├── .DS_Store ├── README.md ├── TaskPython ├── .DS_Store ├── TaskInfo │ ├── .DS_Store │ ├── BBScan │ │ ├── BBScan.py │ │ ├── BBScan.pyc │ │ ├── LICENSE │ │ ├── README.md │ │ ├── lib │ │ │ ├── __init__.py │ │ │ ├── __init__.pyc │ │ │ ├── cmdline.py │ │ │ ├── cmdline.pyc │ │ │ ├── common.py │ │ │ ├── common.pyc │ │ │ ├── report.py │ │ │ └── report.pyc │ │ ├── report │ │ │ ├── hosts_20190319_163935.html │ │ │ ├── hosts_20190515_144510.html │ │ │ ├── hosts_20190515_144514.html │ │ │ └── hosts_20190515_162552.html │ │ ├── requirements.txt │ │ ├── rules │ │ │ ├── backup_files.txt │ │ │ ├── black.list │ │ │ ├── common.txt │ │ │ ├── directory_traversal.txt │ │ │ ├── disabled │ │ │ │ └── .gitignore │ │ │ ├── java_web.txt │ │ │ ├── phpinfo_and_test.txt │ │ │ ├── request │ │ │ │ └── .gitignore │ │ │ ├── white.list │ │ │ └── zabbix_jsrpc_sqli.txt │ │ └── targets │ │ │ └── .gitignore │ ├── cmd.bat │ ├── data.json │ ├── fileinfo.php │ ├── loginfo │ │ ├── .DS_Store │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d │ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-bbscan.txt │ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-bugscancms.txt │ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-domain.txt │ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-nmap.txt │ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-subdomain.txt │ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-waf.txt │ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-whatcms.txt │ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-whatweb.txt │ │ │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d-wyspider.txt │ │ │ └── 0ddf68dcf63e0cc39aed76cd96d5773d.txt │ │ ├── 177b45290f0e02fc4b6b717ee63e0993 │ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-bbscan.txt │ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-bugscancms.txt │ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-domain.txt │ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-nmap.txt │ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-subdomain.txt │ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-waf.txt │ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-whatcms.txt │ │ │ ├── 177b45290f0e02fc4b6b717ee63e0993-whatweb.txt │ │ │ └── 177b45290f0e02fc4b6b717ee63e0993-wyspider.txt │ │ ├── 36f0ec6fe6399491ed166c2132493e0b │ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-bbscan.txt │ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-bugscancms.txt │ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-domain.txt │ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-nmap.txt │ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-subdomain.txt │ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-waf.txt │ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-whatcms.txt │ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-whatweb.txt │ │ │ ├── 36f0ec6fe6399491ed166c2132493e0b-wyspider.txt │ │ │ └── 36f0ec6fe6399491ed166c2132493e0b.txt │ │ ├── 6560689483f8fd7793b67ce4f79803b9 │ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-bbscan.txt │ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-bugscancms.txt │ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-domain.txt │ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-nmap.txt │ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-subdomain.txt │ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-waf.txt │ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-whatcms.txt │ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-whatweb.txt │ │ │ ├── 6560689483f8fd7793b67ce4f79803b9-wyspider.txt │ │ │ └── 6560689483f8fd7793b67ce4f79803b9.txt │ │ ├── 8058d809b01005a65e3f3359b21de527 │ │ │ ├── 8058d809b01005a65e3f3359b21de527-bbscan.txt │ │ │ ├── 8058d809b01005a65e3f3359b21de527-bugscancms.txt │ │ │ ├── 8058d809b01005a65e3f3359b21de527-domain.txt │ │ │ ├── 8058d809b01005a65e3f3359b21de527-nmap.txt │ │ │ ├── 8058d809b01005a65e3f3359b21de527-subdomain.txt │ │ │ ├── 8058d809b01005a65e3f3359b21de527-waf.txt │ │ │ ├── 8058d809b01005a65e3f3359b21de527-whatcms.txt │ │ │ ├── 8058d809b01005a65e3f3359b21de527-whatweb.txt │ │ │ ├── 8058d809b01005a65e3f3359b21de527-wyspider.txt │ │ │ └── 8058d809b01005a65e3f3359b21de527.txt │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96 │ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-bbscan.txt │ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-bugscancms.txt │ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-domain.txt │ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-nmap.txt │ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-subdomain.txt │ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-waf.txt │ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-whatcms.txt │ │ │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96-whatweb.txt │ │ │ └── 9b20620a18e0ef7f542a1ef51ffa7b96-wyspider.txt │ │ ├── da12fdc291fdc06b67455a640a865d93 │ │ │ ├── da12fdc291fdc06b67455a640a865d93-bbscan.txt │ │ │ ├── da12fdc291fdc06b67455a640a865d93-bugscancms.txt │ │ │ ├── da12fdc291fdc06b67455a640a865d93-domain.txt │ │ │ ├── da12fdc291fdc06b67455a640a865d93-nmap.txt │ │ │ ├── da12fdc291fdc06b67455a640a865d93-subdomain.txt │ │ │ ├── da12fdc291fdc06b67455a640a865d93-waf.txt │ │ │ ├── da12fdc291fdc06b67455a640a865d93-whatcms.txt │ │ │ ├── da12fdc291fdc06b67455a640a865d93-whatweb.txt │ │ │ ├── da12fdc291fdc06b67455a640a865d93-wyspider.txt │ │ │ └── da12fdc291fdc06b67455a640a865d93.txt │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82 │ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-bbscan.txt │ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-bugscancms.txt │ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-domain.txt │ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-nmap.txt │ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-subdomain.txt │ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-waf.txt │ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-whatcms.txt │ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-whatweb.txt │ │ │ ├── da7acffdbc450ed7a04e6ccf20fb5c82-wyspider.txt │ │ │ └── da7acffdbc450ed7a04e6ccf20fb5c82.txt │ │ ├── ec1d0085488097c51c6e433520b2cc5b │ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-bbscan.txt │ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-bugscancms.txt │ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-domain.txt │ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-nmap.txt │ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-subdomain.txt │ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-waf.txt │ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-whatcms.txt │ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-whatweb.txt │ │ │ ├── ec1d0085488097c51c6e433520b2cc5b-wyspider.txt │ │ │ └── ec1d0085488097c51c6e433520b2cc5b.txt │ │ └── f71bcce3867466d807bac5200e63b33d │ │ │ ├── f71bcce3867466d807bac5200e63b33d-bbscan.txt │ │ │ ├── f71bcce3867466d807bac5200e63b33d-bugscancms.txt │ │ │ ├── f71bcce3867466d807bac5200e63b33d-domain.txt │ │ │ ├── f71bcce3867466d807bac5200e63b33d-nmap.txt │ │ │ ├── f71bcce3867466d807bac5200e63b33d-subdomain.txt │ │ │ ├── f71bcce3867466d807bac5200e63b33d-waf.txt │ │ │ ├── f71bcce3867466d807bac5200e63b33d-whatcms.txt │ │ │ ├── f71bcce3867466d807bac5200e63b33d-whatweb.txt │ │ │ └── f71bcce3867466d807bac5200e63b33d-wyspider.txt │ ├── scripts │ │ └── banner.nse │ ├── subDomainsBrute-master │ │ ├── .DS_Store │ │ ├── .gitignore │ │ ├── README.md │ │ ├── dict │ │ │ ├── dns_servers.txt │ │ │ ├── next_sub.txt │ │ │ ├── next_sub_full.txt │ │ │ ├── subnames - 副本.txt │ │ │ ├── subnames.txt │ │ │ ├── subnames_all_5_letters.txt │ │ │ ├── subnames_full.txt │ │ │ └── subnames_full_bak.txt │ │ ├── extract_domain.py │ │ ├── fast_sub.py │ │ ├── ip_translate.py │ │ ├── lib │ │ │ ├── __init__.py │ │ │ ├── consle_width.py │ │ │ ├── database.py │ │ │ └── threadpool.py │ │ ├── out │ │ │ └── zbedu.gov.cn.txt │ │ ├── run.py │ │ ├── subDomainsBrute.py │ │ └── utils │ │ │ ├── __init__.py │ │ │ ├── alexa.py │ │ │ ├── baidu.py │ │ │ ├── banner.py │ │ │ ├── bing.py │ │ │ ├── bugbank.py │ │ │ ├── captcha.py │ │ │ ├── common.py │ │ │ ├── config.py │ │ │ ├── crt.py │ │ │ ├── decorators.py │ │ │ ├── dns_zone_transfer.py │ │ │ ├── fileutils.py │ │ │ ├── g_config.py │ │ │ ├── get_by_ssl.py │ │ │ ├── get_ssl.py │ │ │ ├── get_whois.py │ │ │ ├── globalresult.py │ │ │ ├── hack_target.py │ │ │ ├── i_links.py │ │ │ ├── ip138.py │ │ │ ├── juanluo.py │ │ │ ├── netcraft.py │ │ │ ├── page_catcher.py │ │ │ ├── pz.py │ │ │ ├── sitedossier.py │ │ │ ├── sub_domains_brute.py │ │ │ ├── threatcrowd.py │ │ │ ├── threatminer.py │ │ │ └── utils.py │ ├── taskinfo-win.py │ └── whatcms.py ├── Tide-WDScanner-bat.bat ├── Tide-proxy-bat.bat ├── bat │ ├── 00dde594e5f4fbef569bf66947122478.bat │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d.bat │ ├── 177b45290f0e02fc4b6b717ee63e0993.bat │ ├── 2120d4819c0cbd0350097999399a818d.bat │ ├── 358066961ec043941983855238c65619.bat │ ├── 36f0ec6fe6399491ed166c2132493e0b.bat │ ├── 45c20358adc310212646795fc0986a3e.bat │ ├── 6560689483f8fd7793b67ce4f79803b9.bat │ ├── 8058d809b01005a65e3f3359b21de527.bat │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96.bat │ ├── da12fdc291fdc06b67455a640a865d93.bat │ ├── da7acffdbc450ed7a04e6ccf20fb5c82.bat │ └── ec1d0085488097c51c6e433520b2cc5b.bat ├── cmd.bat ├── filters.txt ├── logspider │ ├── .DS_Store │ ├── 0ddf68dcf63e0cc39aed76cd96d5773d │ │ ├── done.txt │ │ ├── urlall.txt │ │ └── urllog.txt │ ├── 36f0ec6fe6399491ed166c2132493e0b │ │ ├── done.txt │ │ ├── urlall.txt │ │ └── urllog.txt │ ├── 45c20358adc310212646795fc0986a3e │ │ ├── done.txt │ │ ├── urlall.txt │ │ └── urllog.txt │ ├── 6560689483f8fd7793b67ce4f79803b9 │ │ ├── done.txt │ │ ├── urlall.txt │ │ └── urllog.txt │ ├── 8058d809b01005a65e3f3359b21de527 │ │ ├── done.txt │ │ ├── urlall.txt │ │ └── urllog.txt │ ├── 9b20620a18e0ef7f542a1ef51ffa7b96 │ │ ├── done.txt │ │ ├── urlall.txt │ │ └── urllog.txt │ ├── da12fdc291fdc06b67455a640a865d93 │ │ ├── done.txt │ │ ├── urlall.txt │ │ └── urllog.txt │ ├── da7acffdbc450ed7a04e6ccf20fb5c82 │ │ ├── urlall.txt │ │ └── urllog.txt │ ├── ec1d0085488097c51c6e433520b2cc5b │ │ ├── done.txt │ │ ├── urlall.txt │ │ └── urllog.txt │ └── fcee4c56499a9d717304040dbf2e2590 │ │ ├── done.txt │ │ ├── urlall.txt │ │ └── urllog.txt ├── proxy │ ├── assess_logger.log │ ├── assess_quality.py │ ├── cmd.bat │ ├── config.py │ ├── config.pyc │ └── ip_pool.py ├── requirements.txt ├── taskscan.py └── taskspider.py ├── ajax.php ├── css ├── .DS_Store ├── bootstrap-combined.min.css ├── frame-all.css ├── ie.css ├── img │ ├── bg.png │ ├── glyphicons-halflings-white.png │ └── glyphicons-halflings.png ├── layoutit.css ├── securitysearch.css └── vendor.css ├── file.php ├── fileinfo.php ├── filespider.php ├── html ├── .DS_Store ├── cusinfo.html ├── customer.html ├── index.html ├── info.html ├── login.html ├── manager.html ├── point.html ├── pro.html ├── proxy.html ├── report.html ├── scan.html ├── search.html ├── set.html ├── siteinfo.html ├── spider.html ├── spiderinfo.html ├── spidersearch.html └── vul.html ├── images ├── ewm.png ├── logo.png ├── pic1.jpg ├── pic10.jpg ├── pic11.jpg ├── pic12.jpg ├── pic13.jpg ├── pic14.jpg ├── pic14_1.jpg ├── pic14_2.jpg ├── pic15.jpg ├── pic16.jpg ├── pic17.jpg ├── pic18.jpg ├── pic2.jpg ├── pic3.jpg ├── pic4.jpg ├── pic5.jpg ├── pic6.jpg ├── pic7.jpg ├── pic8.jpg ├── pic9.jpg ├── vul_cn.jpg └── zjwf.png ├── include ├── .DS_Store ├── IExcel.php ├── XmlExcel.php ├── common.fun.php ├── config.inc.php ├── doc.class.php ├── index.action.php ├── ip.conf ├── mysql.class.php ├── report.action.php ├── sqlsafe.php ├── vhost-demo.conf ├── xml.action.php └── xml.class.php ├── index.php ├── js ├── action.js ├── bootstrap.min.js ├── html5shiv.js ├── jquery-1.9.1.min.js ├── jquery-2.0.0.min.js ├── jquery-ui.js ├── jquery.htmlClean.js ├── jquery.ui.touch-punch.min.js ├── scripts.js └── shims.js ├── proxy-ip.php ├── proxy.php ├── readme.txt ├── report ├── 0ddf68dcf63e0cc39aed76cd96d5773d │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019031916004400.csv ├── 177b45290f0e02fc4b6b717ee63e0993 │ └── wvs_log_2019051516514600.csv ├── 358066961ec043941983855238c65619 │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019031915453000.csv ├── 36f0ec6fe6399491ed166c2132493e0b │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019051514483300.csv ├── 45c20358adc310212646795fc0986a3e │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019051514435700.csv ├── 6560689483f8fd7793b67ce4f79803b9 │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019031916005000.csv ├── 8058d809b01005a65e3f3359b21de527 │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019031915583600.csv ├── 9b20620a18e0ef7f542a1ef51ffa7b96 │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019031915404100.csv ├── da12fdc291fdc06b67455a640a865d93 │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019051514483300.csv ├── da7acffdbc450ed7a04e6ccf20fb5c82 │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019051515105300.csv ├── ec1d0085488097c51c6e433520b2cc5b │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2019051514381500.csv └── fcee4c56499a9d717304040dbf2e2590 │ ├── export.xml │ ├── scan-results.wvs │ └── wvs_log_2017093005184300.csv ├── taskinfo.php ├── taskscan.php ├── taskspider.php └── wdscanner.sql.zip /.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/.DS_Store -------------------------------------------------------------------------------- /TaskPython/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/.DS_Store -------------------------------------------------------------------------------- /TaskPython/TaskInfo/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/.DS_Store -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/BBScan.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/BBScan.pyc -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/lib/__init__.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/__init__.py -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/lib/__init__.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/__init__.pyc -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/lib/cmdline.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/cmdline.pyc -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/lib/common.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # 3 | # Common functions 4 | # 5 | 6 | import time 7 | import urlparse 8 | 9 | 10 | def get_time(): 11 | return time.strftime('%H:%M:%S', time.localtime()) 12 | 13 | 14 | def parse_url(url): 15 | _ = urlparse.urlparse(url, 'http') 16 | if not _.netloc: 17 | _ = urlparse.urlparse('http://' + url, 'http') 18 | return _.scheme, _.netloc, _.path if _.path else '/' 19 | 20 | 21 | def decode_response_text(txt, charset=None): 22 | if charset: 23 | try: 24 | return txt.decode(charset) 25 | except: 26 | pass 27 | 28 | for _ in ['UTF-8', 'GB2312', 'GBK', 'iso-8859-1', 'big5']: 29 | try: 30 | return txt.decode(_) 31 | except: 32 | pass 33 | 34 | try: 35 | return txt.decode('ascii', 'ignore') 36 | except: 37 | pass 38 | 39 | raise Exception('Fail to decode response Text') 40 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/lib/common.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/common.pyc -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/lib/report.py: -------------------------------------------------------------------------------- 1 | # -*- encoding: utf-8 -*- 2 | # report template 3 | 4 | 5 | # template for html 6 | html_general = """ 7 | 8 | 9 | BBScan Report 10 | 11 | 22 | 23 | 24 |

Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2

25 |

Current Scan finished in ${cost_min} min ${cost_seconds} seconds.

26 | ${content} 27 | 28 | 29 | """ 30 | 31 | html_host = """ 32 |

${host}

33 | 36 | """ 37 | 38 | html_list_item = """ 39 |
  • [${status}] [${title}] ${url}
  • 40 | """ 41 | 42 | html = { 43 | 'general': html_general, 44 | 'host': html_host, 45 | 'list_item': html_list_item, 46 | 'suffix': '.html' 47 | } 48 | 49 | 50 | # template for markdown 51 | markdown_general = """ 52 | # BBScan Report 53 | Please consider to contribute some rules to make BBScan more efficient. 54 | Version:v 1.2 55 | TimeUsage: ${cost_min} min ${cost_seconds} seconds 56 | ${content} 57 | """ 58 | 59 | markdown_host = """ 60 | ## ${host} 61 | ${list} 62 | """ 63 | 64 | markdown_list_item = """* ${status} ${title} ${url} 65 | """ 66 | 67 | markdown = { 68 | 'general': markdown_general, 69 | 'host': markdown_host, 70 | 'list_item': markdown_list_item, 71 | 'suffix': '.md' 72 | } 73 | 74 | 75 | # summary 76 | template = { 77 | 'html': html, 78 | 'markdown': markdown 79 | } 80 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/lib/report.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/lib/report.pyc -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/report/hosts_20190319_163935.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | BBScan Report 5 | 6 | 17 | 18 | 19 |

    Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2

    20 |

    Current Scan finished in 3 min 3.81 seconds.

