'.format(self.raw_domain)
19 | try:
20 | tmp = os.popen(cmd).readlines()
21 | for i in tmp:
22 | i=i.replace('\r\n','')
23 | if ':' in i:
24 | j = i.split(":")
25 | self.result[j[0]] = j[1]
26 | else:
27 | if i:
28 | self.result["status"] = i
29 | except:
30 | pass
31 | return self.result
32 |
33 | def execute(self):
34 | headers = {
35 | 'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36'
36 | }
37 | response_header_dict = {}
38 | try:
39 | response_header_dict = dict(requests.head('http://' + self.raw_domain, headers=headers, timeout=(5, 5)).headers)
40 | except Exception as e:
41 | logging.error('get http header error.')
42 | logging.error(traceback.format_exc())
43 | logging.error(str(e))
44 | return response_header_dict
45 |
46 |
47 | if __name__ == '__main__':
48 | a = GetBanner('google.com')
49 | result = a.execute()
50 | for key in result.keys():
51 | print key.ljust(30) + result[key]
52 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/bugbank.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import sys
5 | import requests
6 | import json
7 | import time
8 |
9 | reload(sys)
10 | sys.setdefaultencoding('utf-8')
11 |
12 | '''
13 | 通过调取bugbank的api获取子域名
14 | http://www.bugbank.cn/api/subdomain/collect?domain=目标网页&page=页数
15 | '''
16 |
17 |
18 | class Bugbank(object):
19 | def __init__(self, domain):
20 | self.domain = domain
21 | self.result_dict = {}
22 |
23 | def execute(self):
24 | page = 1
25 | max_page = 1
26 | subdomain_set = set()
27 | while True:
28 | url = 'http://www.bugbank.cn/api/subdomain/collect?domain=%s&page=%d' % (self.domain, page)
29 | try:
30 | rsp = requests.get(url=url, timeout=5)
31 | date_dict = json.loads(rsp.text)
32 | if page == 1:
33 | total = date_dict["page"]["total"]
34 | max_page = int((total + 9) / 10)
35 | # print max_page # 最大页数
36 | # time.sleep(2)
37 | current_page = date_dict["page"]["current"]
38 | # print "当前第", current_page, '页'
39 | # time.sleep(1)
40 | for i in date_dict["data"]:
41 | '''结果打印和集合添加'''
42 | # print i['domain']
43 | # subdomain_set.add(i['domain'])
44 | self.result_dict[i['domain']] = i['ips']
45 | page += 1
46 | if page > max_page:
47 | break
48 | except KeyboardInterrupt:
49 | # print '手动停止退出'
50 | break
51 | except requests.exceptions.ConnectionError, requests.exceptions.ConnectTimeout:
52 | # print '网络问题退出'
53 | break
54 | except Exception, e:
55 | # print "其它问题退出:", e.message
56 | break
57 | return self.result_dict
58 |
59 |
60 | if __name__ == '__main__':
61 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn'
62 | a = Bugbank(target)
63 | print a.execute()
64 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/captcha.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import json
5 | import time
6 | import requests
7 |
8 | class Captcha(object):
9 | """docstring for Captcha"""
10 | def __init__(self):
11 | super(Captcha, self).__init__()
12 | self.url = 'http://api.ysdm.net/create.json'
13 | self.username = 'a61323636'
14 | self.password = '123456'
15 | self.timeout = 90
16 | self.softid = 1
17 | self.softkey = 'b40ffbee5c1cf4e38028c197eb2fc751'
18 | self.typeid = 3000
19 |
20 | def verification(self, filename):
21 | (cnt,retry) = (0, 3)
22 | while True:
23 | try:
24 | if cnt >= retry:
25 | break # over max_retry_cnt
26 | payload = {
27 | 'username': self.username,
28 | 'password': self.password,
29 | 'timeout': self.timeout,
30 | 'softid': self.softid,
31 | 'softkey': self.softkey,
32 | 'typeid': self.typeid,
33 | }
34 | multiple_files = [('image', ('captcha.gif', open(filename, 'rb'), 'image/gif')),]
35 | r = requests.post(self.url, data=payload, files=multiple_files)
36 | return json.loads(r.text)
37 | except Exception, e:
38 | cnt += 1
39 | print('{0} [INFO] {1}'.format(
40 | time.strftime('%Y-%m-%d %H:%M:%S'), str(e)))
41 | else:
42 | cnt = 0
43 |
44 |
45 | # captcha = Captcha()
46 | # imgurl = 'http://ce.wooyun.org/captcha.php'
47 | # print captcha.verification(imgurl)
48 |
49 |
50 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/common.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import re
5 | from config import *
6 |
7 | import json
8 | import subprocess
9 |
10 | import logging
11 |
12 | import requests as requests
13 | import requests as __requests__
14 |
15 | # from tldextract import extract, TLDExtract
16 |
17 | from fileutils import FileUtils
18 |
19 | import requests.packages.urllib3
20 | requests.packages.urllib3.disable_warnings()
21 |
22 | if allow_http_session:
23 | requests = requests.Session()
24 |
25 | def is_domain(domain):
26 | domain_regex = re.compile(
27 | r'(?:[A-Z0-9_](?:[A-Z0-9-_]{0,247}[A-Z0-9])?\.)+(?:[A-Z]{2,6}|[A-Z0-9-]{2,}(? 1 else 'qq.com'
43 | try:
44 | print Crt(target).execute()
45 | except KeyboardInterrupt:
46 | print '{0}'.format("手动退出")
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/decorators.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import utils
5 |
6 |
7 | class BaseDecorator(object):
8 |
9 | def __init__(self, wrapped):
10 | self.wrapped = wrapped
11 |
12 | def execute(self, *args, **kwargs):
13 | return self.wrapped.execute(*args, **kwargs)
14 |
15 |
16 | class SubDomainListDecorator(BaseDecorator):
17 |
18 | def __init__(self, wrapped):
19 | super(SubDomainListDecorator, self).__init__(wrapped)
20 |
21 | def execute(self, *args, **kwargs):
22 | result_list = super(SubDomainListDecorator, self).execute(*args, **kwargs)
23 | result_dict = {}
24 | if result_list is not None:
25 | for i in result_list:
26 | result_dict[i] = utils.get_ip(i)
27 | return result_dict
28 |
29 |
30 | class CrtCatcherDecorator(SubDomainListDecorator):
31 |
32 | def __init__(self, wrapped):
33 | super(CrtCatcherDecorator, self).__init__(wrapped)
34 |
35 | def execute(self, *args, **kwargs):
36 | result_dict = super(CrtCatcherDecorator, self).execute(*args, **kwargs)
37 | print 'crt catcher complete.'
38 | return result_dict
39 |
40 |
41 | class SearchEngineCatcherDecorator(SubDomainListDecorator):
42 |
43 | def __init__(self, wrapped):
44 | super(SearchEngineCatcherDecorator, self).__init__(wrapped)
45 |
46 | def execute(self, *args, **kwargs):
47 | result_dict = super(SearchEngineCatcherDecorator, self).execute(*args, **kwargs)
48 | print 'search engine catcher complete.'
49 | return result_dict
50 |
51 |
52 | class SubDomainBruteDecorator(BaseDecorator):
53 |
54 | def __init__(self, wrapped):
55 | super(SubDomainBruteDecorator, self).__init__(wrapped)
56 |
57 | def execute(self, *args, **kwargs):
58 | result_dict = self.wrapped.run(*args, **kwargs)
59 | print 'sub domains brute complete.'
60 | return result_dict
61 |
62 |
63 | class PageCatcherDecorator(SubDomainListDecorator):
64 |
65 | def __init__(self, wrapped):
66 | super(PageCatcherDecorator, self).__init__(wrapped)
67 |
68 | def execute(self, *args, **kwargs):
69 | result_dict = super(PageCatcherDecorator, self).execute(*args, **kwargs)
70 | print 'page cathcher complete.'
71 | return result_dict
72 |
73 |
74 | class RecursiveCatcherDecorator(SubDomainListDecorator):
75 |
76 | def __init__(self, wrapped):
77 | super(RecursiveCatcherDecorator, self).__init__(wrapped)
78 |
79 | def execute(self, *args, **kwargs):
80 | result_dict = super(RecursiveCatcherDecorator, self).execute(*args, **kwargs)
81 | print 'recursive catcher complete.'
82 | return result_dict
83 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/dns_zone_transfer.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import sys
5 | import socket
6 | import dns
7 | import re
8 | from dns import resolver, query, exception
9 |
10 | reload(sys)
11 | sys.setdefaultencoding('utf-8')
12 |
13 |
14 | class DnsZoneTransfer(object):
15 |
16 | def __init__(self, domain):
17 | self.domain = domain
18 | self.nameservers = []
19 | try:
20 | nss = resolver.query(domain, 'NS')
21 | self.nameservers = [str(ns) for ns in nss]
22 | except:
23 | pass
24 |
25 | def transfer(self):
26 | # f = open('result.txt', 'a')
27 | result_dict = {}
28 | for ns in self.nameservers:
29 | # print >> sys.stderr, "Querying %s" % (ns,)
30 | # print >> sys.stderr, "-" * 50
31 | z = self.query(ns)
32 | # print z
33 | # if z is not None:
34 | # f.write(str(self.domain)+': '+str(ns)+'\n')
35 | # print self.domain ,ns
36 | # print >> sys.stderr, "%s\n" % ("-" * 50,)
37 | if z is not None:
38 | result_dict.update(z)
39 | return result_dict
40 |
41 | def query(self, ns):
42 | nsaddr = self.resolve_a(ns)
43 | try:
44 | z = self.pull_zone(nsaddr)
45 | # except (exception.FormError, socket.error, EOFError):
46 | except Exception:
47 | # print >> sys.stderr, "AXFR failed\n"
48 | return None
49 | else:
50 | return z
51 |
52 | def resolve_a(self, name):
53 | """Pulls down an A record for a name"""
54 | nsres = resolver.query(name, 'A')
55 | return str(nsres[0])
56 |
57 | def pull_zone(self, nameserver):
58 | """Sends the domain transfer request"""
59 | try:
60 | q = query.xfr(nameserver, self.domain, relativize=False, timeout=2, lifetime=5)
61 | except dns.exception.Timeout:
62 | raise EOFError
63 | zone = {}
64 |
65 | for m in q:
66 | for rrset in m.answer:
67 | for rd in rrset:
68 | # result_string = str(rrset.name).ljust(30) + str(dns.rdatatype.to_text(rrset.rdtype)).ljust(10) + rd.to_text(origin=None, relativize=True)
69 | # zone += result_string + '\
70 | parse_type = dns.rdatatype.to_text(rrset.rdtype)
71 | if parse_type == 'A':
72 | sub_domain = str(rrset.name)
73 | if re.match(r'^.*\.$', sub_domain):
74 | sub_domain = sub_domain[:-1]
75 | zone[sub_domain] = rd.to_text(origin=None, relativize=True)
76 | if not zone:
77 | raise EOFError
78 | return zone
79 |
80 | def execute(self):
81 | return self.transfer()
82 |
83 |
84 | if __name__ == '__main__':
85 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn'
86 | transfer = DnsZoneTransfer(target)
87 | result_dict = transfer.transfer()
88 | for key in result_dict.keys():
89 | print '%s: %s' % (key, result_dict[key])
90 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/fileutils.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import os
5 | import os.path
6 | '''文件的操作,可以优化掉'''
7 |
8 | class File(object):
9 |
10 | def __init__(self, *pathComponents):
11 | self._path = FileUtils.buildPath(*pathComponents)
12 | self.content = None
13 |
14 | @property
15 | def path(self):
16 | return self._path
17 |
18 | @path.setter
19 | def path(self, value):
20 | raise NotImplemented
21 |
22 | def isValid(self):
23 | return FileUtils.isFile(self.path)
24 |
25 | def exists(self):
26 | return FileUtils.exists(self.path)
27 |
28 | def canRead(self):
29 | return FileUtils.canRead(self.path)
30 |
31 | def canWrite(self):
32 | return FileUtils.canWrite(self.path)
33 |
34 | def read(self):
35 | return FileUtils.read(self.path)
36 |
37 | def update(self):
38 | self.content = self.read()
39 |
40 | def content(self):
41 | if not self.content:
42 | self.content = FileUtils.read()
43 | return self.content()
44 |
45 | def getLines(self):
46 | for line in FileUtils.getLines(self.path):
47 | yield line
48 |
49 | def __cmp__(self, other):
50 | if not isinstance(other, File):
51 | raise NotImplemented
52 | return cmp(self.content(), other.content())
53 |
54 | def __enter__(self):
55 | return self
56 |
57 | def __exit__(self, type, value, tb):
58 | pass
59 |
60 | class FileUtils(object):
61 |
62 | @staticmethod
63 | def buildPath(*pathComponents):
64 | if pathComponents:
65 | path = os.path.join(*pathComponents)
66 | else:
67 | path = ''
68 | return path
69 |
70 | @staticmethod
71 | def exists(fileName):
72 | return os.access(fileName, os.F_OK)
73 |
74 | @staticmethod
75 | def canRead(fileName):
76 | if not os.access(fileName, os.R_OK):
77 | return False
78 | try:
79 | with open(fileName):
80 | pass
81 | except IOError:
82 | return False
83 | return True
84 |
85 | @staticmethod
86 | def canWrite(fileName):
87 | return os.access(fileName, os.W_OK)
88 |
89 | @staticmethod
90 | def read(fileName):
91 | result = ''
92 | with open(fileName, 'r') as fd:
93 | for line in fd.readlines():
94 | result += line
95 | return result
96 |
97 | @staticmethod
98 | def getLines(fileName):
99 | with open(fileName, 'r') as fd:
100 | for line in fd.readlines():
101 | yield line.rstrip()
102 |
103 | @staticmethod
104 | def isDir(fileName):
105 | return os.path.isdir(fileName)
106 |
107 | @staticmethod
108 | def isFile(fileName):
109 | return os.path.isfile(fileName)
110 |
111 | @staticmethod
112 | def createDirectory(directory):
113 | if not FileUtils.exists(directory):
114 | os.makedirs(directory)
115 |
116 | @staticmethod
117 | def sizeHuman(num):
118 | base = 1024
119 | for x in ['B ','KB','MB','GB']:
120 | if num < base and num > -base:
121 | return "%3.0f%s" % (num, x)
122 | num /= base
123 | return "%3.0f %s" % (num, 'TB')
124 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/g_config.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import sys
5 | import json
6 | import sqlite3
7 | import os
8 |
9 | reload(sys)
10 | sys.setdefaultencoding('utf-8')
11 | env = os.getenv("sub_domain_env")
12 | if env not in('devel','local','binbin','prod'):
13 | env = 'local'
14 |
15 | try:
16 | with open('config/%s_config.json'%env, 'r') as config_file:
17 | config_json_text = config_file.read()
18 | config_json = json.loads(config_json_text)
19 | except Exception as e:
20 | print 'failed to load config file'
21 | sys.exit(-1)
22 |
23 |
24 | db = sqlite3.connect(config_json['db_name'] + '.db', check_same_thread=False)
25 | db_cursor = db.cursor()
26 |
27 | db_cursor.execute('''
28 | CREATE TABLE IF NOT EXISTS `root_domain` (
29 | `id` INTEGER PRIMARY KEY AUTOINCREMENT,
30 | `domain` VARCHAR(64) UNIQUE
31 | )
32 | ''')
33 | db.execute('''
34 | CREATE TABLE IF NOT EXISTS `result_domain` (
35 | `id` INTEGER PRIMARY KEY AUTOINCREMENT,
36 | `root_domain_id` INTEGER,
37 | `domain` VARCHAR(255) UNIQUE,
38 | `ip` VARCHAR(255)
39 | )
40 | ''')
41 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/get_ssl.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 |
5 | import os
6 | import re
7 | import requests
8 | import sys
9 |
10 | '''
11 | 通过证书查找子域名
12 | '''
13 |
14 |
15 | class GetSsl(object):
16 |
17 | def __init__(self, raw_domain):
18 | self.raw_domain = raw_domain
19 | self.x = set()
20 | self.PREFIX_URL1 = 'https://www.'