    21 | 22 |

    www.lvquan.cn

    23 | 30 | 31 | 32 | 33 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/report/hosts_20190515_144510.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | BBScan Report 5 | 6 | 17 | 18 | 19 |

    Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2

    20 |

    Current Scan finished in 3 min 12.47 seconds.

    21 | 22 |

    testhtml5.vulnweb.com

    23 | 28 | 29 | 30 | 31 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/report/hosts_20190515_144514.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | BBScan Report 5 | 6 | 17 | 18 | 19 |

    Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2

    20 |

    Current Scan finished in 3 min 8.90 seconds.

    21 | 22 |

    testphp.vulnweb.com

    23 | 30 | 31 | 32 | 33 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/report/hosts_20190515_162552.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | BBScan Report 5 | 6 | 17 | 18 | 19 |

    Please consider to contribute some rules to make BBScan more efficient. BBScan v 1.2

    20 |

    Current Scan finished in 20 min 3.20 seconds.

    21 | 22 |

    testphp.vulnweb.com

    23 | 34 | 35 | 36 | 37 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/requirements.txt: -------------------------------------------------------------------------------- 1 | BeautifulSoup4>=4.3.2 2 | py2-ipaddress>=3.4.1 3 | dnspython>=1.15.0 4 | gevent>=1.2.1 -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/rules/black.list: -------------------------------------------------------------------------------- 1 | # text to exclude in html doc 2 | # regex can be used 3 | # 匹配的条目将被丢弃 4 | 5 | 6 | {text="/404/search_children.js"} 7 | 8 | {text="qzone.qq.com/gy/404/data.js"} 9 | 10 | {text="访问的页面不存在"} 11 | 12 | {text="404 Not Found"} 13 | 14 | {text="

    The server encountered an internal error or"} 15 | 16 | {text="http://www.qq.com/babygohome/?pgv_ref=404"} 17 | 18 | {text="

    410 Gone

    "} 19 | 20 | {regex_text="controller.*not found"} 21 | 22 | {text="404 Page Not Found"} 23 | 24 | {text="You do not have permission to get URL"} 25 | 26 | {text="403 Forbidden"} 27 | 28 | {text="

    Whoops, looks like something went wrong.

    "} 29 | 30 | {text="invalid service url:"} 31 | 32 | {text="You don't have permission to access this page"} 33 | 34 | {text="当前页面不存在或已删除"} 35 | 36 | {text="No direct script access allowed"} 37 | 38 | {text="args not correct"} 39 | 40 | {text="Controller Not Found"} 41 | 42 | {text="url error"} 43 | 44 | {text="Bad Request"} 45 | 46 | {text="http://appmedia.qq.com/media/flcdn/404.png"} 47 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/rules/directory_traversal.txt: -------------------------------------------------------------------------------- 1 | # Directory traversal 2 | 3 | /../../../../../../../../../../../../../etc/passwd {tag="root:x:"} 4 | /../../../../../../../../../../../../../etc/hosts {tag="127.0.0.1"} 5 | /../../../../../../../../../../../../../etc/sysconfig/network-scripts/ifcfg-eth1 {tag="GATEWAY="} 6 | /%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/hosts {tag="127.0.0.1"} 7 | /..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd {tag="root:x:"} 8 | /..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252Fetc%252Fpasswd {tag="root:x:"} 9 | /%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd {tag="root:x:"} 10 | //././././././././././././././././././././././././../../../../../../../../etc/passwd {tag="root:x:"} 11 | /etc/passwd {tag="root:x:"} 12 | /file:///etc/passwd {tag="root:x:"} 13 | /etc/hosts {tag="127.0.0.1"} 14 | /aa/../../cc/../../bb/../../dd/../../aa/../../cc/../../bb/../../dd/../../bb/../../dd/../../bb/../../dd/../../bb/../../dd/../../ee/../../etc/hosts {status=200} {tag="127.0.0.1"} 15 | 16 | /proc/meminfo {tag="MemTotal"} {status=200} 17 | /etc/profile {tag="/etc/profile.d/*.sh"} {status=200} 18 | 19 | /resource/tutorial/jndi-appconfig/test?inputFile=/etc/passwd {tag="root:x:"} -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/rules/disabled/.gitignore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/rules/disabled/.gitignore -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/rules/java_web.txt: -------------------------------------------------------------------------------- 1 | # Java web 2 | 3 | /WEB-INF/web.xml {tag="APC INFO"} 16 | /test.sh {status=206} 17 | /logs.sh {status=206} 18 | 19 | 20 | /test/ {status=200} 21 | /test.php {status=200} {type="html"} 22 | /temp.php {status=200} {type="html"} 23 | /tmp.php {status=200} {type="html"} 24 | /test2.php {status=200} {type="html"} 25 | /test2.php {status=200} {type="html"} 26 | /test.html {status=200} {type="html"} 27 | /test2.html {status=200} {type="html"} 28 | /test.txt {status=200} {type="text/plain"} 29 | /test2.txt {status=200} {type="text/plain"} 30 | /debug.php {status=200} {type="html"} 31 | /a.php {status=200} {type="html"} 32 | /b.php {status=200} {type="html"} 33 | /t.php {status=200} {type="html"} 34 | /i.php {status=200} {type="html"} 35 | /x.php {status=200} {type="html"} 36 | /1.php {status=200} {type="html"} 37 | /123.php {status=200} {type="html"} 38 | 39 | 40 | # Test CGI {tag="SERVER_NAME"} 41 | /test.cgi {status=200} {type="html"} 42 | /test-cgi {status=200} {type="html"} 43 | /cgi-bin/test-cgi {status=200} {type="html"} 44 | /cgi-bin/test {status=200} {type="html"} 45 | /cgi-bin/test.cgi {status=200} {type="html"} 46 | 47 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/rules/request/.gitignore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/BBScan/rules/request/.gitignore -------------------------------------------------------------------------------- /TaskPython/TaskInfo/BBScan/rules/white.list: -------------------------------------------------------------------------------- 1 | # text to search in doc 2 | # regex can be used 3 | 4 | # 匹配的条目将被立即标记命中 5 | 6 | 7 | {text="Index of"} 8 | 9 | {text="<title>phpMyAdmin"} 10 | 11 | {text="allow_url_fopen"} 12 | 13 | {text="MemAdmin"} 14 | 15 | {text="This is the default start page for the Resin server"} 16 | 17 | # {text="Apache Tomcat"} 18 | 19 | {text="request_uri"} 20 | 21 | {text="Login to Cacti"} 22 | 23 | {text="Zabbix"} 24 | 25 | {text="Dashboard [Jenkins]"} 26 | 27 | {text="Graphite Browser"} 28 | 29 | # {regex_text=" -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/.DS_Store -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-bbscan.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-bbscan.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-bugscancms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-bugscancms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-domain.txt: -------------------------------------------------------------------------------- 1 | [ 2 | "www.tyanhome.com.cn" 3 | ] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Tue Mar 19 16:01:34 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\0ddf68dcf63e0cc39aed76cd96d5773d\0ddf68dcf63e0cc39aed76cd96d5773d-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 --top-port 200 www.tyanhome.com.cn 2 | Nmap scan report for www.tyanhome.com.cn (114.215.147.51) 3 | Host is up (0.0088s latency). 4 | Not shown: 198 filtered ports 5 | PORT STATE SERVICE VERSION 6 | 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) 7 | |_banner: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.2 8 | 80/tcp open tcpwrapped 9 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port 10 | Device type: firewall 11 | Running (JUST GUESSING): Fortinet embedded (98%) 12 | OS CPE: cpe:/h:fortinet:fortigate_200b 13 | Aggressive OS guesses: Fortinet FortiGate 200B firewall (98%) 14 | No exact OS matches for host (test conditions non-ideal). 15 | Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel 16 | 17 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . 18 | # Nmap done at Tue Mar 19 16:01:51 2019 -- 1 IP address (1 host up) scanned in 17.38 seconds 19 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-subdomain.txt: -------------------------------------------------------------------------------- 1 | en.tyanhome.com.cn 2 | www.tyanhome.com.cn 3 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-waf.txt: -------------------------------------------------------------------------------- 1 | 2 | ^ ^ 3 | _ __ _ ____ _ __ _ _ ____ 4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/ 5 | | V V // o // _/ | V V // 0 // 0 // _/ 6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ 7 | < 8 | ...' 9 | 10 | WAFW00F - Web Application Firewall Detection Tool 11 | 12 | By Sandro Gauci && Wendel G. Henrique 13 | 14 | Checking http://www.tyanhome.com.cn/ 15 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-whatcms.txt: -------------------------------------------------------------------------------- 1 | southidc -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-whatweb.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-whatweb.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-wyspider.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d-wyspider.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/0ddf68dcf63e0cc39aed76cd96d5773d/0ddf68dcf63e0cc39aed76cd96d5773d.txt: -------------------------------------------------------------------------------- 1 | {"whatcms_text": "southidc", "weakfile_num": 0, "ip": "114.215.147.51", "waf": "UnDetect", "domain_info": "www.tyanhome.com.cn
    en.tyanhome.com.cn
    ", "weakfile": "", "port_info": "22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)\n
    80/tcp open tcpwrapped\n
    ", "whatweb_text": "", "os_info": "Running OS:
    Fortinet embedded (98%
    Fortinet FortiGate 200B firewall

    OS Details:
    Fortinet FortiGate 200B firewall (98%)\n", "httpserver": "", "title": "", "xpb": "", "port_num": 2, "domain_num": 2, "os": " Fortinet FortiGate 200B firewall "} -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-bbscan.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-bbscan.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-bugscancms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-bugscancms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-domain.txt: -------------------------------------------------------------------------------- 1 | [ 2 | "www.jxzls.com" 3 | ] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Wed May 15 16:57:33 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\177b45290f0e02fc4b6b717ee63e0993\177b45290f0e02fc4b6b717ee63e0993-nmap.txt -sT -sV -O --script=banner --open --top-port 200 www.jxzls.com 2 | Nmap scan report for www.jxzls.com (125.211.216.229) 3 | Host is up (0.015s latency). 4 | Not shown: 199 filtered ports 5 | Some closed ports may be reported as filtered due to --defeat-rst-ratelimit 6 | PORT STATE SERVICE VERSION 7 | 21/tcp open tcpwrapped 8 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port 9 | Device type: specialized|WAP|phone 10 | Running: iPXE 1.X, Linux 2.4.X|2.6.X, Sony Ericsson embedded 11 | OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:sonyericsson:u8i_vivaz 12 | OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone 13 | 14 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . 15 | # Nmap done at Wed May 15 16:58:21 2019 -- 1 IP address (1 host up) scanned in 48.06 seconds 16 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-subdomain.txt: -------------------------------------------------------------------------------- 1 | www.jxzls.com 2 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-waf.txt: -------------------------------------------------------------------------------- 1 | 2 | ^ ^ 3 | _ __ _ ____ _ __ _ _ ____ 4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/ 5 | | V V // o // _/ | V V // 0 // 0 // _/ 6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ 7 | < 8 | ...' 9 | 10 | WAFW00F - Web Application Firewall Detection Tool 11 | 12 | By Sandro Gauci && Wendel G. Henrique 13 | 14 | Checking http://www.jxzls.com/ 15 | Generic Detection results: 16 | The site http://www.jxzls.com/ seems to be behind a WAF or some sort of security solution 17 | Reason: Blocking is being done at connection/packet level. 18 | Number of requests: 10 19 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-whatcms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-whatcms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-whatweb.txt: -------------------------------------------------------------------------------- 1 | http://www.jxzls.com/ [200 OK] ActiveX[D27CDB6E-AE6D-11cf-96B8-444553540000], Adobe-Flash, Cookies[ASPSESSIONIDSADRBSSR], Country[CHINA][CN], Email[chiqun1973@163.com,jixigsgs@163.com], HTTPServer[Microsoft-IIS/7.5], IP[125.211.216.229], Microsoft-IIS[7.5], Object[http://fpdownload.macromedia.com/pub/shockwave/cabs/hotdeploy/flash/swflash.cab#version=6,0,0,0][clsid:D27CDB6E-AE6D-11cf-96B8-444553540000], Script[javascript,text/javascript,text/javascript>], Title[-鸡西市供水公司], X-Powered-By[ASP.NET] 2 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-wyspider.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/177b45290f0e02fc4b6b717ee63e0993/177b45290f0e02fc4b6b717ee63e0993-wyspider.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-bbscan.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-bbscan.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-bugscancms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-bugscancms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-domain.txt: -------------------------------------------------------------------------------- 1 | [ 2 | "rank.chinaz.com", 3 | "down.chinaz.com", 4 | "whois.chinaz.com", 5 | "ping.chinaz.com", 6 | "d.chinaz.com", 7 | "upload.chinaz.com", 8 | "aq.chinaz.com", 9 | "my.chinaz.com", 10 | "mtop.chinaz.com", 11 | "tool.chinaz.com", 12 | "chinaz.com", 13 | "live.chinaz.com", 14 | "link.chinaz.com", 15 | "font.chinaz.com", 16 | "index.chinaz.com", 17 | "seo.chinaz.com", 18 | "wapseo.chinaz.com", 19 | "outlink.chinaz.com", 20 | "m.chinaz.com", 21 | "alexa.chinaz.com", 22 | "top.chinaz.com", 23 | "icp.chinaz.com", 24 | "bbs.chinaz.com", 25 | "ciku.chinaz.com", 26 | "sc.chinaz.com", 27 | "pr.chinaz.com", 28 | "ip.chinaz.com" 29 | ] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Wed May 15 16:38:04 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\36f0ec6fe6399491ed166c2132493e0b\36f0ec6fe6399491ed166c2132493e0b-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 --top-port 200 testaspnet.vulnweb.com 2 | Nmap scan report for testaspnet.vulnweb.com (5.175.17.140) 3 | Host is up (0.00s latency). 4 | rDNS record for 5.175.17.140: vs231689.vs.hosteurope.de 5 | All 200 scanned ports on testaspnet.vulnweb.com (5.175.17.140) are filtered 6 | Too many fingerprints match this host to give specific OS details 7 | 8 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . 9 | # Nmap done at Wed May 15 16:38:20 2019 -- 1 IP address (1 host up) scanned in 16.12 seconds 10 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-subdomain.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-subdomain.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-waf.txt: -------------------------------------------------------------------------------- 1 | 2 | ^ ^ 3 | _ __ _ ____ _ __ _ _ ____ 4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/ 5 | | V V // o // _/ | V V // 0 // 0 // _/ 6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ 7 | < 8 | ...' 9 | 10 | WAFW00F - Web Application Firewall Detection Tool 11 | 12 | By Sandro Gauci && Wendel G. Henrique 13 | 14 | Checking http://testaspnet.vulnweb.com/ 15 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-whatcms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-whatcms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-whatweb.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-whatweb.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-wyspider.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b-wyspider.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/36f0ec6fe6399491ed166c2132493e0b/36f0ec6fe6399491ed166c2132493e0b.txt: -------------------------------------------------------------------------------- 1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "5.175.17.140", "waf": "UnDetect", "domain_info": "wapseo.chinaz.com
    pr.chinaz.com
    sc.chinaz.com
    ip.chinaz.com
    ciku.chinaz.com
    alexa.chinaz.com
    icp.chinaz.com
    top.chinaz.com
    bbs.chinaz.com
    m.chinaz.com
    outlink.chinaz.com
    seo.chinaz.com
    index.chinaz.com
    font.chinaz.com
    link.chinaz.com
    live.chinaz.com
    chinaz.com
    tool.chinaz.com
    mtop.chinaz.com
    my.chinaz.com
    aq.chinaz.com
    upload.chinaz.com
    d.chinaz.com
    ping.chinaz.com
    whois.chinaz.com
    down.chinaz.com
    rank.chinaz.com
    ", "weakfile": "", "port_info": "", "whatweb_text": "", "os_info": "Running OS:", "httpserver": "", "title": "", "xpb": "", "port_num": 0, "domain_num": 27, "os": ""} -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-bbscan.txt: -------------------------------------------------------------------------------- 1 | http://www.lvquan.cn/views/default/images/shell.php 2 | http://www.lvquan.cn/views/default/images/1.php 3 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-bugscancms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-bugscancms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-domain.txt: -------------------------------------------------------------------------------- 1 | [ 2 | "www.lvquan.cn" 3 | ] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Tue Mar 19 16:07:43 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\6560689483f8fd7793b67ce4f79803b9\6560689483f8fd7793b67ce4f79803b9-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 --top-port 200 www.lvquan.cn 2 | Nmap scan report for www.lvquan.cn (218.5.76.86) 3 | Host is up (0.00s latency). 4 | All 200 scanned ports on www.lvquan.cn (218.5.76.86) are filtered 5 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port 6 | Device type: firewall 7 | Running: Fortinet embedded 8 | OS CPE: cpe:/h:fortinet:fortigate_200b 9 | OS details: Fortinet FortiGate 200B firewall 10 | 11 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . 12 | # Nmap done at Tue Mar 19 16:07:56 2019 -- 1 IP address (1 host up) scanned in 13.47 seconds 13 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-subdomain.txt: -------------------------------------------------------------------------------- 1 | www.lvquan.cn 2 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-waf.txt: -------------------------------------------------------------------------------- 1 | 2 | ^ ^ 3 | _ __ _ ____ _ __ _ _ ____ 4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/ 5 | | V V // o // _/ | V V // 0 // 0 // _/ 6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ 7 | < 8 | ...' 9 | 10 | WAFW00F - Web Application Firewall Detection Tool 11 | 12 | By Sandro Gauci && Wendel G. Henrique 13 | 14 | Checking http://www.lvquan.cn/ 15 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-whatcms.txt: -------------------------------------------------------------------------------- 1 | southidc -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-whatweb.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-whatweb.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9-wyspider.txt: -------------------------------------------------------------------------------- 1 | http://www.lvquan.cn/index.php.bak 2 | http://www.lvquan.cn/index.php.BAK 3 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/6560689483f8fd7793b67ce4f79803b9/6560689483f8fd7793b67ce4f79803b9.txt: -------------------------------------------------------------------------------- 1 | {"whatcms_text": "southidc", "weakfile_num": 2, "ip": "218.5.76.86", "waf": "UnDetect", "domain_info": "www.lvquan.cn
    ", "weakfile": "http://www.lvquan.cn/index.php.BAK\n
    http://www.lvquan.cn/index.php.bak\n
    ", "port_info": "", "whatweb_text": "", "os_info": "Running OS:
    Fortinet embedde