21 | self.PREFIX_URL2 = 'https://'
22 |
23 | def is_https1(self):
24 | url = self.PREFIX_URL2 + self.raw_domain
25 | try:
26 | requests.get(url, timeout=4)
27 | except requests.ConnectionError, requests.ConnectTimeout:
28 | return False
29 | return True
30 |
31 | def is_https2(self):
32 | url = self.PREFIX_URL1 + self.raw_domain
33 | try:
34 | requests.get(url, timeout=4)
35 | except requests.ConnectionError, requests.ConnectTimeout:
36 | return False
37 | return True
38 |
39 | def get_domains_from_openssl(self): # 使用 OpenSSL 的 SAN 获得域名,有命令注入风险
40 | domains = set()
41 | cmd = 'openssl s_client -showcerts -connect %s:443 < /dev/null 2>/dev/null \
42 | | openssl x509 -text | grep -A 1 "Subject Alternative Name"' % self.raw_domain
43 | try:
44 | tmp = os.popen(cmd).readlines()
45 | data = re.split(r'DNS:', tmp[1].strip())
46 | for i in data:
47 | if i:
48 | domains.add(i.replace(', ', '').replace('*.', ''))
49 | if self.raw_domain in domains:
50 | domains.remove(self.raw_domain)
51 | except KeyboardInterrupt:
52 | pass
53 | return list(domains)
54 |
55 | def execute(self):
56 | if self.is_https1() or self.is_https2():
57 | openssl_domains = self.get_domains_from_openssl()
58 | return openssl_domains
59 | return []
60 |
61 |
62 | if __name__ == '__main__':
63 | target = sys.argv[1] if len(sys.argv) > 1 else 'qq.com'
64 | print GetSsl(target).execute()
65 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/get_whois.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | from whois import whois
5 | import sys
6 |
7 |
8 | class GetWhois(object):
9 | def __init__(self, domain):
10 | self.domain = domain
11 |
12 | def execute(self):
13 | w = whois(self.domain)
14 | return w
15 |
16 | def run(self):
17 | return self.execute()
18 |
19 |
20 | if __name__ == '__main__':
21 | target = sys.argv[1] if len(sys.argv) > 1 else 'qq.com'
22 | print GetWhois(target).execute()
23 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/globalresult.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | '''
5 | 放全局结果字典,格式:
6 | 'domain': 'ip, ip, ip, ...'
7 | '''
8 |
9 | import sys
10 | import threading
11 | import utils
12 |
13 |
14 | g_lock = threading.Lock()
15 | g_result_dict = {}
16 |
17 |
18 | def update_result_dict(result_dict):
19 | '''
20 | 更新结果字典
21 | :param result_dict: 结果字典
22 | '''
23 | g_lock.acquire()
24 | for domain in result_dict.keys():
25 | need_print = False
26 | if domain not in g_result_dict:
27 | g_result_dict[domain] = result_dict[domain]
28 | need_print = True
29 | else:
30 | dest_ips = g_result_dict[domain].split(', ')
31 | src_ips = result_dict[domain].split(', ')
32 | for src_ip in src_ips:
33 | if src_ip not in dest_ips:
34 | g_result_dict[domain] += ', ' + src_ip
35 | need_print = True
36 | if need_print:
37 | sys.stdout.write(domain.ljust(30) + g_result_dict[domain] + '\n')
38 | sys.stdout.flush()
39 | g_lock.release()
40 |
41 |
42 | def add_list(result_list):
43 | to_dict = {}
44 | for i in result_list:
45 | to_dict[i] = utils.get_ip(i)
46 | update_result_dict(to_dict)
47 |
48 |
49 | if __name__ == '__main__':
50 | g_result_dict['www.baidu.com'] = '1.2.3.4'
51 |
52 | # test case 1
53 | # result_dict = {'www.baidu.com': '2.3.4.5'}
54 | # update_result_dict(result_dict)
55 |
56 | # test case 2
57 | # result_dict = {'admin.baidu.com': '3.4.5.6'}
58 | # update_result_dict(result_dict)
59 |
60 | # test case 3
61 | # result_dict = {'www.baidu.com': '1.2.3.4'}
62 | # update_result_dict(result_dict)
63 |
64 | # test case 4
65 | # result_dict = {'www.baidu.com': '1.2.3.4, 2.3.4.5'}
66 | # update_result_dict(result_dict)
67 |
68 | # test case 5
69 | # result_dict = {'www.baidu.com': '3.4.5.6, 2.3.4.5'}
70 | # update_result_dict(result_dict)
71 |
72 | # test case 6
73 | # result_list = ['www.baidu.com', 'fanyi.baidu.com']
74 | # add_list(result_list)
75 |
76 | print g_result_dict
77 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/hack_target.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import sys
5 | import requests
6 | import json
7 | import time
8 |
9 | reload(sys)
10 | sys.setdefaultencoding('utf-8')
11 |
12 | '''
13 | 通过调取hacktarget的api获取子域名
14 | http://api.hackertarget.com/hostsearch/?q=目标网页
15 | '''
16 |
17 |
18 | class HackTarget(object):
19 | def __init__(self, domain):
20 | self.domain = domain
21 | self.result_dict = {}
22 | self.result = []
23 |
24 | def execute(self):
25 | url = 'http://api.hackertarget.com/hostsearch/?q={0}'.format(self.domain)
26 | try:
27 | rsp = requests.get(url=url, timeout=5)
28 | for i in rsp.text.split('\n'):
29 | j = i.split(",")
30 | self.result_dict[j[0]] = j[1]
31 | except KeyboardInterrupt:
32 | pass
33 | except requests.exceptions.ConnectionError, requests.exceptions.ConnectTimeout:
34 | pass
35 | except Exception, e:
36 | pass
37 | for dist in self.result_dict:
38 | self.result.append(dist)
39 | self.result = list(set(self.result))
40 | return self.result
41 | #return self.result_dict
42 |
43 |
44 | if __name__ == '__main__':
45 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn'
46 | a = HackTarget(target)
47 | print a.execute()
48 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/i_links.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import sys
5 | import requests
6 | from lxml import etree
7 | import time
8 | from urlparse import urlparse
9 |
10 | reload(sys)
11 | sys.setdefaultencoding('utf-8')
12 |
13 | '''抓取站长帮手网的信息'''
14 |
15 |
16 | def geturl(url):
17 | parse = urlparse(url)
18 | url = parse.netloc
19 | return url
20 |
21 |
22 | class ILinks(object):
23 | def __init__(self, domain):
24 | self.domain = domain
25 |
26 | def execute(self):
27 | subdomain_set = set()
28 | url = 'http://i.links.cn/subdomain/'
29 | data = {'domain': self.domain,
30 | 'b2': '1',
31 | 'b3': '1',
32 | 'b4': '1'}
33 | try:
34 | rsp = requests.post(url=url, data=data, timeout=5)
35 | root = etree.HTML(rsp.text)
36 | urls = root.xpath('//*[@class="domain"]/a')
37 | for i in urls:
38 | '''结果打印和集合添加'''
39 | url = geturl(i.text)
40 | if len(url) == 0:
41 | url = i.text
42 | # print url
43 | subdomain_set.add(url)
44 | except requests.exceptions.ConnectionError, requests.exceptions.ConnectTimeout:
45 | print '网络问题退出'
46 | except Exception, e:
47 | print "其它问题退出:", e.message
48 |
49 | return list(subdomain_set)
50 |
51 |
52 | if __name__ == '__main__':
53 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn'
54 | a = ILinks(target)
55 | a.execute()
56 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/ip138.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | """从ip138中的相关网页获取子域名,模仿wydomain的写法"""
5 |
6 | import sys
7 | import logging
8 | import re
9 |
10 | from common import http_request_get, is_domain
11 |
12 |
13 | class Ip138(object):
14 | """docstring for IP138"""
15 |
16 | def __init__(self, domain):
17 | super(Ip138, self).__init__()
18 | self.domain = domain
19 | self.subset = []
20 |
21 | def run(self):
22 | try:
23 | self.fetch_ip138()
24 | return list(set(self.subset))
25 | except Exception as e:
26 | logging.info(str(e))
27 | return self.subset
28 |
29 | def fetch_ip138(self):
30 | """get subdomains from ip138.com"""
31 |
32 | url = 'http://site.ip138.com/{0}/domain.htm'.format(self.domain)
33 | r = http_request_get(url).content
34 | regx = r'(.*\.%s)' % self.domain
35 | # subs = re.compile(r'(?<="\>\r\n).*?(?=)')
36 | result = re.findall(regx, r)
37 | for sub in result:
38 | # print sub
39 | if is_domain(sub):
40 | self.subset.append(sub)
41 |
42 | def execute(self):
43 | return self.run()
44 |
45 | if __name__ == '__main__':
46 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn'
47 | a = Ip138(target)
48 | print a.execute()
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/netcraft.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | # import sys
5 | # sys.path.append("../")
6 |
7 | import logging
8 | import re
9 | import subprocess
10 | import time
11 |
12 | import sys
13 |
14 | from common import http_request_get, is_domain
15 |
16 |
17 | class Netcraft(object):
18 | """docstring for Netcraft"""
19 | def __init__(self, domain):
20 | super(Netcraft, self).__init__()
21 | self.cookie = ''
22 | self.subset = []
23 | self.domain = domain
24 | self.site = 'http://searchdns.netcraft.com'
25 |
26 | def run(self):
27 | try:
28 | self.cookie = self.get_cookie().get('cookie')
29 | url = '{0}/?restriction=site+contains&position=limited&host=.{1}'.format(
30 | self.site, self.domain)
31 | r = http_request_get(url, custom_cookie=self.cookie)
32 | self.parser(r.text)
33 | return list(set(self.subset))
34 | except Exception, e:
35 | logging.info(str(e))
36 | return self.subset
37 |
38 | def parser(self, response):
39 | npage = re.search('Next page', response)
40 | if npage:
41 | for item in self.get_subdomains(response):
42 | if is_domain(item):
43 | self.subset.append(item)
44 | nurl = '{0}{1}'.format(self.site, npage.group(1))
45 | r = http_request_get(nurl, custom_cookie=self.cookie)
46 | time.sleep(3)
47 | self.parser(r.text)
48 | else:
49 | for item in self.get_subdomains(response):
50 | if is_domain(item):
51 | self.subset.append(item)
52 |
53 | def get_subdomains(self, response):
54 | _regex = re.compile(r'(?<= 1 else 'cugb.edu.cn'
79 | netcraft = Netcraft(domain=target)
80 | print netcraft.execute()
81 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/pz.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import sys
5 | import requests
6 | import lxml.etree as etree
7 | import socket
8 | from time import ctime, time
9 | from urlparse import urlparse
10 |
11 | reload(sys)
12 | sys.setdefaultencoding('utf-8')
13 |
14 | TIMEOUT = 5
15 |
16 | '''
17 | 实现功能:根据给出的域名,首先socket域名的ip地址,然后更具bing高级搜索ip:,使用xpath,爬取包含该ip的链接,返回url及title
18 | 参数一:目标域名
19 | '''
20 |
21 |
22 | def gethtml(url): # 获取必应的搜索结果
23 | try:
24 | headers = {
25 | 'Host': 'www.bing.com',
26 | 'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/55.0.2883.87 Chrome/55.0.2883.87 Safari/537.36'}
27 | r = requests.get(url, headers=headers, timeout=TIMEOUT)
28 | if r.status_code == 200:
29 | return r.text
30 | else:
31 | return None
32 | except KeyboardInterrupt:
33 | sys.exit()
34 | except Exception, e:
35 | print e
36 | return 'error'
37 |
38 |
39 | end = []
40 | check = []
41 |
42 |
43 | def getsearchresult_url(ip, url): # 使用搜索的地址,获取搜索结果
44 | try:
45 | html = gethtml(url)
46 | if not html:
47 | print '页没有内容,url:%s' % url
48 | return 'error'
49 | if html == 'error': # 搜索必应失败
50 | return 'error'
51 | root = etree.HTML(html)
52 | lines = root.xpath('//*[@id="b_results"]') # 结果集合
53 | if not lines:
54 | return 'error'
55 | else:
56 | lines = lines[0]
57 | urlandtitle = []
58 | for l in lines:
59 | url = l.xpath('.//h2/a/@href')
60 | title = l.xpath('.//h2/a/text()')
61 | if url and title:
62 | url = url[0]
63 | parser = urlparse(url)
64 | netloc = parser.netloc
65 | if netloc == 'ip.chinaz.com':
66 | pass
67 | else:
68 | title = title[0]
69 | urlandtitle.append({'url': url, 'title': title})
70 | else:
71 | pass
72 | urls_temp = {}
73 | urls_temp = urlandtitle
74 |
75 | for u in urls_temp:
76 | title = u['title']
77 | parser = urlparse(u['url'])
78 | url = parser.scheme + '://' + parser.netloc + '/'
79 | if url not in check:
80 | end.append({'url': url, 'title': title})
81 | check.append(url)
82 | next_page = lines.xpath('.//*[@class="sb_pagN"]/@href')
83 | # time.sleep(1)
84 |
85 | if len(next_page) > 0:
86 | url = 'https://www.bing.com'+next_page[0]
87 | return 0,url,end
88 | else:
89 | return 1,None,end
90 | except Exception, e:
91 | print e
92 | return 'error'
93 |
94 |
95 | def getbing(ip): # 获取ip地址的域名等信息
96 | i = []
97 | searchurl = 'https://www.bing.com/search?q=ip%3a' + ip + '&qs=HS&pq=ip%3a'
98 | uat = getsearchresult_url(ip, searchurl)
99 | if not uat:
100 | return None
101 | if uat == 'error':
102 | return None
103 | while True:
104 | if uat[0] == 0:
105 | for u in uat[2]:
106 | if not (u['url'],u['title']) in i:
107 | i.append((u['url'],u['title']))
108 | uat = getsearchresult_url(ip,uat[1])
109 | elif uat[0] == 1:
110 | for u in uat[2]:
111 | if not (u['url'],u['title']) in i:
112 | i.append((u['url'],u['title']))
113 | break
114 | else:
115 | break
116 | return i
117 |
118 |
119 | if __name__ == '__main__':
120 | ip = sys.argv[1]
121 | i = getbing(ip)
122 | for ii in i:
123 | print ii
124 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/sitedossier.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | # import sys
5 | # sys.path.append("../")
6 |
7 | import json
8 | import logging
9 | import re
10 |
11 | import sys
12 |
13 | from common import http_request_get, http_request_post
14 | from captcha import Captcha
15 |
16 |
17 | class Sitedossier(object):
18 | """docstring for Sitedossier"""
19 | def __init__(self, domain):
20 | super(Sitedossier, self).__init__()
21 | self.domain = domain
22 | self.captcha = Captcha()
23 | self.subset = []
24 |
25 | def run(self):
26 | try:
27 | url = 'http://www.sitedossier.com/parentdomain/{0}'.format(self.domain)
28 | r = self.get_content(url)
29 | self.parser(r)
30 | return list(set(self.subset))
31 | except Exception, e:
32 | logging.info(str(e))
33 | return self.subset
34 |
35 | def get_content(self, url):
36 | logging.info('request: {0}'.format(url))
37 | r = http_request_get(url).text
38 | if self.human_act(r) is True:
39 | return r
40 | else:
41 | self.get_content(url)
42 |
43 | def parser(self, response):
44 | npage = re.search('Show', response)
45 | if npage:
46 | for sub in self.get_subdomain(response):
47 | self.subset.append(sub)
48 | nurl = 'http://www.sitedossier.com/parentdomain/{0}'.format(npage.group(1))
49 | response = self.get_content(nurl)
50 | self.parser(response)
51 | else:
52 | for sub in self.get_subdomain(response):
53 | self.subset.append(sub)
54 |
55 | def get_subdomain(self, response):
56 | domain = re.compile(r'(?<=)')
57 | for sub in domain.findall(response):
58 | yield sub
59 |
60 | def human_act(self, response):
61 | if 'auditimage' in response or 'blacklisted' in response:
62 | imgurl = self.get_audit_img(response)
63 | if imgurl is not None:
64 | ret = self.captcha.verification(imgurl)
65 | if ret.has_key('Result'):
66 | self.audit(ret['Result'])
67 | return True
68 | else:
69 | raise Exception("captcha_verification_is_empty")
70 | else:
71 | raise Exception("audit_img_is_empty")
72 | else:
73 | return True
74 |
75 | def audit(self, code):
76 | payload = {'w':code}
77 | url = 'http://www.sitedossier.com/audit'
78 | r = http_request_post(url, payload=payload)
79 |
80 | def get_audit_img(self, response):
81 | auditimg = re.compile(r'(?<=
1 else 'cugb.edu.cn'
44 | threat = Threatcrowd(target)
45 | print threat.execute()
46 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/threatminer.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | # import sys
5 | # sys.path.append("../")
6 |