    OS Details:
    Fortinet FortiGate 200B firewall\n", "httpserver": "", "title": "", "xpb": "", "port_num": 0, "domain_num": 1, "os": " Fortinet embedde"} -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-bbscan.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-bbscan.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-bugscancms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-bugscancms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-domain.txt: -------------------------------------------------------------------------------- 1 | [] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Tue Mar 19 15:59:33 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\8058d809b01005a65e3f3359b21de527\8058d809b01005a65e3f3359b21de527-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 --top-port 200 www.chngec.com.cn 2 | Nmap scan report for www.chngec.com.cn (123.233.120.98) 3 | Host is up (0.010s latency). 4 | Not shown: 199 filtered ports 5 | PORT STATE SERVICE VERSION 6 | 80/tcp open http nginx 1.8.0 7 | |_http-server-header: nginx/1.8.0 8 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port 9 | Device type: firewall 10 | Running (JUST GUESSING): Fortinet embedded (98%) 11 | OS CPE: cpe:/h:fortinet:fortigate_200b 12 | Aggressive OS guesses: Fortinet FortiGate 200B firewall (98%) 13 | No exact OS matches for host (test conditions non-ideal). 14 | 15 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . 16 | # Nmap done at Tue Mar 19 16:00:06 2019 -- 1 IP address (1 host up) scanned in 33.16 seconds 17 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-subdomain.txt: -------------------------------------------------------------------------------- 1 | test.chngec.com.cn 2 | www2.chngec.com.cn 3 | www1.chngec.com.cn 4 | work.chngec.com.cn 5 | yx.chngec.com.cn 6 | www.chngec.com.cn 7 | zfb.chngec.com.cn 8 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-waf.txt: -------------------------------------------------------------------------------- 1 | 2 | ^ ^ 3 | _ __ _ ____ _ __ _ _ ____ 4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/ 5 | | V V // o // _/ | V V // 0 // 0 // _/ 6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ 7 | < 8 | ...' 9 | 10 | WAFW00F - Web Application Firewall Detection Tool 11 | 12 | By Sandro Gauci && Wendel G. Henrique 13 | 14 | Checking http://www.chngec.com.cn/ 15 | Generic Detection results: 16 | The site http://www.chngec.com.cn/ seems to be behind a WAF or some sort of security solution 17 | Reason: The server returned a different response code when a string trigged the blacklist. 18 | Normal response code is "404", while the response code to an attack is "502" 19 | Number of requests: 11 20 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-whatcms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-whatcms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-whatweb.txt: -------------------------------------------------------------------------------- 1 | http://www.chngec.com.cn/ [200 OK] Cookies[JSESSIONID], Country[CHINA][CN], HTTPServer[nginx/1.8.0], IP[123.233.120.98], JQuery[1.12.3], Java, PasswordField, Script[text/javascript], Title[华能热力用户服务平台], X-UA-Compatible[IE=9,IE=edge], nginx[1.8.0] 2 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-wyspider.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527-wyspider.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/8058d809b01005a65e3f3359b21de527/8058d809b01005a65e3f3359b21de527.txt: -------------------------------------------------------------------------------- 1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "123.233.120.98", "waf": "Unknown", "domain_info": "zfb.chngec.com.cn
    work.chngec.com.cn
    yx.chngec.com.cn
    test.chngec.com.cn
    www1.chngec.com.cn
    www2.chngec.com.cn
    www.chngec.com.cn

    ", "weakfile": "", "port_info": "80/tcp open http nginx 1.8.0\n
    ", "whatweb_text": "http://www.chngec.com.cn/ [200 OK] Cookies[JSESSIONID], Country[CHINA][CN], HTTPServer[nginx/1.8.0], IP[123.233.120.98], JQuery[1.12.3], Java, PasswordField, Script[text/javascript], Title[华能热力用户服务平台], X-UA-Compatible[IE=9,IE=edge], nginx[1.8.0]\n", "os_info": "Running OS:
    Fortinet embedded (98%
    Fortinet FortiGate 200B firewall

    OS Details:
    Fortinet FortiGate 200B firewall (98%)\n", "httpserver": "nginx/1.8.0", "title": "华能热力用户服务平台", "xpb": "", "port_num": 1, "domain_num": 8, "os": " Fortinet FortiGate 200B firewall "} -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-bbscan.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-bbscan.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-bugscancms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-bugscancms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-domain.txt: -------------------------------------------------------------------------------- 1 | [] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Tue Mar 19 15:47:21 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\9b20620a18e0ef7f542a1ef51ffa7b96\9b20620a18e0ef7f542a1ef51ffa7b96-nmap.txt -sT -sV -O --script=banner --min-hostgroup 1024 --min-parallelism 1024 -p T:1-65535 www.kongziyjy.org 2 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-subdomain.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-subdomain.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-waf.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-waf.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-whatcms.txt: -------------------------------------------------------------------------------- 1 | southidc -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-whatweb.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-whatweb.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-wyspider.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/9b20620a18e0ef7f542a1ef51ffa7b96/9b20620a18e0ef7f542a1ef51ffa7b96-wyspider.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-bbscan.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-bbscan.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-bugscancms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-bugscancms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-domain.txt: -------------------------------------------------------------------------------- 1 | [ 2 | "rank.chinaz.com", 3 | "down.chinaz.com", 4 | "whois.chinaz.com", 5 | "ping.chinaz.com", 6 | "d.chinaz.com", 7 | "upload.chinaz.com", 8 | "aq.chinaz.com", 9 | "my.chinaz.com", 10 | "mtop.chinaz.com", 11 | "tool.chinaz.com", 12 | "chinaz.com", 13 | "live.chinaz.com", 14 | "link.chinaz.com", 15 | "font.chinaz.com", 16 | "index.chinaz.com", 17 | "seo.chinaz.com", 18 | "wapseo.chinaz.com", 19 | "outlink.chinaz.com", 20 | "m.chinaz.com", 21 | "alexa.chinaz.com", 22 | "top.chinaz.com", 23 | "icp.chinaz.com", 24 | "bbs.chinaz.com", 25 | "ciku.chinaz.com", 26 | "sc.chinaz.com", 27 | "pr.chinaz.com", 28 | "ip.chinaz.com" 29 | ] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Wed May 15 19:09:11 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\da12fdc291fdc06b67455a640a865d93\da12fdc291fdc06b67455a640a865d93-nmap.txt -sT -sV -O --script=banner --top-port 200 testasp.vulnweb.com 2 | Nmap scan report for testasp.vulnweb.com (5.175.17.140) 3 | Host is up (0.00s latency). 4 | rDNS record for 5.175.17.140: vs231689.vs.hosteurope.de 5 | All 200 scanned ports on testasp.vulnweb.com (5.175.17.140) are filtered 6 | Too many fingerprints match this host to give specific OS details 7 | 8 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . 9 | # Nmap done at Wed May 15 19:09:24 2019 -- 1 IP address (1 host up) scanned in 13.92 seconds 10 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-subdomain.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-subdomain.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-waf.txt: -------------------------------------------------------------------------------- 1 | 2 | ^ ^ 3 | _ __ _ ____ _ __ _ _ ____ 4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/ 5 | | V V // o // _/ | V V // 0 // 0 // _/ 6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ 7 | < 8 | ...' 9 | 10 | WAFW00F - Web Application Firewall Detection Tool 11 | 12 | By Sandro Gauci && Wendel G. Henrique 13 | 14 | Checking http://testasp.vulnweb.com/ 15 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-whatcms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-whatcms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-whatweb.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-whatweb.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-wyspider.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93-wyspider.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da12fdc291fdc06b67455a640a865d93/da12fdc291fdc06b67455a640a865d93.txt: -------------------------------------------------------------------------------- 1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "5.175.17.140", "waf": "UnDetect", "domain_info": "wapseo.chinaz.com
    pr.chinaz.com
    sc.chinaz.com
    ip.chinaz.com
    ciku.chinaz.com
    alexa.chinaz.com
    icp.chinaz.com
    top.chinaz.com
    bbs.chinaz.com
    m.chinaz.com
    outlink.chinaz.com
    seo.chinaz.com
    index.chinaz.com
    font.chinaz.com
    link.chinaz.com
    live.chinaz.com
    chinaz.com
    tool.chinaz.com
    mtop.chinaz.com
    my.chinaz.com
    aq.chinaz.com
    upload.chinaz.com
    d.chinaz.com
    ping.chinaz.com
    whois.chinaz.com
    down.chinaz.com
    rank.chinaz.com
    ", "weakfile": "", "port_info": "", "whatweb_text": "", "os_info": "Running OS:", "httpserver": "", "title": "", "xpb": "", "port_num": 0, "domain_num": 27, "os": ""} -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-bbscan.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-bbscan.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-bugscancms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-bugscancms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-domain.txt: -------------------------------------------------------------------------------- 1 | [ 2 | "webscantest.com" 3 | ] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Wed May 15 18:55:11 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\da7acffdbc450ed7a04e6ccf20fb5c82\da7acffdbc450ed7a04e6ccf20fb5c82-nmap.txt -sT -sV -O --script=banner --top-port 200 www.webscantest.com 2 | Failed to resolve "www.webscantest.com". 3 | WARNING: No targets were specified, so 0 hosts scanned. 4 | # Nmap done at Wed May 15 18:55:24 2019 -- 0 IP addresses (0 hosts up) scanned in 13.49 seconds 5 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-subdomain.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-subdomain.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-waf.txt: -------------------------------------------------------------------------------- 1 | 2 | ^ ^ 3 | _ __ _ ____ _ __ _ _ ____ 4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/ 5 | | V V // o // _/ | V V // 0 // 0 // _/ 6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ 7 | < 8 | ...' 9 | 10 | WAFW00F - Web Application Firewall Detection Tool 11 | 12 | By Sandro Gauci && Wendel G. Henrique 13 | 14 | Checking http://www.webscantest.com/ 15 | Generic Detection results: 16 | No WAF detected by the generic detection 17 | Number of requests: 14 18 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-whatcms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-whatcms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-whatweb.txt: -------------------------------------------------------------------------------- 1 | http://www.webscantest.com/ [200 OK] Apache[2.4.7], Cookies[NB_SRVID,TEST_SESSIONID], Country[UNITED STATES][US], HTTPServer[Ubuntu Linux][Apache/2.4.7 (Ubuntu)], IP[69.164.223.208], PHP[5.5.9-1ubuntu4.29], Script[javascript], Title[Test Site], X-Powered-By[PHP/5.5.9-1ubuntu4.29] 2 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-wyspider.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82-wyspider.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/da7acffdbc450ed7a04e6ccf20fb5c82/da7acffdbc450ed7a04e6ccf20fb5c82.txt: -------------------------------------------------------------------------------- 1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "", "waf": "UnDetect", "domain_info": "
    ", "weakfile": "", "port_info": "", "whatweb_text": "", "os_info": "Running OS:", "httpserver": "", "title": "", "xpb": "", "port_num": 0, "domain_num": 1, "os": ""} -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-bbscan.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-bbscan.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-bugscancms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-bugscancms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-domain.txt: -------------------------------------------------------------------------------- 1 | [ 2 | "rank.chinaz.com", 3 | "down.chinaz.com", 4 | "whois.chinaz.com", 5 | "ping.chinaz.com", 6 | "d.chinaz.com", 7 | "upload.chinaz.com", 8 | "aq.chinaz.com", 9 | "my.chinaz.com", 10 | "mtop.chinaz.com", 11 | "tool.chinaz.com", 12 | "chinaz.com", 13 | "live.chinaz.com", 14 | "link.chinaz.com", 15 | "font.chinaz.com", 16 | "index.chinaz.com", 17 | "seo.chinaz.com", 18 | "wapseo.chinaz.com", 19 | "outlink.chinaz.com", 20 | "m.chinaz.com", 21 | "alexa.chinaz.com", 22 | "top.chinaz.com", 23 | "icp.chinaz.com", 24 | "bbs.chinaz.com", 25 | "ciku.chinaz.com", 26 | "sc.chinaz.com", 27 | "pr.chinaz.com", 28 | "ip.chinaz.com" 29 | ] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Wed May 15 18:09:50 2019 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\ec1d0085488097c51c6e433520b2cc5b\ec1d0085488097c51c6e433520b2cc5b-nmap.txt -sT -sV -O --script=banner --top-port 200 testhtml5.vulnweb.com 2 | Nmap scan report for testhtml5.vulnweb.com (176.28.50.165) 3 | Host is up (0.024s latency). 4 | rDNS record for 176.28.50.165: rs202995.rs.hosteurope.de 5 | All 200 scanned ports on testhtml5.vulnweb.com (176.28.50.165) are filtered 6 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port 7 | Device type: WAP|general purpose 8 | Running: Actiontec embedded, Linux 2.4.X|3.X 9 | OS CPE: cpe:/h:actiontec:mi424wr-gen3i cpe:/o:linux:linux_kernel cpe:/o:linux:linux_kernel:2.4.37 cpe:/o:linux:linux_kernel:3.2 cpe:/o:linux:linux_kernel:4.4 10 | OS details: Actiontec MI424WR-GEN3I WAP, DD-WRT v24-sp2 (Linux 2.4.37), Linux 3.2, Linux 4.4 11 | 12 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . 13 | # Nmap done at Wed May 15 18:10:03 2019 -- 1 IP address (1 host up) scanned in 12.82 seconds 14 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-subdomain.txt: -------------------------------------------------------------------------------- 1 | dev.testhtml5.vulnweb.com 2 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-waf.txt: -------------------------------------------------------------------------------- 1 | 2 | ^ ^ 3 | _ __ _ ____ _ __ _ _ ____ 4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/ 5 | | V V // o // _/ | V V // 0 // 0 // _/ 6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ 7 | < 8 | ...' 9 | 10 | WAFW00F - Web Application Firewall Detection Tool 11 | 12 | By Sandro Gauci && Wendel G. Henrique 13 | 14 | Checking http://testhtml5.vulnweb.com 15 | Generic Detection results: 16 | No WAF detected by the generic detection 17 | Number of requests: 14 18 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-whatcms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-whatcms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-whatweb.txt: -------------------------------------------------------------------------------- 1 | http://testhtml5.vulnweb.com [200 OK] Country[GERMANY][DE], HTML5, HTTPServer[nginx/1.4.1], IP[176.28.50.165], JQuery[1.9.1], PasswordField[password], Script, Title[SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner], UncommonHeaders[access-control-allow-origin], nginx[1.4.1] 2 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-wyspider.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b-wyspider.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/ec1d0085488097c51c6e433520b2cc5b/ec1d0085488097c51c6e433520b2cc5b.txt: -------------------------------------------------------------------------------- 1 | {"whatcms_text": "", "weakfile_num": 0, "ip": "176.28.50.165", "waf": "NoWaf", "domain_info": "wapseo.chinaz.com
    pr.chinaz.com
    sc.chinaz.com
    ip.chinaz.com
    ciku.chinaz.com
    alexa.chinaz.com
    icp.chinaz.com
    top.chinaz.com
    bbs.chinaz.com
    m.chinaz.com
    outlink.chinaz.com
    dev.testhtml5.vulnweb.com
    seo.chinaz.com
    index.chinaz.com
    font.chinaz.com
    link.chinaz.com
    live.chinaz.com
    chinaz.com
    tool.chinaz.com
    mtop.chinaz.com
    my.chinaz.com
    aq.chinaz.com
    upload.chinaz.com
    d.chinaz.com
    ping.chinaz.com
    whois.chinaz.com
    down.chinaz.com
    rank.chinaz.com
    ", "weakfile": "", "port_info": "", "whatweb_text": "http://testhtml5.vulnweb.com [200 OK] Country[GERMANY][DE], HTML5, HTTPServer[nginx/1.4.1], IP[176.28.50.165], JQuery[1.9.1], PasswordField[password], Script, Title[SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner], UncommonHeaders[access-control-allow-origin], nginx[1.4.1]\n", "os_info": "Running OS:
    Actiontec embedded
    Linux 2.4.X|3.