7 | import logging
8 | import re
9 |
10 | import sys
11 |
12 | from common import http_request_get, is_domain
13 |
14 |
15 | class Threatminer(object):
16 | """docstring for Threatminer"""
17 | def __init__(self, domain):
18 | super(Threatminer, self).__init__()
19 | self.domain = domain
20 | self.subset = []
21 | self.website = "https://www.threatminer.org"
22 |
23 | def run(self):
24 | try:
25 | url = "{0}/getData.php?e=subdomains_container&q={1}&t=0&rt=10&p=1".format(self.website, self.domain)
26 | # content = curl_get_content(url).get('resp')
27 | content = http_request_get(url).content
28 |
29 | _regex = re.compile(r'(?<=)')
30 | for sub in _regex.findall(content):
31 | if is_domain(sub):
32 | self.subset.append(sub)
33 |
34 | return list(set(self.subset))
35 | except Exception as e:
36 | logging.info(str(e))
37 | return self.subset
38 |
39 | def execute(self):
40 | return self.run()
41 |
42 |
43 | if __name__ == '__main__':
44 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn'
45 | threat = Threatminer(target)
46 | print threat.execute()
47 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/utils.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 |
4 | import json
5 | import sys
6 | import socket
7 |
8 | import datetime
9 |
10 |
11 | def get_ip(domain):
12 | try:
13 | ip_list = socket.gethostbyname_ex(domain)[2]
14 | ip = ', '.join(ip_list) if 1 == len(ip_list) else ip_list[0]
15 | # for i in ip_list:
16 | # ip += (i+', ')
17 | except Exception as e:
18 | ip = 'None'
19 | return ip
20 |
21 |
22 | def out(msg):
23 | sys.stdout.write(msg)
24 | sys.stdout.flush()
25 |
26 |
27 | def print_result_list(result_list):
28 | for i in result_list:
29 | msg = i.ljust(30) + get_ip(i)
30 | out(msg + '\n')
31 |
--------------------------------------------------------------------------------
/TaskPython/TaskInfo/whatcms.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | # @Time : 17/8/16 上午12:01
4 | # @Author : SecPlus
5 | # @Site : www.SecPlus.org
6 | # @Email : miacey@163.com
7 |
8 | import Queue,sys
9 |
10 | reload(sys)
11 | sys.setdefaultencoding('utf8')
12 |
13 | import requests
14 | import json, hashlib, sys
15 | import gevent
16 | from gevent.queue import Queue
17 | import time
18 |
19 |
20 | class whatcms(object):
21 | def __init__(self, url,file):
22 | self.tasks = Queue()
23 | self.url = url.rstrip("/")
24 | self.out = open(file,'w')
25 | # print file
26 | fp = open('data.json')
27 | webdata = json.load(fp, encoding="utf-8")
28 | for i in webdata:
29 | self.tasks.put(i)
30 | fp.close()
31 | print("webdata total:%d" % len(webdata))
32 |
33 | def _GetMd5(self, body):
34 | m2 = hashlib.md5()
35 | m2.update(body)
36 | return m2.hexdigest()
37 |
38 | def _clearQueue(self):
39 | while not self.tasks.empty():
40 | self.tasks.get()
41 |
42 | def _worker(self):
43 | data = self.tasks.get()
44 | test_url = self.url + data["url"]
45 | # print test_url
46 | rtext = ''
47 | try:
48 | r = requests.get(test_url, timeout=0.5)
49 | if (r.status_code != 200):
50 | return
51 | rtext = r.text
52 | if rtext is None:
53 | return
54 | except:
55 | rtext = ''
56 |
57 | if data["re"]:
58 | if (rtext.find(data["re"]) != -1):
59 | result = data["name"]
60 | print("CMS:%s Judge:%s re:%s" % (result, test_url, data["re"]))
61 | self.out.write(result)
62 | self._clearQueue()
63 | return True
64 | else:
65 | md5 = self._GetMd5(rtext)
66 | if (md5 == data["md5"]):
67 | result = data["name"]
68 | print("CMS:%s Judge:%s md5:%s" % (result, test_url, data["md5"]))
69 | self.out.write(result)
70 | self._clearQueue()
71 | return True
72 |
73 | def _boss(self):
74 | while not self.tasks.empty():
75 | self._worker()
76 |
77 | def whatweb(self, maxsize=100):
78 | start = time.clock()
79 | allr = [gevent.spawn(self._boss) for i in range(maxsize)]
80 | gevent.joinall(allr)
81 | end = time.clock()
82 | print ("cost: %f s" % (end - start))
83 |
84 |
85 | if __name__ == '__main__':
86 | if len(sys.argv) < 2:
87 | print("usag:python whatcms.py http://www.xxx.com")
88 | else:
89 | url = sys.argv[1]
90 | out = sys.argv[2]
91 | g = whatcms(url,out)
92 | g.whatweb(1000)
93 |
--------------------------------------------------------------------------------
/TaskPython/Tide-WDScanner-bat.bat:
--------------------------------------------------------------------------------
1 |
2 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython" && python C:\WDScanner\WWW\TaskPython\taskscan.py"
3 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython" && python C:\WDScanner\WWW\TaskPython\taskspider.py"
4 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython\TaskInfo" && python C:\WDScanner\WWW\TaskPython\TaskInfo\taskinfo-win.py"
--------------------------------------------------------------------------------
/TaskPython/Tide-proxy-bat.bat:
--------------------------------------------------------------------------------
1 |
2 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython\proxy" && python C:\WDScanner\WWW\TaskPython\proxy\assess_quality.py"
3 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython\proxy" && python C:\WDScanner\WWW\TaskPython\proxy\ip_pool.py"
4 |
--------------------------------------------------------------------------------
/TaskPython/bat/00dde594e5f4fbef569bf66947122478.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://zhaosheng.lyu.edu.cn
--HtmlAuthUser= --HtmlAuthPass= --EnablePortScanning=True /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\00dde594e5f4fbef569bf66947122478\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/0ddf68dcf63e0cc39aed76cd96d5773d.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.tyanhome.com.cn/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\0ddf68dcf63e0cc39aed76cd96d5773d\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/177b45290f0e02fc4b6b717ee63e0993.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.jxzls.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\177b45290f0e02fc4b6b717ee63e0993\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/2120d4819c0cbd0350097999399a818d.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.sdgsxx.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\2120d4819c0cbd0350097999399a818d\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/358066961ec043941983855238c65619.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.whhywater.com --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\358066961ec043941983855238c65619\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/36f0ec6fe6399491ed166c2132493e0b.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://testaspnet.vulnweb.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\36f0ec6fe6399491ed166c2132493e0b\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/45c20358adc310212646795fc0986a3e.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://testphp.vulnweb.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\45c20358adc310212646795fc0986a3e\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/6560689483f8fd7793b67ce4f79803b9.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.lvquan.cn/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\6560689483f8fd7793b67ce4f79803b9\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/8058d809b01005a65e3f3359b21de527.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.chngec.com.cn/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\8058d809b01005a65e3f3359b21de527\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/9b20620a18e0ef7f542a1ef51ffa7b96.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.kongziyjy.org --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\9b20620a18e0ef7f542a1ef51ffa7b96\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/da12fdc291fdc06b67455a640a865d93.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://testasp.vulnweb.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\da12fdc291fdc06b67455a640a865d93\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/da7acffdbc450ed7a04e6ccf20fb5c82.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.webscantest.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\da7acffdbc450ed7a04e6ccf20fb5c82\