    OS Details:
    Actiontec MI424WR-GEN3I WAP
    DD-WRT v24-sp2 (Linux 2.4.37)
    Linux 3.2
    Linux 4.4\n", "httpserver": "nginx/1.4.1", "title": "SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner", "xpb": "", "port_num": 0, "domain_num": 28, "os": " Actiontec embedded"} -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-bbscan.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-bbscan.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-bugscancms.txt: -------------------------------------------------------------------------------- 1 | Unknown -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-domain.txt: -------------------------------------------------------------------------------- 1 | [ 2 | "www.zt10jwz.com", 3 | "zt10jwz.com", 4 | "chaozhinenzuqiuwangluoyouxi.q33.zt10jwz.com" 5 | ] -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-nmap.txt: -------------------------------------------------------------------------------- 1 | # Nmap 7.60 scan initiated Sun Sep 17 16:05:06 2017 as: nmap.exe -oN C:\WDScanner\WWW\TaskPython\TaskInfo\loginfo\f71bcce3867466d807bac5200e63b33d\f71bcce3867466d807bac5200e63b33d-nmap.txt -sT -P0 -sV -O --script=banner -p T:21-25,80-89,110,143,443,513,873,1080,1433,1521,1158,3306-3308,3389,3690,5900,6379,7001,8000-8090,9000,9418,27017-27019,50060,111,11211,2049 www.zt10jwz.com 2 | Nmap scan report for www.zt10jwz.com (124.128.159.112) 3 | Host is up (0.0053s latency). 4 | Not shown: 131 filtered ports 5 | PORT STATE SERVICE VERSION 6 | 80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) 7 | | http-server-header: 8 | | Microsoft-HTTPAPI/2.0 9 | |_ Microsoft-IIS/7.0 10 | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port 11 | Device type: firewall 12 | Running: Fortinet embedded 13 | OS CPE: cpe:/h:fortinet:fortigate_200b 14 | OS details: Fortinet FortiGate 200B firewall 15 | Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows 16 | 17 | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . 18 | # Nmap done at Sun Sep 17 16:05:36 2017 -- 1 IP address (1 host up) scanned in 30.78 seconds 19 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-subdomain.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-subdomain.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-waf.txt: -------------------------------------------------------------------------------- 1 | 2 | ^ ^ 3 | _ __ _ ____ _ __ _ _ ____ 4 | ///7/ /.' \ / __////7/ /,' \ ,' \ / __/ 5 | | V V // o // _/ | V V // 0 // 0 // _/ 6 | |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ 7 | < 8 | ...' 9 | 10 | WAFW00F - Web Application Firewall Detection Tool 11 | 12 | By Sandro Gauci && Wendel G. Henrique 13 | 14 | Checking http://www.zt10jwz.com 15 | Generic Detection results: 16 | No WAF detected by the generic detection 17 | Number of requests: 13 18 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-whatcms.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-whatcms.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-whatweb.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-whatweb.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-wyspider.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/loginfo/f71bcce3867466d807bac5200e63b33d/f71bcce3867466d807bac5200e63b33d-wyspider.txt -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/subDomainsBrute-master/.DS_Store -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/.gitignore: -------------------------------------------------------------------------------- 1 | *.py[cod] 2 | .idea/* -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/README.md: -------------------------------------------------------------------------------- 1 | subDomainsBrute 1.0.6 2 | ====== 3 | 4 | A simple and fast sub domain brute tool for pentesters. It can rearch as fast as 1000 DNS queries per second. 5 | 6 | 这个脚本的主要目标是发现其他工具无法探测到的域名, 如Google,aizhan,fofa。高频扫描每秒DNS请求数可超过1000次。 7 | 8 | ## Change Log (2017-6-3) ## 9 | * 增加CNAME扫描,扫描时间将增加 10 | * Bug fix: normal_lines remove deep copy issus, thanks @BlueIce 11 | 12 | 13 | ## Change Log (2017-5-4) ## 14 | * 使用协程替代了多线程 15 | * 使用了优化级队列,来减小队列的长度 16 | * 增加了占位符{next_sub} 17 | 18 | 19 | ## Dependencies ## 20 | > pip install dnspython gevent pymysql DBUtils pexpect 21 | 22 | 23 | ## Usage ## 24 | 25 | Usage: subDomainsBrute.py [options] target.com 26 | 27 | Options: 28 | --version show program's version number and exit 29 | -h, --help show this help message and exit 30 | -f FILE A file contains new line delimited subs, default is 31 | subnames.txt. 32 | --full Full scan, NAMES FILE subnames_full.txt will be used 33 | to brute 34 | -i, --ignore-intranet 35 | Ignore domains pointed to private IPs 36 | -t THREADS, --threads=THREADS 37 | Num of scan threads, 300 by default 38 | -o taskid, --output=taskid 39 | taskid 40 | 41 | 42 | ## Screenshot ## 43 | 44 | 如下图所示,小字典扫描qq.com,发现758个域名,耗时在100s以内。 45 | 46 | ![screenshot](screenshot.png) 47 | 48 | Output file could be like: [https://github.com/lijiejie/subDomainsBrute/blob/master/dict/sample_qq.com.txt](https://github.com/lijiejie/subDomainsBrute/blob/master/dict/sample_qq.com.txt) 49 | 50 | From [http://www.lijiejie.com](http://www.lijiejie.com) -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/dict/dns_servers.txt: -------------------------------------------------------------------------------- 1 | 223.5.5.5 2 | 223.6.6.6 3 | 119.29.29.29 4 | 182.254.116.116 5 | 180.76.76.76 -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/dict/next_sub.txt: -------------------------------------------------------------------------------- 1 | test 2 | test2 3 | t 4 | dev 5 | 1 6 | 2 7 | 3 8 | s1 9 | s2 10 | s3 11 | admin 12 | adm 13 | a 14 | ht 15 | adminht 16 | webht 17 | web 18 | gm 19 | sys 20 | system 21 | manage 22 | manager 23 | mgr 24 | b 25 | c 26 | passport 27 | bata 28 | wei 29 | weixin 30 | wechat 31 | wx 32 | wiki 33 | upload 34 | ftp 35 | pic 36 | jira 37 | zabbix 38 | nagios 39 | bug 40 | bugzilla 41 | sql 42 | mysql 43 | db 44 | stmp 45 | pop 46 | imap 47 | mail 48 | zimbra 49 | exchange 50 | forum 51 | bbs 52 | list 53 | count 54 | counter 55 | img 56 | img01 57 | img02 58 | img03 59 | img04 60 | api 61 | cache 62 | js 63 | css 64 | app 65 | apps 66 | wap 67 | m 68 | sms 69 | zip 70 | monitor 71 | proxy 72 | update 73 | upgrade 74 | stat 75 | stats 76 | data 77 | portal 78 | blog 79 | autodiscover 80 | en 81 | search 82 | so 83 | oa 84 | database 85 | home 86 | sso 87 | help 88 | vip 89 | s 90 | w 91 | down 92 | download 93 | downloads 94 | dl 95 | svn 96 | git 97 | log 98 | staff 99 | vpn 100 | sslvpn 101 | ssh 102 | scanner 103 | sandbox 104 | ldap 105 | lab 106 | go 107 | demo 108 | console 109 | cms 110 | auth 111 | crm 112 | erp 113 | res 114 | static 115 | old 116 | new 117 | beta 118 | image 119 | service 120 | login 121 | 3g 122 | docs 123 | it 124 | e 125 | live 126 | library 127 | files 128 | i 129 | d 130 | cp 131 | connect 132 | gateway 133 | lib 134 | preview 135 | backup 136 | share 137 | status 138 | assets 139 | user 140 | vote 141 | bugs 142 | cas 143 | feedback 144 | id 145 | edm 146 | survey 147 | union 148 | ceshi 149 | dev1 150 | updates 151 | phpmyadmin 152 | pma 153 | edit 154 | master 155 | xml 156 | control 157 | profile 158 | zhidao 159 | tool 160 | toolbox 161 | boss 162 | activity 163 | www 164 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/dict/subnames_all_5_letters.txt: -------------------------------------------------------------------------------- 1 | {alphnum} 2 | {alphnum}{alphnum} 3 | {alphnum}{alphnum}{alphnum} 4 | {alphnum}{alphnum}{alphnum}{alphnum} 5 | {alphnum}{alphnum}{alphnum}{alphnum}{alphnum} -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/extract_domain.py: -------------------------------------------------------------------------------- 1 | file = open('all.txt','r') 2 | 3 | domain = file.readlines() 4 | obuff = [] 5 | 6 | for a in domain: 7 | b = a.rstrip()+'\n' 8 | 9 | if b in obuff: 10 | continue 11 | obuff.append(b) 12 | 13 | with open('out3.txt', 'a+') as handle: 14 | handle.writelines(obuff) 15 | 16 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/fast_sub.py: -------------------------------------------------------------------------------- 1 | #! /usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | import socket 4 | from utils.alexa import Alexa 5 | from utils.threatcrowd import Threatcrowd 6 | from utils.threatminer import Threatminer 7 | from utils.crt import Crt 8 | from utils.i_links import ILinks 9 | from utils.ip138 import Ip138 10 | from utils.netcraft import Netcraft 11 | from utils.bugbank import Bugbank 12 | from utils.bing import Bing 13 | from utils.baidu import Baidu 14 | from utils.hack_target import HackTarget 15 | 16 | ''' 17 | - alexa 18 | - page catcher 19 | - ssl crt 20 | - ilinks 21 | - ip138 22 | ''' 23 | def get_subd(domain): 24 | subdomains = [] 25 | realdomains = [] 26 | subdomains.extend(Ip138(domain).execute()) 27 | subdomains.extend(Alexa(domain).execute()) 28 | subdomains.extend(Crt(domain).execute()) 29 | subdomains.extend(ILinks(domain).execute()) 30 | subdomains.extend(Threatcrowd(domain).execute()) 31 | subdomains.extend(Threatminer(domain).execute()) 32 | subdomains.extend(Netcraft(domain).execute()) 33 | subdomains.extend(Bugbank(domain).execute()) 34 | subdomains.extend(Bing(domain).execute()) 35 | subdomains.extend(Baidu(domain).execute()) 36 | subdomains.extend(HackTarget(domain).execute()) 37 | 38 | subdomains = list(set(subdomains)) 39 | 40 | for target in subdomains: 41 | try: 42 | mainHost, mainHost, C_ip = socket.gethostbyname_ex('wildcardfake.' + target) 43 | except: 44 | if target.endswith(domain): 45 | realdomains.append(str(target)) 46 | pass 47 | 48 | realdomains = list(set(realdomains)) 49 | return realdomains 50 | 51 | if __name__ == '__main__': 52 | import sys,time 53 | target = sys.argv[1] if len(sys.argv) > 1 else 'gznu.edu.cn' 54 | start = time.time() 55 | print get_subd(target) 56 | print (time.time()-start)/60 -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/ip_translate.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding:utf-8 -*- 3 | import json 4 | import time 5 | import datetime 6 | import pexpect 7 | from lib.threadpool import ThreadPool as Pool 8 | 9 | def interpret(results,domain): 10 | 11 | iplist = [] 12 | ipcount = [] 13 | 14 | for x in results: 15 | iplist.extend(str(x['ip'])) 16 | 17 | #获取ip范围值 18 | #192.168.1 19 | ip={'.'.join(r.split(".")[0:3]) for r in iplist} 20 | ip = list(ip) 21 | 22 | #如果取值c段在范围内 23 | for i in range(0,len(ip)): 24 | for ipaddr in list(iplist): 25 | #会出现192.168.1 与192.168.11的问题.增加. 26 | if ip[i]+"." in ipaddr: 27 | #采用id来区分 28 | res = {"id":i,"ip":ipaddr,"ipc":ip[i]} 29 | if res not in ipcount: 30 | ipcount.append(res) 31 | 32 | def is_intranet(ip): 33 | """ 34 | 匹配内网ip地址 35 | """ 36 | ret = ip.split('.') 37 | if not len(ret) == 4: 38 | return True 39 | if ret[0] == '10': 40 | return True 41 | if ret[0] == '127' and ret[1] == '0': 42 | return True 43 | if ret[0] == '172' and 16 <= int(ret[1]) <= 32: 44 | return True 45 | if ret[0] == '192' and ret[1] == '168': 46 | return True 47 | return False 48 | 49 | def getnum(a): 50 | #经典的排序法 51 | for i in range(0,len(a)): 52 | for j in range(i+1,len(a)): 53 | first=int(a[i]) 54 | second=int(a[j]) 55 | if first0: 104 | ret = {"domain":"get_crpret."+domain,"ip":ipclist} 105 | results.append(ret) 106 | return results 107 | 108 | def run_comand32(runcmd): 109 | scanner = '' 110 | try: 111 | child1 = pexpect.spawn(runcmd,timeout=2400) 112 | out = child1.readlines() 113 | for out_item in out: 114 | if len(out_item) == 0: 115 | return scanner 116 | else: 117 | scanner = out_item.strip() 118 | return scanner 119 | except Exception as e: 120 | print runcmd,str(e) 121 | pass 122 | 123 | 124 | def trs(args): 125 | import os 126 | iplist,domain = args 127 | tp = Pool(3) 128 | path = os.path.split(os.path.realpath(__file__))[0] 129 | for ip in iplist: 130 | command = "python {path}/../whatcms/portscan.py --host {ip} --domain {domain}" 131 | if domain.find('get_crpret')==-1: 132 | runcmd = command.format(path=path,ip=ip,domain=domain) 133 | else: 134 | runcmd = command.format(path=path,ip=ip,domain=ip) 135 | tp.push(run_comand32, runcmd) 136 | tp.wait() 137 | tp.busy() -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/lib/__init__.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/TaskInfo/subDomainsBrute-master/lib/__init__.py -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/lib/consle_width.py: -------------------------------------------------------------------------------- 1 | """ getTerminalSize() 2 | - get width and height of console 3 | - works on linux,os x,windows,cygwin(windows) 4 | """ 5 | 6 | __all__ = ['getTerminalSize'] 7 | 8 | 9 | def getTerminalSize(): 10 | import platform 11 | current_os = platform.system() 12 | tuple_xy = None 13 | if current_os == 'Windows': 14 | tuple_xy = _getTerminalSize_windows() 15 | if tuple_xy is None: 16 | tuple_xy = _getTerminalSize_tput() 17 | # needed for window's python in cygwin's xterm! 18 | if current_os == 'Linux' or current_os == 'Darwin' or current_os.startswith('CYGWIN'): 19 | tuple_xy = _getTerminalSize_linux() 20 | if tuple_xy is None: 21 | print "default" 22 | tuple_xy = (80, 25) # default value 23 | return tuple_xy 24 | 25 | 26 | def _getTerminalSize_windows(): 27 | res = None 28 | try: 29 | from ctypes import windll, create_string_buffer 30 | 31 | # stdin handle is -10 32 | # stdout handle is -11 33 | # stderr handle is -12 34 | 35 | h = windll.kernel32.GetStdHandle(-12) 36 | csbi = create_string_buffer(22) 37 | res = windll.kernel32.GetConsoleScreenBufferInfo(h, csbi) 38 | except: 39 | return None 40 | if res: 41 | import struct 42 | (bufx, bufy, curx, cury, wattr, 43 | left, top, right, bottom, maxx, maxy) = struct.unpack("hhhhHhhhhhh", csbi.raw) 44 | sizex = right - left + 1 45 | sizey = bottom - top + 1 46 | return sizex, sizey 47 | else: 48 | return None 49 | 50 | 51 | def _getTerminalSize_tput(): 52 | # get terminal width 53 | # src: http://stackoverflow.com/questions/263890/how-do-i-find-the-width-height-of-a-terminal-window 54 | try: 55 | import subprocess 56 | proc = subprocess.Popen(["tput", "cols"], stdin=subprocess.PIPE, stdout=subprocess.PIPE) 57 | output = proc.communicate(input=None) 58 | cols = int(output[0]) 59 | proc = subprocess.Popen(["tput", "lines"], stdin=subprocess.PIPE, stdout=subprocess.PIPE) 60 | output = proc.communicate(input=None) 61 | rows = int(output[0]) 62 | return (cols, rows) 63 | except: 64 | return None 65 | 66 | 67 | def _getTerminalSize_linux(): 68 | def ioctl_GWINSZ(fd): 69 | try: 70 | import fcntl, termios, struct, os 71 | cr = struct.unpack('hh', fcntl.ioctl(fd, termios.TIOCGWINSZ, '1234')) 72 | except: 73 | return None 74 | return cr 75 | 76 | cr = ioctl_GWINSZ(0) or ioctl_GWINSZ(1) or ioctl_GWINSZ(2) 77 | if not cr: 78 | try: 79 | fd = os.open(os.ctermid(), os.O_RDONLY) 80 | cr = ioctl_GWINSZ(fd) 81 | os.close(fd) 82 | except: 83 | pass 84 | if not cr: 85 | try: 86 | cr = (env['LINES'], env['COLUMNS']) 87 | except: 88 | return None 89 | return int(cr[1]), int(cr[0]) 90 | 91 | 92 | if __name__ == "__main__": 93 | sizex, sizey = getTerminalSize() 94 | print 'width =', sizex, 'height =', sizey 95 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/lib/database.py: -------------------------------------------------------------------------------- 1 | # -*- coding: UTF-8 -*- 2 | ''' 3 | Created on 2017年5月15日 4 | @author: Saline 5 | ''' 6 | import pymysql 7 | from DBUtils.PooledDB import PooledDB 8 | 9 | mysqldb_conn = { 10 | #数据库信息 11 | 'host' : 'localhost', 12 | 'user' : 'root', 13 | 'port' : '3306', 14 | 'password' : 'mysqlroot', 15 | 'db' : 'wyproxy', 16 | #数据库连接编码 17 | 'charset' : 'utf8', 18 | #mincached : 启动时开启的闲置连接数量(缺省值 0 以为着开始时不创建连接) 19 | "DB_MIN_CACHED":"10", 20 | #maxcached : 连接池中允许的闲置的最多连接数量(缺省值 0 代表不闲置连接池大小) 21 | "DB_MAX_CACHED":"10", 22 | #maxshared : 共享连接数允许的最大数量(缺省值 0 代表所有连接都是专用的)如果达到了最大数量,被请求为共享的连接将会被共享使用 23 | "DB_MAX_SHARED":"20", 24 | #maxconnecyions : 创建连接池的最大数量(缺省值 0 代表不限制) 25 | "DB_MAX_CONNECYIONS":"100", 26 | #blocking : 设置在连接池达到最大数量时的行为(缺省值 0 或 False 代表返回一个错误; 其他代表阻塞直到连接数减少,连接被分配) 27 | "DB_BLOCKING":True, 28 | #maxusage : 单个连接的最大允许复用次数(缺省值 0 或 False 代表不限制的复用).当达到最大数时,连接会自动重新连接(关闭和重新打开) 29 | "DB_MAX_USAGE":"0", 30 | #setsession : 一个可选的SQL命令列表用于准备每个会话,如["set datestyle to german", ...] 31 | "DB_SET_SESSION":None 32 | } 33 | ''' 34 | @功能:数据库连接池 35 | ''' 36 | class PTConnectionPool(object): 37 | __pool = None 38 | def __enter__(self): 39 | self.conn = self.getConn() 40 | self.cursor = self.conn.cursor() 41 | return self 42 | 43 | def getConn(self): 44 | if self.__pool is None: 45 | self.__pool = PooledDB( 46 | creator=pymysql, cursorclass= pymysql.cursors.DictCursor, 47 | mincached=int(mysqldb_conn.get('DB_MIN_CACHED')), 48 | maxcached=int(mysqldb_conn.get('DB_MAX_CACHED')), 49 | maxshared=int(mysqldb_conn.get('DB_MAX_SHARED')), 50 | maxconnections=int(mysqldb_conn.get('DB_MAX_CONNECYIONS')), 51 | blocking=mysqldb_conn.get('DB_BLOCKING'), 52 | setsession=mysqldb_conn.get('DB_SET_SESSION'), 53 | maxusage=int(mysqldb_conn.get('DB_MAX_USAGE')), 54 | host=mysqldb_conn.get('host'), 55 | port=int(mysqldb_conn.get('port')), 56 | user=mysqldb_conn.get('user'), 57 | passwd=mysqldb_conn.get('password'), 58 | db=mysqldb_conn.get('db') , use_unicode=False, 59 | charset=mysqldb_conn.get('charset') 60 | ) 61 | 62 | return self.