2 |
--------------------------------------------------------------------------------
/TaskPython/bat/ec1d0085488097c51c6e433520b2cc5b.bat:
--------------------------------------------------------------------------------
1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://testhtml5.vulnweb.com --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\ec1d0085488097c51c6e433520b2cc5b\
2 |
--------------------------------------------------------------------------------
/TaskPython/cmd.bat:
--------------------------------------------------------------------------------
1 | cmd.exe
--------------------------------------------------------------------------------
/TaskPython/logspider/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/.DS_Store
--------------------------------------------------------------------------------
/TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/done.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/done.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/urlall.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/urlall.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/urllog.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/urllog.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/36f0ec6fe6399491ed166c2132493e0b/done.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/36f0ec6fe6399491ed166c2132493e0b/done.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/36f0ec6fe6399491ed166c2132493e0b/urllog.txt:
--------------------------------------------------------------------------------
1 | bad##http://testaspnet.vulnweb.com/javascript:__doPostBack('RightPanel1$Calendar','7078') --- Parent_Page:http://testaspnet.vulnweb.com/Signup.aspx+++
2 | bad##http://testaspnet.vulnweb.com/javascript:__doPostBack('RightPanel1$Calendar','7089') --- Parent_Page:http://testaspnet.vulnweb.com/Signup.aspx+++
3 | bad##http://testaspnet.vulnweb.com/ReadNews.aspx?id=2&NewsAd=ads/def.html --- Parent_Page:http://testaspnet.vulnweb.com/Default.aspx+++
4 |
--------------------------------------------------------------------------------
/TaskPython/logspider/45c20358adc310212646795fc0986a3e/done.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/45c20358adc310212646795fc0986a3e/done.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/45c20358adc310212646795fc0986a3e/urllog.txt:
--------------------------------------------------------------------------------
1 | bad##http://www.eclectasy.com/Fractal-Explorer/index.html --- Parent_Page:http://testphp.vulnweb.com/product.php?pic=5+++
2 | bad##http://testphp.vulnweb.com/version.php --- Parent_Page:http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts/+++
3 | bad##http://testphp.vulnweb.com//hpp/ --- Parent_Page:http://testphp.vulnweb.com/#+++
4 | bad##http://testphp.vulnweb.com/../index.php --- Parent_Page:http://testphp.vulnweb.com/Templates/main_dynamic_template.dwt.php+++
5 |
--------------------------------------------------------------------------------
/TaskPython/logspider/6560689483f8fd7793b67ce4f79803b9/done.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/6560689483f8fd7793b67ce4f79803b9/done.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/6560689483f8fd7793b67ce4f79803b9/urllog.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/6560689483f8fd7793b67ce4f79803b9/urllog.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/8058d809b01005a65e3f3359b21de527/done.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/8058d809b01005a65e3f3359b21de527/done.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/8058d809b01005a65e3f3359b21de527/urlall.txt:
--------------------------------------------------------------------------------
1 | http://www.chngec.com.cn/'+_ROOT+'/process/grsf_wz_back?m=query_aqyrDetail&dbid='+rec.dbid+'
2 | http://www.chngec.com.cn/' + _ROOT + '/login.jsp?uname=' + staffCode + '
3 | http://www.chngec.com.cn/javascript:regist();
4 | http://www.chngec.com.cn//safe.jsp
5 | http://www.chngec.com.cn/
6 | http://www.chngec.com.cn//jsp/grkhcx.jsp
7 | http://www.chngec.com.cn//aboutMain.jsp
8 | http://www.chngec.com.cn/javascript:searchAdress();
9 | http://www.chngec.com.cn//e-invoice.jsp
10 | http://www.chngec.com.cn/index1
11 | http://www.chngec.com.cn//onlineStop.jsp
12 | http://www.chngec.com.cn//consult.jsp
13 | http://www.chngec.com.cn/javascript:submitUserMsg();
14 | http://www.chngec.com.cn//index.jsp
15 | http://www.chngec.com.cn//onlineRepair.jsp
16 | http://www.xinnet.com/domain/cert.do?method=listCert&enDomainName=chngec.com.cn
17 | http://www.chngec.com.cn//onlineOpen.jsp
18 | http://www.chngec.com.cn/javascript:void(0);
19 | http://www.chngec.com.cn//jsp/mingxi.jsp
20 | http://www.chngec.com.cn//noice.jsp
21 | http://www.chngec.com.cn//news.jsp
22 | http://www.chngec.com.cn//safe_yr.jsp
23 | http://www.chngec.com.cn/javascript:searchGrkh();
24 | http://www.chngec.com.cn/onlineOpen.jsp
25 | http://www.chngec.com.cn/onlineStop.jsp
26 | http://www.chngec.com.cn/onlineRepair.jsp
27 | http://www.chngec.com.cn/' + _ROOT + '/jsp/baoxiu.jsp
28 | http://www.chngec.com.cn/javascript:webjf();
29 | http://www.chngec.com.cn/' + _ROOT + '/process/grsf_wz_back?m='+flag+'&dbid=' + rec1.dbid + '
30 | http://www.chngec.com.cn/javascript:pay4order();
31 | http://www.chngec.com.cn/javascript:qxZxbtbx(\'' + type + '\');
32 | http://www.chngec.com.cn/'+_ROOT+'/process/grsf_wz_back?m='+flag+'&dbid='+rec.dbid+'
33 | http://www.chngec.com.cn/' + url + '
34 | http://www.chngec.com.cn/' + _ROOT + '/jsp/viewbtbx.jsp?type=' + type + '&id=' + rec.dbid + '
35 | http://www.chngec.com.cn/' + _ROOT + '/jsp/stop.jsp
36 | http://www.chngec.com.cn/' + (rec.ismain == '1' ? '
37 | http://www.chngec.com.cn/javascript:delorder();
38 | http://www.chngec.com.cn/javascript:submit2();
39 | http://www.chngec.com.cn/javascript:submit();
40 | http://www.chngec.com.cn/javascript:searchQfmingxi();
41 | http://www.chngec.com.cn///consult.jsp
42 | http://www.chngec.com.cn///index.jsp
43 | http://www.chngec.com.cn///e-invoice.jsp
44 | http://www.chngec.com.cn///aboutMain.jsp
45 | http://www.chngec.com.cn///safe.jsp
46 | http://www.chngec.com.cn///jsp/mingxi.jsp
47 | http://www.chngec.com.cn//contact/about_rizhao.jsp
48 | http://www.chngec.com.cn///noice.jsp
49 |
--------------------------------------------------------------------------------
/TaskPython/logspider/8058d809b01005a65e3f3359b21de527/urllog.txt:
--------------------------------------------------------------------------------
1 | bad##http://www.chngec.com.cn/javascript:qxZxbtbx(\'' + type + '\'); --- Parent_Page:http://www.chngec.com.cn/res/js/gryx_signon.js+++