__pool.connection() 63 | 64 | """ 65 | @summary: 释放连接池资源 66 | """ 67 | def __exit__(self, type, value, trace): 68 | self.cursor.close() 69 | self.conn.close() 70 | 71 | ''' 72 | @功能:获取数据库连接 73 | ''' 74 | def getPTConnection(): 75 | return PTConnectionPool() 76 | 77 | 78 | def query(sql,args= None): 79 | with getPTConnection() as db: 80 | try: 81 | cur = db.cursor 82 | cur.execute(sql,args) 83 | return db.cursor.fetchall() 84 | except Exception, e: 85 | print str(e) 86 | db.conn.rollback() 87 | raise Exception(e) 88 | 89 | 90 | def execute(sql, args=None): 91 | with getPTConnection() as db: 92 | try: 93 | cur = db.cursor 94 | result = cur.execute(sql, args) 95 | db.conn.commit() 96 | return result 97 | except Exception, e: 98 | print str(e) 99 | db.conn.rollback() 100 | raise Exception(e) 101 | 102 | def executmany(sql, args=None): 103 | with getPTConnection() as db: 104 | try: 105 | cur = db.cursor 106 | result = cur.executemany(sql, args) 107 | db.conn.commit() 108 | return result 109 | except Exception, e: 110 | print e 111 | db.conn.rollback() 112 | raise Exception(e) 113 | 114 | if __name__ == "__main__": 115 | res = execute('select count(*) from movies') 116 | print str(res) 117 | 118 | res = query('select * from movies limit 10') 119 | print str(res) -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/out/zbedu.gov.cn.txt: -------------------------------------------------------------------------------- 1 | www.zbedu.gov.cn 218.56.105.79 2 | m.zbedu.gov.cn 218.56.105.79 3 | zb.zbedu.gov.cn 218.56.105.118 4 | lx.zbedu.gov.cn 218.201.121.52 5 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/run.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | 3 | import os 4 | file = open('temp.txt','r') 5 | domain = file.readlines() 6 | for a in domain: 7 | #print a 8 | cmd = "python subDomainsBrute.py -t 120 "+a 9 | print cmd 10 | os.system(cmd) 11 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/__init__.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import sys 5 | 6 | reload(sys) 7 | sys.setdefaultencoding('utf-8') -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/alexa.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | """从Alexa和chinaz中的相关网页获取子域名""" 5 | 6 | 7 | import logging 8 | import re 9 | 10 | import sys 11 | 12 | from common import http_request_get, http_request_post, is_domain 13 | 14 | 15 | class Alexa(object): 16 | """docstring for Alexa""" 17 | 18 | def __init__(self, domain): 19 | super(Alexa, self).__init__() 20 | self.domain = domain 21 | self.subset = [] 22 | 23 | def run(self): 24 | try: 25 | self.fetch_chinaz() 26 | self.fetch_alexa_cn() 27 | return list(set(self.subset)) 28 | except Exception as e: 29 | logging.info(str(e)) 30 | return self.subset 31 | 32 | def fetch_chinaz(self): 33 | """get subdomains from alexa.chinaz.com""" 34 | 35 | url = 'http://alexa.chinaz.com/?domain={0}'.format(self.domain) 36 | r = http_request_get(url).content 37 | subs = re.compile(r'(?<=\"\>\r\n
  • ).*?(?=
  • )') 38 | result = subs.findall(r) 39 | for sub in result: 40 | if is_domain(sub): 41 | self.subset.append(sub) 42 | 43 | def fetch_alexa_cn(self): 44 | """get subdomains from alexa.cn""" 45 | sign = self.get_sign_alexa_cn() 46 | if sign is None: 47 | raise Exception("sign_fetch_is_failed") 48 | else: 49 | (domain, sig, keyt) = sign 50 | 51 | pre_domain = self.domain.split('.')[0] 52 | 53 | url = 'http://www.alexa.cn/api_150710.php' 54 | payload = { 55 | 'url': domain, 56 | 'sig': sig, 57 | 'keyt': keyt, 58 | } 59 | r = http_request_post(url, payload=payload).text 60 | 61 | for sub in r.split('*')[-1:][0].split('__'): 62 | if sub.split(':')[0:1][0] == 'OTHER': 63 | break 64 | else: 65 | sub_name = sub.split(':')[0:1][0] 66 | sub_name = ''.join((sub_name.split(pre_domain)[0], domain)) 67 | if is_domain(sub_name): 68 | self.subset.append(sub_name) 69 | 70 | def get_sign_alexa_cn(self): 71 | """alexa.cn dectect signtrue, sig & keyt""" 72 | 73 | url = 'http://www.alexa.cn/index.php?url={0}'.format(self.domain) 74 | r = http_request_get(url).text 75 | sign = re.compile(r'(?<=showHint\(\').*?(?=\'\);)').findall(r) 76 | if len(sign) >= 1: 77 | return sign[0].split(',') 78 | else: 79 | return None 80 | 81 | def execute(self): 82 | return self.run() 83 | 84 | 85 | if __name__ == '__main__': 86 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn' 87 | alexa = Alexa(target) 88 | print alexa.execute() 89 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/banner.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import os 5 | 6 | import logging 7 | import traceback 8 | 9 | import requests 10 | 11 | 12 | class GetBanner(object): 13 | def __init__(self, raw_domain='180.97.33.108'): 14 | self.raw_domain = raw_domain 15 | self.result = dict() 16 | 17 | def execute_old(self): 18 | cmd = 'curl -I {0} 2>&1'.format(self.raw_domain) 19 | try: 20 | tmp = os.popen(cmd).readlines() 21 | for i in tmp: 22 | i=i.replace('\r\n','') 23 | if ':' in i: 24 | j = i.split(":") 25 | self.result[j[0]] = j[1] 26 | else: 27 | if i: 28 | self.result["status"] = i 29 | except: 30 | pass 31 | return self.result 32 | 33 | def execute(self): 34 | headers = { 35 | 'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36' 36 | } 37 | response_header_dict = {} 38 | try: 39 | response_header_dict = dict(requests.head('http://' + self.raw_domain, headers=headers, timeout=(5, 5)).headers) 40 | except Exception as e: 41 | logging.error('get http header error.') 42 | logging.error(traceback.format_exc()) 43 | logging.error(str(e)) 44 | return response_header_dict 45 | 46 | 47 | if __name__ == '__main__': 48 | a = GetBanner('google.com') 49 | result = a.execute() 50 | for key in result.keys(): 51 | print key.ljust(30) + result[key] 52 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/bugbank.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import sys 5 | import requests 6 | import json 7 | import time 8 | 9 | reload(sys) 10 | sys.setdefaultencoding('utf-8') 11 | 12 | ''' 13 | 通过调取bugbank的api获取子域名 14 | http://www.bugbank.cn/api/subdomain/collect?domain=目标网页&page=页数 15 | ''' 16 | 17 | 18 | class Bugbank(object): 19 | def __init__(self, domain): 20 | self.domain = domain 21 | self.result_dict = {} 22 | 23 | def execute(self): 24 | page = 1 25 | max_page = 1 26 | subdomain_set = set() 27 | while True: 28 | url = 'http://www.bugbank.cn/api/subdomain/collect?domain=%s&page=%d' % (self.domain, page) 29 | try: 30 | rsp = requests.get(url=url, timeout=5) 31 | date_dict = json.loads(rsp.text) 32 | if page == 1: 33 | total = date_dict["page"]["total"] 34 | max_page = int((total + 9) / 10) 35 | # print max_page # 最大页数 36 | # time.sleep(2) 37 | current_page = date_dict["page"]["current"] 38 | # print "当前第", current_page, '页' 39 | # time.sleep(1) 40 | for i in date_dict["data"]: 41 | '''结果打印和集合添加''' 42 | # print i['domain'] 43 | # subdomain_set.add(i['domain']) 44 | self.result_dict[i['domain']] = i['ips'] 45 | page += 1 46 | if page > max_page: 47 | break 48 | except KeyboardInterrupt: 49 | # print '手动停止退出' 50 | break 51 | except requests.exceptions.ConnectionError, requests.exceptions.ConnectTimeout: 52 | # print '网络问题退出' 53 | break 54 | except Exception, e: 55 | # print "其它问题退出:", e.message 56 | break 57 | return self.result_dict 58 | 59 | 60 | if __name__ == '__main__': 61 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn' 62 | a = Bugbank(target) 63 | print a.execute() 64 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/captcha.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import json 5 | import time 6 | import requests 7 | 8 | class Captcha(object): 9 | """docstring for Captcha""" 10 | def __init__(self): 11 | super(Captcha, self).__init__() 12 | self.url = 'http://api.ysdm.net/create.json' 13 | self.username = 'a61323636' 14 | self.password = '123456' 15 | self.timeout = 90 16 | self.softid = 1 17 | self.softkey = 'b40ffbee5c1cf4e38028c197eb2fc751' 18 | self.typeid = 3000 19 | 20 | def verification(self, filename): 21 | (cnt,retry) = (0, 3) 22 | while True: 23 | try: 24 | if cnt >= retry: 25 | break # over max_retry_cnt 26 | payload = { 27 | 'username': self.username, 28 | 'password': self.password, 29 | 'timeout': self.timeout, 30 | 'softid': self.softid, 31 | 'softkey': self.softkey, 32 | 'typeid': self.typeid, 33 | } 34 | multiple_files = [('image', ('captcha.gif', open(filename, 'rb'), 'image/gif')),] 35 | r = requests.post(self.url, data=payload, files=multiple_files) 36 | return json.loads(r.text) 37 | except Exception, e: 38 | cnt += 1 39 | print('{0} [INFO] {1}'.format( 40 | time.strftime('%Y-%m-%d %H:%M:%S'), str(e))) 41 | else: 42 | cnt = 0 43 | 44 | 45 | # captcha = Captcha() 46 | # imgurl = 'http://ce.wooyun.org/captcha.php' 47 | # print captcha.verification(imgurl) 48 | 49 | 50 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/common.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import re 5 | from config import * 6 | 7 | import json 8 | import subprocess 9 | 10 | import logging 11 | 12 | import requests as requests 13 | import requests as __requests__ 14 | 15 | # from tldextract import extract, TLDExtract 16 | 17 | from fileutils import FileUtils 18 | 19 | import requests.packages.urllib3 20 | requests.packages.urllib3.disable_warnings() 21 | 22 | if allow_http_session: 23 | requests = requests.Session() 24 | 25 | def is_domain(domain): 26 | domain_regex = re.compile( 27 | r'(?:[A-Z0-9_](?:[A-Z0-9-_]{0,247}[A-Z0-9])?\.)+(?:[A-Z]{2,6}|[A-Z0-9-]{2,}(? 1 else 'qq.com' 43 | try: 44 | print Crt(target).execute() 45 | except KeyboardInterrupt: 46 | print '{0}'.format("手动退出") -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/decorators.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import utils 5 | 6 | 7 | class BaseDecorator(object): 8 | 9 | def __init__(self, wrapped): 10 | self.wrapped = wrapped 11 | 12 | def execute(self, *args, **kwargs): 13 | return self.wrapped.execute(*args, **kwargs) 14 | 15 | 16 | class SubDomainListDecorator(BaseDecorator): 17 | 18 | def __init__(self, wrapped): 19 | super(SubDomainListDecorator, self).__init__(wrapped) 20 | 21 | def execute(self, *args, **kwargs): 22 | result_list = super(SubDomainListDecorator, self).execute(*args, **kwargs) 23 | result_dict = {} 24 | if result_list is not None: 25 | for i in result_list: 26 | result_dict[i] = utils.get_ip(i) 27 | return result_dict 28 | 29 | 30 | class CrtCatcherDecorator(SubDomainListDecorator): 31 | 32 | def __init__(self, wrapped): 33 | super(CrtCatcherDecorator, self).__init__(wrapped) 34 | 35 | def execute(self, *args, **kwargs): 36 | result_dict = super(CrtCatcherDecorator, self).execute(*args, **kwargs) 37 | print 'crt catcher complete.' 38 | return result_dict 39 | 40 | 41 | class SearchEngineCatcherDecorator(SubDomainListDecorator): 42 | 43 | def __init__(self, wrapped): 44 | super(SearchEngineCatcherDecorator, self).__init__(wrapped) 45 | 46 | def execute(self, *args, **kwargs): 47 | result_dict = super(SearchEngineCatcherDecorator, self).execute(*args, **kwargs) 48 | print 'search engine catcher complete.' 49 | return result_dict 50 | 51 | 52 | class SubDomainBruteDecorator(BaseDecorator): 53 | 54 | def __init__(self, wrapped): 55 | super(SubDomainBruteDecorator, self).__init__(wrapped) 56 | 57 | def execute(self, *args, **kwargs): 58 | result_dict = self.wrapped.run(*args, **kwargs) 59 | print 'sub domains brute complete.' 60 | return result_dict 61 | 62 | 63 | class PageCatcherDecorator(SubDomainListDecorator): 64 | 65 | def __init__(self, wrapped): 66 | super(PageCatcherDecorator, self).__init__(wrapped) 67 | 68 | def execute(self, *args, **kwargs): 69 | result_dict = super(PageCatcherDecorator, self).execute(*args, **kwargs) 70 | print 'page cathcher complete.' 71 | return result_dict 72 | 73 | 74 | class RecursiveCatcherDecorator(SubDomainListDecorator): 75 | 76 | def __init__(self, wrapped): 77 | super(RecursiveCatcherDecorator, self).__init__(wrapped) 78 | 79 | def execute(self, *args, **kwargs): 80 | result_dict = super(RecursiveCatcherDecorator, self).execute(*args, **kwargs) 81 | print 'recursive catcher complete.' 82 | return result_dict 83 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/dns_zone_transfer.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import sys 5 | import socket 6 | import dns 7 | import re 8 | from dns import resolver, query, exception 9 | 10 | reload(sys) 11 | sys.setdefaultencoding('utf-8') 12 | 13 | 14 | class DnsZoneTransfer(object): 15 | 16 | def __init__(self, domain): 17 | self.domain = domain 18 | self.nameservers = [] 19 | try: 20 | nss = resolver.query(domain, 'NS') 21 | self.nameservers = [str(ns) for ns in nss] 22 | except: 23 | pass 24 | 25 | def transfer(self): 26 | # f = open('result.txt', 'a') 27 | result_dict = {} 28 | for ns in self.nameservers: 29 | # print >> sys.stderr, "Querying %s" % (ns,) 30 | # print >> sys.stderr, "-" * 50 31 | z = self.query(ns) 32 | # print z 33 | # if z is not None: 34 | # f.write(str(self.domain)+': '+str(ns)+'\n') 35 | # print self.domain ,ns 36 | # print >> sys.stderr, "%s\n" % ("-" * 50,) 37 | if z is not None: 38 | result_dict.update(z) 39 | return result_dict 40 | 41 | def query(self, ns): 42 | nsaddr = self.resolve_a(ns) 43 | try: 44 | z = self.pull_zone(nsaddr) 45 | # except (exception.FormError, socket.error, EOFError): 46 | except Exception: 47 | # print >> sys.stderr, "AXFR failed\n" 48 | return None 49 | else: 50 | return z 51 | 52 | def resolve_a(self, name): 53 | """Pulls down an A record for a name""" 54 | nsres = resolver.query(name, 'A') 55 | return str(nsres[0]) 56 | 57 | def pull_zone(self, nameserver): 58 | """Sends the domain transfer request""" 59 | try: 60 | q = query.xfr(nameserver, self.domain, relativize=False, timeout=2, lifetime=5) 61 | except dns.exception.Timeout: 62 | raise EOFError 63 | zone = {} 64 | 65 | for m in q: 66 | for rrset in m.answer: 67 | for rd in rrset: 68 | # result_string = str(rrset.name).ljust(30) + str(dns.rdatatype.to_text(rrset.rdtype)).ljust(10) + rd.to_text(origin=None, relativize=True) 69 | # zone += result_string + '\ 70 | parse_type = dns.rdatatype.to_text(rrset.rdtype) 71 | if parse_type == 'A': 72 | sub_domain = str(rrset.name) 73 | if re.match(r'^.*\.$', sub_domain): 74 | sub_domain = sub_domain[:-1] 75 | zone[sub_domain] = rd.to_text(origin=None, relativize=True) 76 | if not zone: 77 | raise EOFError 78 | return zone 79 | 80 | def execute(self): 81 | return self.transfer() 82 | 83 | 84 | if __name__ == '__main__': 85 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn' 86 | transfer = DnsZoneTransfer(target) 87 | result_dict = transfer.transfer() 88 | for key in result_dict.keys(): 89 | print '%s: %s' % (key, result_dict[key]) 90 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/fileutils.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import os 5 | import os.path 6 | '''文件的操作,可以优化掉''' 7 | 8 | class File(object): 9 | 10 | def __init__(self, *pathComponents): 11 | self._path = FileUtils.buildPath(*pathComponents) 12 | self.content = None 13 | 14 | @property 15 | def path(self): 16 | return self._path 17 | 18 | @path.setter 19 | def path(self, value): 20 | raise NotImplemented 21 | 22 | def isValid(self): 23 | return FileUtils.isFile(self.path) 24 | 25 | def exists(self): 26 | return FileUtils.exists(self.path) 27 | 28 | def canRead(self): 29 | return FileUtils.canRead(self.path) 30 | 31 | def canWrite(self): 32 | return FileUtils.canWrite(self.path) 33 | 34 | def read(self): 35 | return FileUtils.read(self.path) 36 | 37 | def update(self): 38 | self.content = self.read() 39 | 40 | def content(self): 41 | if not self.content: 42 | self.content = FileUtils.read() 43 | return self.content() 44 | 45 | def getLines(self): 46 | for line in FileUtils.getLines(self.path): 47 | yield line 48 | 49 | def __cmp__(self, other): 50 | if not isinstance(other, File): 51 | raise NotImplemented 52 | return cmp(self.content(), other.content()) 53 | 54 | def __enter__(self): 55 | return self 56 | 57 | def __exit__(self, type, value, tb): 58 | pass 59 | 60 | class FileUtils(object): 61 | 62 | @staticmethod 63 | def buildPath(*pathComponents): 64 | if pathComponents: 65 | path = os.path.join(*pathComponents) 66 | else: 67 | path = '' 68 | return path 69 | 70 | @staticmethod 71 | def exists(fileName): 72 | return os.access(fileName, os.F_OK) 73 | 74 | @staticmethod 75 | def canRead(fileName): 76 | if not os.access(fileName, os.R_OK): 77 | return False 78 | try: 79 | with open(fileName): 80 | pass 81 | except IOError: 82 | return False 83 | return True 84 | 85 | @staticmethod 86 | def canWrite(fileName): 87 | return os.access(fileName, os.W_OK) 88 | 89 | @staticmethod 90 | def read(fileName): 91 | result = '' 92 | with open(fileName, 'r') as fd: 93 | for line in fd.readlines(): 94 | result += line 95 | return result 96 | 97 | @staticmethod 98 | def getLines(fileName): 99 | with open(fileName, 'r') as fd: 100 | for line in fd.readlines(): 101 | yield line.rstrip() 102 | 103 | @staticmethod 104 | def isDir(fileName): 105 | return os.path.isdir(fileName) 106 | 107 | @staticmethod 108 | def isFile(fileName): 109 | return os.path.isfile(fileName) 110 | 111 | @staticmethod 112 | def createDirectory(directory): 113 | if not FileUtils.exists(directory): 114 | os.makedirs(directory) 115 | 116 | @staticmethod 117 | def sizeHuman(num): 118 | base = 1024 119 | for x in ['B ','KB','MB','GB']: 120 | if num < base and num > -base: 121 | return "%3.0f%s" % (num, x) 122 | num /= base 123 | return "%3.0f %s" % (num, 'TB') 124 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/g_config.