2 |
--------------------------------------------------------------------------------
/TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/done.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/done.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/urlall.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/urlall.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/urllog.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/urllog.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/da12fdc291fdc06b67455a640a865d93/done.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/da12fdc291fdc06b67455a640a865d93/done.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/da12fdc291fdc06b67455a640a865d93/urllog.txt:
--------------------------------------------------------------------------------
1 | bad##http://testasp.vulnweb.com/./Register.asp?RetURL=%2Fshowthread%2Easp%3Fid%3D16 --- Parent_Page:http://testasp.vulnweb.com/./Login.asp?RetURL=%2Fshowthread%2Easp%3Fid%3D16+++
2 | bad##http://testasp.vulnweb.com/./Login.asp?RetURL=%2Fregister%2Easp%3F --- Parent_Page:http://testasp.vulnweb.com/register.asp+++
3 | bad##http://testasp.vulnweb.com/../Search.asp --- Parent_Page:http://testasp.vulnweb.com/Templates/MainTemplate.dwt.asp+++
4 | bad##http://testasp.vulnweb.com/showthread.asp?id=5 --- Parent_Page:http://testasp.vulnweb.com/showforum.asp?id=0+++
5 |
--------------------------------------------------------------------------------
/TaskPython/logspider/da7acffdbc450ed7a04e6ccf20fb5c82/urlall.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/da7acffdbc450ed7a04e6ccf20fb5c82/urlall.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/da7acffdbc450ed7a04e6ccf20fb5c82/urllog.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/da7acffdbc450ed7a04e6ccf20fb5c82/urllog.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/ec1d0085488097c51c6e433520b2cc5b/done.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/ec1d0085488097c51c6e433520b2cc5b/done.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/ec1d0085488097c51c6e433520b2cc5b/urlall.txt:
--------------------------------------------------------------------------------
1 | http://testhtml5.vulnweb.com/
2 | http://www.acunetix.com/blog/
3 | http://www.twitter.com/acunetix/
4 | http://www.facebook.com/Acunetix
5 | http://www.acunetix.com
6 | http://testhtml5.vulnweb.com//
7 | http://www.acunetix.com/
8 |
--------------------------------------------------------------------------------
/TaskPython/logspider/ec1d0085488097c51c6e433520b2cc5b/urllog.txt:
--------------------------------------------------------------------------------
1 | bad##http://testhtml5.vulnweb.com/ --- Parent_Page:http://testhtml5.vulnweb.com/#/archive+++
2 | bad##http://www.twitter.com/acunetix/ --- Parent_Page:http://testhtml5.vulnweb.com/#/archive+++
3 | bad##http://www.facebook.com/Acunetix --- Parent_Page:http://testhtml5.vulnweb.com/#/archive+++
4 |
--------------------------------------------------------------------------------
/TaskPython/logspider/fcee4c56499a9d717304040dbf2e2590/done.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/fcee4c56499a9d717304040dbf2e2590/done.txt
--------------------------------------------------------------------------------
/TaskPython/logspider/fcee4c56499a9d717304040dbf2e2590/urlall.txt:
--------------------------------------------------------------------------------
1 | http://yilinhb.com//html/2414.html
2 | http://yilinhb.com//html/2444.html
3 | http://yilinhb.com//html/liuyan.html
4 | http://yilinhb.com//html/2566.html
5 | http://www.jsyzds.com
6 | http://yilinhb.com//html/cp_1490.html
7 | http://yilinhb.com//html/2674.html
8 | http://yilinhb.com//html/cp_1494.html
9 | http://yilinhb.com//
10 | http://yilinhb.com//html/cp_1495.html
11 | http://www.yilinhbgs.com
12 | http://yilinhb.com//html/gywm/jianjie.html
13 | http://yilinhb.com//english/
14 | http://yilinhb.com//html/lxwm/yewubu.html
15 | http://www.yilinhb.com
16 | http://www.yctcjcj.com
17 | http://yilinhb.com//html/cp_1493.html
18 | http://yilinhb.com//html/2675.html
19 | http://yilinhb.com//kaiceseo/login.asp
20 | http://yilinhb.com//english/html/liuyan.html
21 | http://yilinhb.com//english/html/cp_1493.html
22 | http://yilinhb.com//index.html
23 | http://yilinhb.com//english/html/cp_1495.html
24 | http://yilinhb.com//english/html/2412.html
25 | http://yilinhb.com//english/html/gywm/jianjie.html
26 | http://yilinhb.com//english/index.html
27 | http://yilinhb.com//english/html/lxwm/yewubu.html
28 | http://yilinhb.com//english/html/cp_1494.html
29 | http://yilinhb.com//english/html/2438.html
30 | http://yilinhb.com//english/html/2413.html
31 | http://yilinhb.com//english/html/cp_1490.html
32 | http://yilinhb.com//english/html/2439.html
33 | http://yilinhb.com//english/html/2437.html
34 | http://yilinhb.com//english/kaiceseo/login.asp
35 | http://yilinhb.com/
36 | http://yilinhb.com/javascript:void(0);
37 |
--------------------------------------------------------------------------------
/TaskPython/logspider/fcee4c56499a9d717304040dbf2e2590/urllog.txt:
--------------------------------------------------------------------------------
1 | bad##http://www.jsyzds.com --- Parent_Page:http://yilinhb.com/+++
2 |
--------------------------------------------------------------------------------
/TaskPython/proxy/cmd.bat:
--------------------------------------------------------------------------------
1 | cmd.exe
--------------------------------------------------------------------------------
/TaskPython/proxy/config.py:
--------------------------------------------------------------------------------
1 | # coding:utf-8
2 |
3 | # 从代理ip网站上总共要爬取的ip页数。一般每页20条,小项目(20-30个代理ip即可完成的)可以设置为1-2页。
4 | page_num = 3
5 |
6 | # 对已经检测成功的ip测试轮次。
7 | examine_round = 3
8 |
9 | # 超时时间。代理ip在测试过程中的超时时间。
10 | timeout = 5
11 |
12 | # 数据库链接地址
13 | host = '127.0.0.1'
14 |
15 | # 数据库链接端口
16 | port = 3306
17 |
18 | # 数据库链接用户名
19 | user = 'root'
20 |
21 | # 数据库密码
22 | passwd = '123456'
23 |
24 | # 数据库名
25 | DB_NAME = 'wdscan'
26 |
27 | # 表名
28 | TABLE_NAME = 'valid_ip'
29 |
30 | # 数据库字符
31 | charset = 'utf8'
32 |
33 | # 1个代理ip最大容忍失败次数,超过则从db中删去。
34 | USELESS_TIME = 4
35 |
36 | # 1个代理ip最小容忍成功率
37 | SUCCESS_RATE = 0.8
38 |
39 | # 超时惩罚时间
40 | TIME_OUT_PENALTY = 10
41 |
42 | # 每隔多久检测一次
43 | CHECK_TIME_INTERVAL = 24*3600
44 |
--------------------------------------------------------------------------------
/TaskPython/proxy/config.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/proxy/config.pyc
--------------------------------------------------------------------------------
/TaskPython/requirements.txt:
--------------------------------------------------------------------------------
1 | beautifulsoup4==4.6.0
2 | hackhttp
3 | requests
4 | gevent
5 | wafw00f
6 | pexpect
7 | lxml
8 | python-nmap
9 | dnspython
10 | py2-ipaddress
11 | pymysql
12 | DBUtils
--------------------------------------------------------------------------------
/TaskPython/taskscan.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import urllib, urllib2, time, os, base64, json
3 | import _winreg
4 |
5 | wvs_path = ""
6 |
7 |
8 | def get_html(url):
9 | try:
10 | url = url.strip()
11 | req = urllib2.Request(url)
12 | html = urllib2.urlopen(req).read()
13 | return html
14 | except urllib2.URLError as e:
15 | if 'error' in str(e):
16 | print e.reason
17 | print "Restarting Apache2a now..."