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import sys 5 | import json 6 | import sqlite3 7 | import os 8 | 9 | reload(sys) 10 | sys.setdefaultencoding('utf-8') 11 | env = os.getenv("sub_domain_env") 12 | if env not in('devel','local','binbin','prod'): 13 | env = 'local' 14 | 15 | try: 16 | with open('config/%s_config.json'%env, 'r') as config_file: 17 | config_json_text = config_file.read() 18 | config_json = json.loads(config_json_text) 19 | except Exception as e: 20 | print 'failed to load config file' 21 | sys.exit(-1) 22 | 23 | 24 | db = sqlite3.connect(config_json['db_name'] + '.db', check_same_thread=False) 25 | db_cursor = db.cursor() 26 | 27 | db_cursor.execute(''' 28 | CREATE TABLE IF NOT EXISTS `root_domain` ( 29 | `id` INTEGER PRIMARY KEY AUTOINCREMENT, 30 | `domain` VARCHAR(64) UNIQUE 31 | ) 32 | ''') 33 | db.execute(''' 34 | CREATE TABLE IF NOT EXISTS `result_domain` ( 35 | `id` INTEGER PRIMARY KEY AUTOINCREMENT, 36 | `root_domain_id` INTEGER, 37 | `domain` VARCHAR(255) UNIQUE, 38 | `ip` VARCHAR(255) 39 | ) 40 | ''') 41 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/get_ssl.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | 5 | import os 6 | import re 7 | import requests 8 | import sys 9 | 10 | ''' 11 | 通过证书查找子域名 12 | ''' 13 | 14 | 15 | class GetSsl(object): 16 | 17 | def __init__(self, raw_domain): 18 | self.raw_domain = raw_domain 19 | self.x = set() 20 | self.PREFIX_URL1 = 'https://www.' 21 | self.PREFIX_URL2 = 'https://' 22 | 23 | def is_https1(self): 24 | url = self.PREFIX_URL2 + self.raw_domain 25 | try: 26 | requests.get(url, timeout=4) 27 | except requests.ConnectionError, requests.ConnectTimeout: 28 | return False 29 | return True 30 | 31 | def is_https2(self): 32 | url = self.PREFIX_URL1 + self.raw_domain 33 | try: 34 | requests.get(url, timeout=4) 35 | except requests.ConnectionError, requests.ConnectTimeout: 36 | return False 37 | return True 38 | 39 | def get_domains_from_openssl(self): # 使用 OpenSSL 的 SAN 获得域名,有命令注入风险 40 | domains = set() 41 | cmd = 'openssl s_client -showcerts -connect %s:443 < /dev/null 2>/dev/null \ 42 | | openssl x509 -text | grep -A 1 "Subject Alternative Name"' % self.raw_domain 43 | try: 44 | tmp = os.popen(cmd).readlines() 45 | data = re.split(r'DNS:', tmp[1].strip()) 46 | for i in data: 47 | if i: 48 | domains.add(i.replace(', ', '').replace('*.', '')) 49 | if self.raw_domain in domains: 50 | domains.remove(self.raw_domain) 51 | except KeyboardInterrupt: 52 | pass 53 | return list(domains) 54 | 55 | def execute(self): 56 | if self.is_https1() or self.is_https2(): 57 | openssl_domains = self.get_domains_from_openssl() 58 | return openssl_domains 59 | return [] 60 | 61 | 62 | if __name__ == '__main__': 63 | target = sys.argv[1] if len(sys.argv) > 1 else 'qq.com' 64 | print GetSsl(target).execute() 65 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/get_whois.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | from whois import whois 5 | import sys 6 | 7 | 8 | class GetWhois(object): 9 | def __init__(self, domain): 10 | self.domain = domain 11 | 12 | def execute(self): 13 | w = whois(self.domain) 14 | return w 15 | 16 | def run(self): 17 | return self.execute() 18 | 19 | 20 | if __name__ == '__main__': 21 | target = sys.argv[1] if len(sys.argv) > 1 else 'qq.com' 22 | print GetWhois(target).execute() 23 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/globalresult.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | ''' 5 | 放全局结果字典,格式: 6 | 'domain': 'ip, ip, ip, ...' 7 | ''' 8 | 9 | import sys 10 | import threading 11 | import utils 12 | 13 | 14 | g_lock = threading.Lock() 15 | g_result_dict = {} 16 | 17 | 18 | def update_result_dict(result_dict): 19 | ''' 20 | 更新结果字典 21 | :param result_dict: 结果字典 22 | ''' 23 | g_lock.acquire() 24 | for domain in result_dict.keys(): 25 | need_print = False 26 | if domain not in g_result_dict: 27 | g_result_dict[domain] = result_dict[domain] 28 | need_print = True 29 | else: 30 | dest_ips = g_result_dict[domain].split(', ') 31 | src_ips = result_dict[domain].split(', ') 32 | for src_ip in src_ips: 33 | if src_ip not in dest_ips: 34 | g_result_dict[domain] += ', ' + src_ip 35 | need_print = True 36 | if need_print: 37 | sys.stdout.write(domain.ljust(30) + g_result_dict[domain] + '\n') 38 | sys.stdout.flush() 39 | g_lock.release() 40 | 41 | 42 | def add_list(result_list): 43 | to_dict = {} 44 | for i in result_list: 45 | to_dict[i] = utils.get_ip(i) 46 | update_result_dict(to_dict) 47 | 48 | 49 | if __name__ == '__main__': 50 | g_result_dict['www.baidu.com'] = '1.2.3.4' 51 | 52 | # test case 1 53 | # result_dict = {'www.baidu.com': '2.3.4.5'} 54 | # update_result_dict(result_dict) 55 | 56 | # test case 2 57 | # result_dict = {'admin.baidu.com': '3.4.5.6'} 58 | # update_result_dict(result_dict) 59 | 60 | # test case 3 61 | # result_dict = {'www.baidu.com': '1.2.3.4'} 62 | # update_result_dict(result_dict) 63 | 64 | # test case 4 65 | # result_dict = {'www.baidu.com': '1.2.3.4, 2.3.4.5'} 66 | # update_result_dict(result_dict) 67 | 68 | # test case 5 69 | # result_dict = {'www.baidu.com': '3.4.5.6, 2.3.4.5'} 70 | # update_result_dict(result_dict) 71 | 72 | # test case 6 73 | # result_list = ['www.baidu.com', 'fanyi.baidu.com'] 74 | # add_list(result_list) 75 | 76 | print g_result_dict 77 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/hack_target.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import sys 5 | import requests 6 | import json 7 | import time 8 | 9 | reload(sys) 10 | sys.setdefaultencoding('utf-8') 11 | 12 | ''' 13 | 通过调取hacktarget的api获取子域名 14 | http://api.hackertarget.com/hostsearch/?q=目标网页 15 | ''' 16 | 17 | 18 | class HackTarget(object): 19 | def __init__(self, domain): 20 | self.domain = domain 21 | self.result_dict = {} 22 | self.result = [] 23 | 24 | def execute(self): 25 | url = 'http://api.hackertarget.com/hostsearch/?q={0}'.format(self.domain) 26 | try: 27 | rsp = requests.get(url=url, timeout=5) 28 | for i in rsp.text.split('\n'): 29 | j = i.split(",") 30 | self.result_dict[j[0]] = j[1] 31 | except KeyboardInterrupt: 32 | pass 33 | except requests.exceptions.ConnectionError, requests.exceptions.ConnectTimeout: 34 | pass 35 | except Exception, e: 36 | pass 37 | for dist in self.result_dict: 38 | self.result.append(dist) 39 | self.result = list(set(self.result)) 40 | return self.result 41 | #return self.result_dict 42 | 43 | 44 | if __name__ == '__main__': 45 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn' 46 | a = HackTarget(target) 47 | print a.execute() 48 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/i_links.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import sys 5 | import requests 6 | from lxml import etree 7 | import time 8 | from urlparse import urlparse 9 | 10 | reload(sys) 11 | sys.setdefaultencoding('utf-8') 12 | 13 | '''抓取站长帮手网的信息''' 14 | 15 | 16 | def geturl(url): 17 | parse = urlparse(url) 18 | url = parse.netloc 19 | return url 20 | 21 | 22 | class ILinks(object): 23 | def __init__(self, domain): 24 | self.domain = domain 25 | 26 | def execute(self): 27 | subdomain_set = set() 28 | url = 'http://i.links.cn/subdomain/' 29 | data = {'domain': self.domain, 30 | 'b2': '1', 31 | 'b3': '1', 32 | 'b4': '1'} 33 | try: 34 | rsp = requests.post(url=url, data=data, timeout=5) 35 | root = etree.HTML(rsp.text) 36 | urls = root.xpath('//*[@class="domain"]/a') 37 | for i in urls: 38 | '''结果打印和集合添加''' 39 | url = geturl(i.text) 40 | if len(url) == 0: 41 | url = i.text 42 | # print url 43 | subdomain_set.add(url) 44 | except requests.exceptions.ConnectionError, requests.exceptions.ConnectTimeout: 45 | print '网络问题退出' 46 | except Exception, e: 47 | print "其它问题退出:", e.message 48 | 49 | return list(subdomain_set) 50 | 51 | 52 | if __name__ == '__main__': 53 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn' 54 | a = ILinks(target) 55 | a.execute() 56 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/ip138.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | """从ip138中的相关网页获取子域名,模仿wydomain的写法""" 5 | 6 | import sys 7 | import logging 8 | import re 9 | 10 | from common import http_request_get, is_domain 11 | 12 | 13 | class Ip138(object): 14 | """docstring for IP138""" 15 | 16 | def __init__(self, domain): 17 | super(Ip138, self).__init__() 18 | self.domain = domain 19 | self.subset = [] 20 | 21 | def run(self): 22 | try: 23 | self.fetch_ip138() 24 | return list(set(self.subset)) 25 | except Exception as e: 26 | logging.info(str(e)) 27 | return self.subset 28 | 29 | def fetch_ip138(self): 30 | """get subdomains from ip138.com""" 31 | 32 | url = 'http://site.ip138.com/{0}/domain.htm'.format(self.domain) 33 | r = http_request_get(url).content 34 | regx = r'(.*\.%s)' % self.domain 35 | # subs = re.compile(r'(?<="\>\r\n
  • ).*?(?=
  • )') 36 | result = re.findall(regx, r) 37 | for sub in result: 38 | # print sub 39 | if is_domain(sub): 40 | self.subset.append(sub) 41 | 42 | def execute(self): 43 | return self.run() 44 | 45 | if __name__ == '__main__': 46 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn' 47 | a = Ip138(target) 48 | print a.execute() -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/netcraft.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | # import sys 5 | # sys.path.append("../") 6 | 7 | import logging 8 | import re 9 | import subprocess 10 | import time 11 | 12 | import sys 13 | 14 | from common import http_request_get, is_domain 15 | 16 | 17 | class Netcraft(object): 18 | """docstring for Netcraft""" 19 | def __init__(self, domain): 20 | super(Netcraft, self).__init__() 21 | self.cookie = '' 22 | self.subset = [] 23 | self.domain = domain 24 | self.site = 'http://searchdns.netcraft.com' 25 | 26 | def run(self): 27 | try: 28 | self.cookie = self.get_cookie().get('cookie') 29 | url = '{0}/?restriction=site+contains&position=limited&host=.{1}'.format( 30 | self.site, self.domain) 31 | r = http_request_get(url, custom_cookie=self.cookie) 32 | self.parser(r.text) 33 | return list(set(self.subset)) 34 | except Exception, e: 35 | logging.info(str(e)) 36 | return self.subset 37 | 38 | def parser(self, response): 39 | npage = re.search('Next page', response) 40 | if npage: 41 | for item in self.get_subdomains(response): 42 | if is_domain(item): 43 | self.subset.append(item) 44 | nurl = '{0}{1}'.format(self.site, npage.group(1)) 45 | r = http_request_get(nurl, custom_cookie=self.cookie) 46 | time.sleep(3) 47 | self.parser(r.text) 48 | else: 49 | for item in self.get_subdomains(response): 50 | if is_domain(item): 51 | self.subset.append(item) 52 | 53 | def get_subdomains(self, response): 54 | _regex = re.compile(r'(?<= 1 else 'cugb.edu.cn' 79 | netcraft = Netcraft(domain=target) 80 | print netcraft.execute() 81 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/pz.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import sys 5 | import requests 6 | import lxml.etree as etree 7 | import socket 8 | from time import ctime, time 9 | from urlparse import urlparse 10 | 11 | reload(sys) 12 | sys.setdefaultencoding('utf-8') 13 | 14 | TIMEOUT = 5 15 | 16 | ''' 17 | 实现功能:根据给出的域名,首先socket域名的ip地址,然后更具bing高级搜索ip:,使用xpath,爬取包含该ip的链接,返回url及title 18 | 参数一:目标域名 19 | ''' 20 | 21 | 22 | def gethtml(url): # 获取必应的搜索结果 23 | try: 24 | headers = { 25 | 'Host': 'www.bing.com', 26 | 'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/55.0.2883.87 Chrome/55.0.2883.87 Safari/537.36'} 27 | r = requests.get(url, headers=headers, timeout=TIMEOUT) 28 | if r.status_code == 200: 29 | return r.text 30 | else: 31 | return None 32 | except KeyboardInterrupt: 33 | sys.exit() 34 | except Exception, e: 35 | print e 36 | return 'error' 37 | 38 | 39 | end = [] 40 | check = [] 41 | 42 | 43 | def getsearchresult_url(ip, url): # 使用搜索的地址,获取搜索结果 44 | try: 45 | html = gethtml(url) 46 | if not html: 47 | print '页没有内容,url:%s' % url 48 | return 'error' 49 | if html == 'error': # 搜索必应失败 50 | return 'error' 51 | root = etree.HTML(html) 52 | lines = root.xpath('//*[@id="b_results"]') # 结果集合 53 | if not lines: 54 | return 'error' 55 | else: 56 | lines = lines[0] 57 | urlandtitle = [] 58 | for l in lines: 59 | url = l.xpath('.//h2/a/@href') 60 | title = l.xpath('.//h2/a/text()') 61 | if url and title: 62 | url = url[0] 63 | parser = urlparse(url) 64 | netloc = parser.netloc 65 | if netloc == 'ip.chinaz.com': 66 | pass 67 | else: 68 | title = title[0] 69 | urlandtitle.append({'url': url, 'title': title}) 70 | else: 71 | pass 72 | urls_temp = {} 73 | urls_temp = urlandtitle 74 | 75 | for u in urls_temp: 76 | title = u['title'] 77 | parser = urlparse(u['url']) 78 | url = parser.scheme + '://' + parser.netloc + '/' 79 | if url not in check: 80 | end.append({'url': url, 'title': title}) 81 | check.append(url) 82 | next_page = lines.xpath('.//*[@class="sb_pagN"]/@href') 83 | # time.sleep(1) 84 | 85 | if len(next_page) > 0: 86 | url = 'https://www.bing.com'+next_page[0] 87 | return 0,url,end 88 | else: 89 | return 1,None,end 90 | except Exception, e: 91 | print e 92 | return 'error' 93 | 94 | 95 | def getbing(ip): # 获取ip地址的域名等信息 96 | i = [] 97 | searchurl = 'https://www.bing.com/search?q=ip%3a' + ip + '&qs=HS&pq=ip%3a' 98 | uat = getsearchresult_url(ip, searchurl) 99 | if not uat: 100 | return None 101 | if uat == 'error': 102 | return None 103 | while True: 104 | if uat[0] == 0: 105 | for u in uat[2]: 106 | if not (u['url'],u['title']) in i: 107 | i.append((u['url'],u['title'])) 108 | uat = getsearchresult_url(ip,uat[1]) 109 | elif uat[0] == 1: 110 | for u in uat[2]: 111 | if not (u['url'],u['title']) in i: 112 | i.append((u['url'],u['title'])) 113 | break 114 | else: 115 | break 116 | return i 117 | 118 | 119 | if __name__ == '__main__': 120 | ip = sys.argv[1] 121 | i = getbing(ip) 122 | for ii in i: 123 | print ii 124 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/sitedossier.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | # import sys 5 | # sys.path.append("../") 6 | 7 | import json 8 | import logging 9 | import re 10 | 11 | import sys 12 | 13 | from common import http_request_get, http_request_post 14 | from captcha import Captcha 15 | 16 | 17 | class Sitedossier(object): 18 | """docstring for Sitedossier""" 19 | def __init__(self, domain): 20 | super(Sitedossier, self).__init__() 21 | self.domain = domain 22 | self.captcha = Captcha() 23 | self.subset = [] 24 | 25 | def run(self): 26 | try: 27 | url = 'http://www.sitedossier.com/parentdomain/{0}'.format(self.domain) 28 | r = self.get_content(url) 29 | self.parser(r) 30 | return list(set(self.subset)) 31 | except Exception, e: 32 | logging.info(str(e)) 33 | return self.subset 34 | 35 | def get_content(self, url): 36 | logging.info('request: {0}'.format(url)) 37 | r = http_request_get(url).text 38 | if self.human_act(r) is True: 39 | return r 40 | else: 41 | self.get_content(url) 42 | 43 | def parser(self, response): 44 | npage = re.search('Show', response) 45 | if npage: 46 | for sub in self.get_subdomain(response): 47 | self.subset.append(sub) 48 | nurl = 'http://www.sitedossier.com/parentdomain/{0}'.format(npage.group(1)) 49 | response = self.get_content(nurl) 50 | self.parser(response) 51 | else: 52 | for sub in self.get_subdomain(response): 53 | self.subset.append(sub) 54 | 55 | def get_subdomain(self, response): 56 | domain = re.compile(r'(?<=)') 57 | for sub in domain.findall(response): 58 | yield sub 59 | 60 | def human_act(self, response): 61 | if 'auditimage' in response or 'blacklisted' in response: 62 | imgurl = self.get_audit_img(response) 63 | if imgurl is not None: 64 | ret = self.captcha.verification(imgurl) 65 | if ret.has_key('Result'): 66 | self.audit(ret['Result']) 67 | return True 68 | else: 69 | raise Exception("captcha_verification_is_empty") 70 | else: 71 | raise Exception("audit_img_is_empty") 72 | else: 73 | return True 74 | 75 | def audit(self, code): 76 | payload = {'w':code} 77 | url = 'http://www.sitedossier.com/audit' 78 | r = http_request_post(url, payload=payload) 79 | 80 | def get_audit_img(self, response): 81 | auditimg = re.compile(r'(?<=Please)')
 82 |         imgurl = auditimg.findall(response)[0:]
 83 |         if len(imgurl) >= 1:
 84 |             imgurl = 'http://www.sitedossier.com/auditimage/{0}'.format(imgurl[0])
 85 |             return imgurl
 86 |         else:
 87 |             return None
 88 | 
 89 |     def __str__(self):
 90 |         handler = lambda e: str(e)
 91 |         return json.dumps(self, indent=2, default=handler)
 92 | 
 93 |     def execute(self):
 94 |         return self.run()
 95 | 
 96 | 
 97 | if __name__ == '__main__':
 98 |     target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn'
 99 |     dossier = Sitedossier(domain=target)
100 |     print dossier.execute()
101 | 


--------------------------------------------------------------------------------
/TaskPython/TaskInfo/subDomainsBrute-master/utils/threatcrowd.py:
--------------------------------------------------------------------------------
 1 | #!/usr/bin/env python
 2 | # -*- coding: utf-8 -*-
 3 | 
 4 | # import sys
 5 | # sys.path.append( 1 else 'cugb.edu.cn' 44 | threat = Threatcrowd(target) 45 | print threat.execute() 46 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/threatminer.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | # import sys 5 | # sys.path.append("../") 6 | 7 | import logging 8 | import re 9 | 10 | import sys 11 | 12 | from common import http_request_get, is_domain 13 | 14 | 15 | class Threatminer(object): 16 | """docstring for Threatminer""" 17 | def __init__(self, domain): 18 | super(Threatminer, self).__init__() 19 | self.domain = domain 20 | self.subset = [] 21 | self.website = "https://www.threatminer.org" 22 | 23 | def run(self): 24 | try: 25 | url = "{0}/getData.php?e=subdomains_container&q={1}&t=0&rt=10&p=1".format(self.website, self.domain) 26 | # content = curl_get_content(url).get('resp') 27 | content = http_request_get(url).content 28 | 29 | _regex = re.compile(r'(?<=)') 30 | for sub in _regex.findall(content): 31 | if is_domain(sub): 32 | self.subset.append(sub) 33 | 34 | return list(set(self.subset)) 35 | except Exception as e: 36 | logging.info(str(e)) 37 | return self.subset 38 | 39 | def execute(self): 40 | return self.run() 41 | 42 | 43 | if __name__ == '__main__': 44 | target = sys.argv[1] if len(sys.argv) > 1 else 'cugb.edu.cn' 45 | threat = Threatminer(target) 46 | print threat.execute() 47 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/subDomainsBrute-master/utils/utils.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | 4 | import json 5 | import sys 6 | import socket 7 | 8 | import datetime 9 | 10 | 11 | def get_ip(domain): 12 | try: 13 | ip_list = socket.gethostbyname_ex(domain)[2] 14 | ip = ', '.join(ip_list) if 1 == len(ip_list) else ip_list[0] 15 | # for i in ip_list: 16 | # ip += (i+', ') 17 | except Exception as e: 18 | ip = 'None' 19 | return ip 20 | 21 | 22 | def out(msg): 23 | sys.stdout.write(msg) 24 | sys.stdout.flush() 25 | 26 | 27 | def print_result_list(result_list): 28 | for i in result_list: 29 | msg = i.ljust(30) + get_ip(i) 30 | out(msg + '\n') 31 | -------------------------------------------------------------------------------- /TaskPython/TaskInfo/whatcms.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # -*- coding: utf-8 -*- 3 | # @Time : 17/8/16 上午12:01 4 | # @Author : SecPlus 5 | # @Site : www.SecPlus.org 6 | # @Email : miacey@163.com 7 | 8 | import Queue,sys 9 | 10 | reload(sys) 11 | sys.setdefaultencoding('utf8') 12 | 13 | import requests 14 | import json, hashlib, sys 15 | import gevent 16 | from gevent.queue import Queue 17 | import time 18 | 19 | 20 | class whatcms(object): 21 | def __init__(self, url,file): 22 | self.tasks = Queue() 23 | self.url = url.rstrip("/") 24 | self.out = open(file,'w') 25 | # print file 26 | fp = open('data.json') 27 | webdata = json.load(fp, encoding="utf-8") 28 | for i in webdata: 29 | self.tasks.put(i) 30 | fp.close() 31 | print("webdata total:%d" % len(webdata)) 32 | 33 | def _GetMd5(self, body): 34 | m2 = hashlib.md5() 35 | m2.update(body) 36 | return m2.hexdigest() 37 | 38 | def _clearQueue(self): 39 | while not self.tasks.empty(): 40 | self.tasks.get() 41 | 42 | def _worker(self): 43 | data = self.tasks.get() 44 | test_url = self.url + data["url"] 45 | # print test_url 46 | rtext = '' 47 | try: 48 | r = requests.get(test_url, timeout=0.5) 49 | if (r.status_code != 200): 50 | return 51 | rtext = r.text 52 | if rtext is None: 53 | return 54 | except: 55 | rtext = '' 56 | 57 | if data["re"]: 58 | if (rtext.find(data["re"]) != -1): 59 | result = data["name"] 60 | print("CMS:%s Judge:%s re:%s" % (result, test_url, data["re"])) 61 | self.out.write(result) 62 | self._clearQueue() 63 | return True 64 | else: 65 | md5 = self._GetMd5(rtext) 66 | if (md5 == data["md5"]): 67 | result = data["name"] 68 | print("CMS:%s Judge:%s md5:%s" % (result, test_url, data["md5"])) 69 | self.out.write(result) 70 | self._clearQueue() 71 | return True 72 | 73 | def _boss(self): 74 | while not self.tasks.empty(): 75 | self._worker() 76 | 77 | def whatweb(self, maxsize=100): 78 | start = time.clock() 79 | allr = [gevent.spawn(self._boss) for i in range(maxsize)] 80 | gevent.joinall(allr) 81 | end = time.clock() 82 | print ("cost: %f s" % (end - start)) 83 | 84 | 85 | if __name__ == '__main__': 86 | if len(sys.argv) < 2: 87 | print("usag:python whatcms.py http://www.xxx.com") 88 | else: 89 | url = sys.argv[1] 90 | out = sys.argv[2] 91 | g = whatcms(url,out) 92 | g.whatweb(1000) 93 | -------------------------------------------------------------------------------- /TaskPython/Tide-WDScanner-bat.bat: -------------------------------------------------------------------------------- 1 | 2 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython" && python C:\WDScanner\WWW\TaskPython\taskscan.py" 3 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython" && python C:\WDScanner\WWW\TaskPython\taskspider.py" 4 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython\TaskInfo" && python C:\WDScanner\WWW\TaskPython\TaskInfo\taskinfo-win.py" -------------------------------------------------------------------------------- /TaskPython/Tide-proxy-bat.bat: -------------------------------------------------------------------------------- 1 | 2 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython\proxy" && python C:\WDScanner\WWW\TaskPython\proxy\assess_quality.py" 3 | start cmd.exe /k "cd "C:\WDScanner\WWW\TaskPython\proxy" && python C:\WDScanner\WWW\TaskPython\proxy\ip_pool.py" 4 | -------------------------------------------------------------------------------- /TaskPython/bat/00dde594e5f4fbef569bf66947122478.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://zhaosheng.lyu.edu.cn --HtmlAuthUser= --HtmlAuthPass= --EnablePortScanning=True /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\00dde594e5f4fbef569bf66947122478\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/0ddf68dcf63e0cc39aed76cd96d5773d.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.tyanhome.com.cn/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\0ddf68dcf63e0cc39aed76cd96d5773d\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/177b45290f0e02fc4b6b717ee63e0993.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.jxzls.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\177b45290f0e02fc4b6b717ee63e0993\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/2120d4819c0cbd0350097999399a818d.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.sdgsxx.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\2120d4819c0cbd0350097999399a818d\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/358066961ec043941983855238c65619.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.whhywater.com --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\358066961ec043941983855238c65619\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/36f0ec6fe6399491ed166c2132493e0b.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://testaspnet.vulnweb.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\36f0ec6fe6399491ed166c2132493e0b\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/45c20358adc310212646795fc0986a3e.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://testphp.vulnweb.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\45c20358adc310212646795fc0986a3e\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/6560689483f8fd7793b67ce4f79803b9.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.lvquan.cn/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\6560689483f8fd7793b67ce4f79803b9\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/8058d809b01005a65e3f3359b21de527.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.chngec.com.cn/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\8058d809b01005a65e3f3359b21de527\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/9b20620a18e0ef7f542a1ef51ffa7b96.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.kongziyjy.org --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\9b20620a18e0ef7f542a1ef51ffa7b96\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/da12fdc291fdc06b67455a640a865d93.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://testasp.vulnweb.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\da12fdc291fdc06b67455a640a865d93\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/da7acffdbc450ed7a04e6ccf20fb5c82.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://www.webscantest.com/ --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\da7acffdbc450ed7a04e6ccf20fb5c82\ 2 | -------------------------------------------------------------------------------- /TaskPython/bat/ec1d0085488097c51c6e433520b2cc5b.bat: -------------------------------------------------------------------------------- 1 | "C:\Program Files (x86)\Acunetix\Web Vulnerability Scanner 10\wvs_console.exe" /Scan http://testhtml5.vulnweb.com --HtmlAuthUser= --HtmlAuthPass= /Verbose /ExportXML /SaveLogs /SaveFolder C:\WDScanner\WWW\report\ec1d0085488097c51c6e433520b2cc5b\ 2 | -------------------------------------------------------------------------------- /TaskPython/cmd.bat: -------------------------------------------------------------------------------- 1 | cmd.exe -------------------------------------------------------------------------------- /TaskPython/logspider/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/.DS_Store -------------------------------------------------------------------------------- /TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/done.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/done.txt -------------------------------------------------------------------------------- /TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/urlall.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/urlall.txt -------------------------------------------------------------------------------- /TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/urllog.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/0ddf68dcf63e0cc39aed76cd96d5773d/urllog.txt -------------------------------------------------------------------------------- /TaskPython/logspider/36f0ec6fe6399491ed166c2132493e0b/done.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/36f0ec6fe6399491ed166c2132493e0b/done.txt -------------------------------------------------------------------------------- /TaskPython/logspider/36f0ec6fe6399491ed166c2132493e0b/urllog.txt: -------------------------------------------------------------------------------- 1 | bad##http://testaspnet.vulnweb.com/javascript:__doPostBack('RightPanel1$Calendar','7078') --- Parent_Page:http://testaspnet.vulnweb.com/Signup.aspx+++ 2 | bad##http://testaspnet.vulnweb.com/javascript:__doPostBack('RightPanel1$Calendar','7089') --- Parent_Page:http://testaspnet.vulnweb.com/Signup.aspx+++ 3 | bad##http://testaspnet.vulnweb.com/ReadNews.aspx?id=2&NewsAd=ads/def.html --- Parent_Page:http://testaspnet.vulnweb.com/Default.aspx+++ 4 | -------------------------------------------------------------------------------- /TaskPython/logspider/45c20358adc310212646795fc0986a3e/done.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/45c20358adc310212646795fc0986a3e/done.txt -------------------------------------------------------------------------------- /TaskPython/logspider/45c20358adc310212646795fc0986a3e/urllog.txt: -------------------------------------------------------------------------------- 1 | bad##http://www.eclectasy.com/Fractal-Explorer/index.html --- Parent_Page:http://testphp.vulnweb.com/product.php?pic=5+++ 2 | bad##http://testphp.vulnweb.com/version.php --- Parent_Page:http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts/+++ 3 | bad##http://testphp.vulnweb.com//hpp/ --- Parent_Page:http://testphp.vulnweb.com/#+++ 4 | bad##http://testphp.vulnweb.com/../index.php --- Parent_Page:http://testphp.vulnweb.com/Templates/main_dynamic_template.dwt.php+++ 5 | -------------------------------------------------------------------------------- /TaskPython/logspider/6560689483f8fd7793b67ce4f79803b9/done.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/6560689483f8fd7793b67ce4f79803b9/done.txt -------------------------------------------------------------------------------- /TaskPython/logspider/6560689483f8fd7793b67ce4f79803b9/urllog.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/6560689483f8fd7793b67ce4f79803b9/urllog.txt -------------------------------------------------------------------------------- /TaskPython/logspider/8058d809b01005a65e3f3359b21de527/done.