18 | cmd = 'net start Apache2a'
19 | os.system(cmd)
20 | cmd2 = 'net start MySQLa'
21 | os.system(cmd2)
22 | time.sleep(3)
23 | return ''
24 |
25 |
26 | def writefile(logname, cmd):
27 | try:
28 | fp = open(logname, 'a')
29 | fp.write(cmd + "\n")
30 | fp.close()
31 | except:
32 | return False
33 |
34 |
35 | def regedit(re_root, re_path, re_key):
36 | try:
37 | key = _winreg.OpenKey(_winreg.HKEY_LOCAL_MACHINE, re_path)
38 | value, type = _winreg.QueryValueEx(key, re_key)
39 | return value
40 | except:
41 | return False
42 |
43 |
44 | def get_console(url):
45 | now = time.strftime('%Y-%m-%d %X', time.localtime(time.time()))
46 | date = time.strftime('%Y-%m-%d', time.localtime(time.time()))
47 | try:
48 | # if 1 == 1:
49 | a = get_html(url)
50 | # print a
51 | if len(a) > 50:
52 | base = base64.b64decode(a)
53 | print base
54 | json_arr = json.loads(base)
55 | target_url = json_arr['target_url']
56 | user = json_arr['siteuser']
57 | pwd = json_arr['sitepwd']
58 | scan_rule = json_arr['scan_rule']
59 | hash = json_arr['hash']
60 | print json_arr
61 | console = '"%s\\wvs_console.exe" /Scan %s --HtmlAuthUser=%s --HtmlAuthPass=%s /Verbose /ExportXML /SaveLogs /SaveFolder C:\\WDScanner\\WWW\\report\\%s\\' % (
62 | wvs_path, target_url, user, pwd, hash)
63 | # console = console + '\ndel %0'
64 | scantime = time.strftime('%Y-%m-%d %X', time.localtime(time.time()))
65 | print "%s\n%s\n" % (scantime, console)
66 | writefile('bat\\%s.bat' % hash, console)
67 | cmd = 'cmd.exe /c bat\\\%s.bat' % hash
68 | print "%s\n%s\n%s\n" % (now, target_url, cmd)
69 | os.system(cmd)
70 | else:
71 | print "Nothing To Do"
72 | except Exception, e:
73 | info = '%s\nError: %s' % (now, e)
74 | writefile('logs\\%s-Error.log' % date, info)
75 | print info
76 |
77 |
78 | wvs_path = regedit(0, "SOFTWARE\Wow6432Node\Acunetix\WVS10", "Path")
79 | print wvs_path
80 | # exit()
81 | url = 'http://127.0.0.1/taskscan.php'
82 | i = 0
83 | while 1:
84 | now = time.strftime('%Y-%m-%d %X', time.localtime(time.time()))
85 | # print now
86 | try:
87 | # if 1==1:
88 | a = get_console(url)
89 | i += 1
90 | time.sleep(5)
91 | except Exception, e:
92 | info = '%s\nError: %s' % (now, e)
93 | writefile('Error.log', info)
94 | print info
95 | time.sleep(1)
96 |
--------------------------------------------------------------------------------
/ajax.php:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/css/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/css/.DS_Store
--------------------------------------------------------------------------------
/css/ie.css:
--------------------------------------------------------------------------------
1 | .lt-ie7 body,.lt-ie8 body,.lt-ie9 body{background-color:#006ec3}.lt-ie7 #ie-header,.lt-ie7 #root,.lt-ie7 .contact-section,.lt-ie7 footer,.lt-ie7 header,.lt-ie8 #ie-header,.lt-ie8 #root,.lt-ie8 .contact-section,.lt-ie8 footer,.lt-ie8 header,.lt-ie9 #ie-header,.lt-ie9 #root,.lt-ie9 .contact-section,.lt-ie9 footer,.lt-ie9 header{display:none}.lt-ie7 #ie-header span.logo,.lt-ie8 #ie-header span.logo,.lt-ie9 #ie-header span.logo{display:inline-block}.lt-ie7 #ie-header span.logo a:hover,.lt-ie8 #ie-header span.logo a:hover,.lt-ie9 #ie-header span.logo a:hover{text-decoration:none}.lt-ie7 #ie-header span.logo .iconLogo,.lt-ie8 #ie-header span.logo .iconLogo,.lt-ie9 #ie-header span.logo .iconLogo{color:#fff;font-size:60px}.lt-ie7 #ie-header .iconLogo,.lt-ie8 #ie-header .iconLogo,.lt-ie9 #ie-header .iconLogo{color:#fff;font-size:40px}.lt-ie7 #ie-header div.main-nav,.lt-ie8 #ie-header div.main-nav,.lt-ie9 #ie-header div.main-nav{display:inline-block;float:right;margin-right:50px}.lt-ie7 #ie-header li.nav-item,.lt-ie7 #ie-header ul.navbar-nav,.lt-ie8 #ie-header li.nav-item,.lt-ie8 #ie-header ul.navbar-nav,.lt-ie9 #ie-header li.nav-item,.lt-ie9 #ie-header ul.navbar-nav{display:inline-block}.lt-ie7 #ie-header .main-nav .nav .nav-item a,.lt-ie8 #ie-header .main-nav .nav .nav-item a,.lt-ie9 #ie-header .main-nav .nav .nav-item a{color:#fff}.lt-ie7 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary,.lt-ie8 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary,.lt-ie9 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary{border:1px solid #fff;color:#fff}.lt-ie7 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary:hover,.lt-ie8 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary:hover,.lt-ie9 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary:hover{border:1px solid #fff;color:#fff;background:#006ec3}.explorer-list{width:1000px;margin:-320px auto auto -500px;position:absolute;top:50%;left:50%}.oneapm-logo{text-align:center;margin-bottom:40px}.oneapm-logo .iconLogo{color:#fff;text-align:center;font-size:150px}.explorer-remind{color:#fff}.explorer-remind .para1{font-size:40px;text-align:center;font-weight:600;line-height:.5}.explorer-remind .para2{font-size:16px;margin-bottom:30px;text-align:center;color:#eee}.explorer-box{display:inline-block;width:190px;text-align:center;vertical-align:top;color:#fff;float:left}.explorer-link{color:#fff}.explorer-link:hover{color:#fff;text-decoration:none}.explorer-link:hover .explorer-title{text-decoration:underline}.bottom-bar-ie{position:absolute;bottom:0;width:100%;margin:auto;text-align:center}.gt-ie11 .carousel-control .glyphicon-chevron-left,.gt-ie11 .carousel-control .glyphicon-chevron-right,.gt-ie11 .carousel-control .icon-next,.gt-ie11 .carousel-control .icon-prev{position:static!;top:0}.gt-ie11 #test .carousel-control.right{position:fixed;right:25px;left:inherit}
--------------------------------------------------------------------------------
/css/img/bg.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/css/img/bg.png
--------------------------------------------------------------------------------
/css/img/glyphicons-halflings-white.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/css/img/glyphicons-halflings-white.png
--------------------------------------------------------------------------------
/css/img/glyphicons-halflings.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/css/img/glyphicons-halflings.png
--------------------------------------------------------------------------------
/file.php:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/fileinfo.php:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/filespider.php:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/html/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/html/.DS_Store
--------------------------------------------------------------------------------
/html/login.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54 |
55 |
56 |
57 |
58 |
TideSec安全团队分布式Web漏洞扫描系统
59 |
60 |
61 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 | -
94 | 关于我们
95 |
96 |
97 |
98 |
99 | 关于我们:WDScanner漏洞扫描平台是TideSec安全团队旗下的免费专业的分布式漏洞扫描平台,主机、域名一键式扫描,快速、全面诊断网站安全状况。
100 |
101 |
102 | 联系方式:TideSec安全团队http://www.tidesec.net
103 |
104 |
105 |
106 |
107 |
108 |
109 |
110 |