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/8058d809b01005a65e3f3359b21de527/done.txt -------------------------------------------------------------------------------- /TaskPython/logspider/8058d809b01005a65e3f3359b21de527/urlall.txt: -------------------------------------------------------------------------------- 1 | http://www.chngec.com.cn/'+_ROOT+'/process/grsf_wz_back?m=query_aqyrDetail&dbid='+rec.dbid+' 2 | http://www.chngec.com.cn/' + _ROOT + '/login.jsp?uname=' + staffCode + ' 3 | http://www.chngec.com.cn/javascript:regist(); 4 | http://www.chngec.com.cn//safe.jsp 5 | http://www.chngec.com.cn/ 6 | http://www.chngec.com.cn//jsp/grkhcx.jsp 7 | http://www.chngec.com.cn//aboutMain.jsp 8 | http://www.chngec.com.cn/javascript:searchAdress(); 9 | http://www.chngec.com.cn//e-invoice.jsp 10 | http://www.chngec.com.cn/index1 11 | http://www.chngec.com.cn//onlineStop.jsp 12 | http://www.chngec.com.cn//consult.jsp 13 | http://www.chngec.com.cn/javascript:submitUserMsg(); 14 | http://www.chngec.com.cn//index.jsp 15 | http://www.chngec.com.cn//onlineRepair.jsp 16 | http://www.xinnet.com/domain/cert.do?method=listCert&enDomainName=chngec.com.cn 17 | http://www.chngec.com.cn//onlineOpen.jsp 18 | http://www.chngec.com.cn/javascript:void(0); 19 | http://www.chngec.com.cn//jsp/mingxi.jsp 20 | http://www.chngec.com.cn//noice.jsp 21 | http://www.chngec.com.cn//news.jsp 22 | http://www.chngec.com.cn//safe_yr.jsp 23 | http://www.chngec.com.cn/javascript:searchGrkh(); 24 | http://www.chngec.com.cn/onlineOpen.jsp 25 | http://www.chngec.com.cn/onlineStop.jsp 26 | http://www.chngec.com.cn/onlineRepair.jsp 27 | http://www.chngec.com.cn/' + _ROOT + '/jsp/baoxiu.jsp 28 | http://www.chngec.com.cn/javascript:webjf(); 29 | http://www.chngec.com.cn/' + _ROOT + '/process/grsf_wz_back?m='+flag+'&dbid=' + rec1.dbid + ' 30 | http://www.chngec.com.cn/javascript:pay4order(); 31 | http://www.chngec.com.cn/javascript:qxZxbtbx(\'' + type + '\'); 32 | http://www.chngec.com.cn/'+_ROOT+'/process/grsf_wz_back?m='+flag+'&dbid='+rec.dbid+' 33 | http://www.chngec.com.cn/' + url + ' 34 | http://www.chngec.com.cn/' + _ROOT + '/jsp/viewbtbx.jsp?type=' + type + '&id=' + rec.dbid + ' 35 | http://www.chngec.com.cn/' + _ROOT + '/jsp/stop.jsp 36 | http://www.chngec.com.cn/' + (rec.ismain == '1' ? ' 37 | http://www.chngec.com.cn/javascript:delorder(); 38 | http://www.chngec.com.cn/javascript:submit2(); 39 | http://www.chngec.com.cn/javascript:submit(); 40 | http://www.chngec.com.cn/javascript:searchQfmingxi(); 41 | http://www.chngec.com.cn///consult.jsp 42 | http://www.chngec.com.cn///index.jsp 43 | http://www.chngec.com.cn///e-invoice.jsp 44 | http://www.chngec.com.cn///aboutMain.jsp 45 | http://www.chngec.com.cn///safe.jsp 46 | http://www.chngec.com.cn///jsp/mingxi.jsp 47 | http://www.chngec.com.cn//contact/about_rizhao.jsp 48 | http://www.chngec.com.cn///noice.jsp 49 | -------------------------------------------------------------------------------- /TaskPython/logspider/8058d809b01005a65e3f3359b21de527/urllog.txt: -------------------------------------------------------------------------------- 1 | bad##http://www.chngec.com.cn/javascript:qxZxbtbx(\'' + type + '\'); --- Parent_Page:http://www.chngec.com.cn/res/js/gryx_signon.js+++ 2 | -------------------------------------------------------------------------------- /TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/done.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/done.txt -------------------------------------------------------------------------------- /TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/urlall.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/urlall.txt -------------------------------------------------------------------------------- /TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/urllog.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/9b20620a18e0ef7f542a1ef51ffa7b96/urllog.txt -------------------------------------------------------------------------------- /TaskPython/logspider/da12fdc291fdc06b67455a640a865d93/done.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/da12fdc291fdc06b67455a640a865d93/done.txt -------------------------------------------------------------------------------- /TaskPython/logspider/da12fdc291fdc06b67455a640a865d93/urllog.txt: -------------------------------------------------------------------------------- 1 | bad##http://testasp.vulnweb.com/./Register.asp?RetURL=%2Fshowthread%2Easp%3Fid%3D16 --- Parent_Page:http://testasp.vulnweb.com/./Login.asp?RetURL=%2Fshowthread%2Easp%3Fid%3D16+++ 2 | bad##http://testasp.vulnweb.com/./Login.asp?RetURL=%2Fregister%2Easp%3F --- Parent_Page:http://testasp.vulnweb.com/register.asp+++ 3 | bad##http://testasp.vulnweb.com/../Search.asp --- Parent_Page:http://testasp.vulnweb.com/Templates/MainTemplate.dwt.asp+++ 4 | bad##http://testasp.vulnweb.com/showthread.asp?id=5 --- Parent_Page:http://testasp.vulnweb.com/showforum.asp?id=0+++ 5 | -------------------------------------------------------------------------------- /TaskPython/logspider/da7acffdbc450ed7a04e6ccf20fb5c82/urlall.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/da7acffdbc450ed7a04e6ccf20fb5c82/urlall.txt -------------------------------------------------------------------------------- /TaskPython/logspider/da7acffdbc450ed7a04e6ccf20fb5c82/urllog.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/da7acffdbc450ed7a04e6ccf20fb5c82/urllog.txt -------------------------------------------------------------------------------- /TaskPython/logspider/ec1d0085488097c51c6e433520b2cc5b/done.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/ec1d0085488097c51c6e433520b2cc5b/done.txt -------------------------------------------------------------------------------- /TaskPython/logspider/ec1d0085488097c51c6e433520b2cc5b/urlall.txt: -------------------------------------------------------------------------------- 1 | http://testhtml5.vulnweb.com/ 2 | http://www.acunetix.com/blog/ 3 | http://www.twitter.com/acunetix/ 4 | http://www.facebook.com/Acunetix 5 | http://www.acunetix.com 6 | http://testhtml5.vulnweb.com// 7 | http://www.acunetix.com/ 8 | -------------------------------------------------------------------------------- /TaskPython/logspider/ec1d0085488097c51c6e433520b2cc5b/urllog.txt: -------------------------------------------------------------------------------- 1 | bad##http://testhtml5.vulnweb.com/ --- Parent_Page:http://testhtml5.vulnweb.com/#/archive+++ 2 | bad##http://www.twitter.com/acunetix/ --- Parent_Page:http://testhtml5.vulnweb.com/#/archive+++ 3 | bad##http://www.facebook.com/Acunetix --- Parent_Page:http://testhtml5.vulnweb.com/#/archive+++ 4 | -------------------------------------------------------------------------------- /TaskPython/logspider/fcee4c56499a9d717304040dbf2e2590/done.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/logspider/fcee4c56499a9d717304040dbf2e2590/done.txt -------------------------------------------------------------------------------- /TaskPython/logspider/fcee4c56499a9d717304040dbf2e2590/urlall.txt: -------------------------------------------------------------------------------- 1 | http://yilinhb.com//html/2414.html 2 | http://yilinhb.com//html/2444.html 3 | http://yilinhb.com//html/liuyan.html 4 | http://yilinhb.com//html/2566.html 5 | http://www.jsyzds.com 6 | http://yilinhb.com//html/cp_1490.html 7 | http://yilinhb.com//html/2674.html 8 | http://yilinhb.com//html/cp_1494.html 9 | http://yilinhb.com// 10 | http://yilinhb.com//html/cp_1495.html 11 | http://www.yilinhbgs.com 12 | http://yilinhb.com//html/gywm/jianjie.html 13 | http://yilinhb.com//english/ 14 | http://yilinhb.com//html/lxwm/yewubu.html 15 | http://www.yilinhb.com 16 | http://www.yctcjcj.com 17 | http://yilinhb.com//html/cp_1493.html 18 | http://yilinhb.com//html/2675.html 19 | http://yilinhb.com//kaiceseo/login.asp 20 | http://yilinhb.com//english/html/liuyan.html 21 | http://yilinhb.com//english/html/cp_1493.html 22 | http://yilinhb.com//index.html 23 | http://yilinhb.com//english/html/cp_1495.html 24 | http://yilinhb.com//english/html/2412.html 25 | http://yilinhb.com//english/html/gywm/jianjie.html 26 | http://yilinhb.com//english/index.html 27 | http://yilinhb.com//english/html/lxwm/yewubu.html 28 | http://yilinhb.com//english/html/cp_1494.html 29 | http://yilinhb.com//english/html/2438.html 30 | http://yilinhb.com//english/html/2413.html 31 | http://yilinhb.com//english/html/cp_1490.html 32 | http://yilinhb.com//english/html/2439.html 33 | http://yilinhb.com//english/html/2437.html 34 | http://yilinhb.com//english/kaiceseo/login.asp 35 | http://yilinhb.com/ 36 | http://yilinhb.com/javascript:void(0); 37 | -------------------------------------------------------------------------------- /TaskPython/logspider/fcee4c56499a9d717304040dbf2e2590/urllog.txt: -------------------------------------------------------------------------------- 1 | bad##http://www.jsyzds.com --- Parent_Page:http://yilinhb.com/+++ 2 | -------------------------------------------------------------------------------- /TaskPython/proxy/cmd.bat: -------------------------------------------------------------------------------- 1 | cmd.exe -------------------------------------------------------------------------------- /TaskPython/proxy/config.py: -------------------------------------------------------------------------------- 1 | # coding:utf-8 2 | 3 | # 从代理ip网站上总共要爬取的ip页数。一般每页20条,小项目(20-30个代理ip即可完成的)可以设置为1-2页。 4 | page_num = 3 5 | 6 | # 对已经检测成功的ip测试轮次。 7 | examine_round = 3 8 | 9 | # 超时时间。代理ip在测试过程中的超时时间。 10 | timeout = 5 11 | 12 | # 数据库链接地址 13 | host = '127.0.0.1' 14 | 15 | # 数据库链接端口 16 | port = 3306 17 | 18 | # 数据库链接用户名 19 | user = 'root' 20 | 21 | # 数据库密码 22 | passwd = '123456' 23 | 24 | # 数据库名 25 | DB_NAME = 'wdscan' 26 | 27 | # 表名 28 | TABLE_NAME = 'valid_ip' 29 | 30 | # 数据库字符 31 | charset = 'utf8' 32 | 33 | # 1个代理ip最大容忍失败次数,超过则从db中删去。 34 | USELESS_TIME = 4 35 | 36 | # 1个代理ip最小容忍成功率 37 | SUCCESS_RATE = 0.8 38 | 39 | # 超时惩罚时间 40 | TIME_OUT_PENALTY = 10 41 | 42 | # 每隔多久检测一次 43 | CHECK_TIME_INTERVAL = 24*3600 44 | -------------------------------------------------------------------------------- /TaskPython/proxy/config.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/TaskPython/proxy/config.pyc -------------------------------------------------------------------------------- /TaskPython/requirements.txt: -------------------------------------------------------------------------------- 1 | beautifulsoup4==4.6.0 2 | hackhttp 3 | requests 4 | gevent 5 | wafw00f 6 | pexpect 7 | lxml 8 | python-nmap 9 | dnspython 10 | py2-ipaddress 11 | pymysql 12 | DBUtils -------------------------------------------------------------------------------- /TaskPython/taskscan.py: -------------------------------------------------------------------------------- 1 | # coding=utf-8 2 | import urllib, urllib2, time, os, base64, json 3 | import _winreg 4 | 5 | wvs_path = "" 6 | 7 | 8 | def get_html(url): 9 | try: 10 | url = url.strip() 11 | req = urllib2.Request(url) 12 | html = urllib2.urlopen(req).read() 13 | return html 14 | except urllib2.URLError as e: 15 | if 'error' in str(e): 16 | print e.reason 17 | print "Restarting Apache2a now..." 18 | cmd = 'net start Apache2a' 19 | os.system(cmd) 20 | cmd2 = 'net start MySQLa' 21 | os.system(cmd2) 22 | time.sleep(3) 23 | return '' 24 | 25 | 26 | def writefile(logname, cmd): 27 | try: 28 | fp = open(logname, 'a') 29 | fp.write(cmd + "\n") 30 | fp.close() 31 | except: 32 | return False 33 | 34 | 35 | def regedit(re_root, re_path, re_key): 36 | try: 37 | key = _winreg.OpenKey(_winreg.HKEY_LOCAL_MACHINE, re_path) 38 | value, type = _winreg.QueryValueEx(key, re_key) 39 | return value 40 | except: 41 | return False 42 | 43 | 44 | def get_console(url): 45 | now = time.strftime('%Y-%m-%d %X', time.localtime(time.time())) 46 | date = time.strftime('%Y-%m-%d', time.localtime(time.time())) 47 | try: 48 | # if 1 == 1: 49 | a = get_html(url) 50 | # print a 51 | if len(a) > 50: 52 | base = base64.b64decode(a) 53 | print base 54 | json_arr = json.loads(base) 55 | target_url = json_arr['target_url'] 56 | user = json_arr['siteuser'] 57 | pwd = json_arr['sitepwd'] 58 | scan_rule = json_arr['scan_rule'] 59 | hash = json_arr['hash'] 60 | print json_arr 61 | console = '"%s\\wvs_console.exe" /Scan %s --HtmlAuthUser=%s --HtmlAuthPass=%s /Verbose /ExportXML /SaveLogs /SaveFolder C:\\WDScanner\\WWW\\report\\%s\\' % ( 62 | wvs_path, target_url, user, pwd, hash) 63 | # console = console + '\ndel %0' 64 | scantime = time.strftime('%Y-%m-%d %X', time.localtime(time.time())) 65 | print "%s\n%s\n" % (scantime, console) 66 | writefile('bat\\%s.bat' % hash, console) 67 | cmd = 'cmd.exe /c bat\\\%s.bat' % hash 68 | print "%s\n%s\n%s\n" % (now, target_url, cmd) 69 | os.system(cmd) 70 | else: 71 | print "Nothing To Do" 72 | except Exception, e: 73 | info = '%s\nError: %s' % (now, e) 74 | writefile('logs\\%s-Error.log' % date, info) 75 | print info 76 | 77 | 78 | wvs_path = regedit(0, "SOFTWARE\Wow6432Node\Acunetix\WVS10", "Path") 79 | print wvs_path 80 | # exit() 81 | url = 'http://127.0.0.1/taskscan.php' 82 | i = 0 83 | while 1: 84 | now = time.strftime('%Y-%m-%d %X', time.localtime(time.time())) 85 | # print now 86 | try: 87 | # if 1==1: 88 | a = get_console(url) 89 | i += 1 90 | time.sleep(5) 91 | except Exception, e: 92 | info = '%s\nError: %s' % (now, e) 93 | writefile('Error.log', info) 94 | print info 95 | time.sleep(1) 96 | -------------------------------------------------------------------------------- /ajax.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /css/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/css/.DS_Store -------------------------------------------------------------------------------- /css/ie.css: -------------------------------------------------------------------------------- 1 | .lt-ie7 body,.lt-ie8 body,.lt-ie9 body{background-color:#006ec3}.lt-ie7 #ie-header,.lt-ie7 #root,.lt-ie7 .contact-section,.lt-ie7 footer,.lt-ie7 header,.lt-ie8 #ie-header,.lt-ie8 #root,.lt-ie8 .contact-section,.lt-ie8 footer,.lt-ie8 header,.lt-ie9 #ie-header,.lt-ie9 #root,.lt-ie9 .contact-section,.lt-ie9 footer,.lt-ie9 header{display:none}.lt-ie7 #ie-header span.logo,.lt-ie8 #ie-header span.logo,.lt-ie9 #ie-header span.logo{display:inline-block}.lt-ie7 #ie-header span.logo a:hover,.lt-ie8 #ie-header span.logo a:hover,.lt-ie9 #ie-header span.logo a:hover{text-decoration:none}.lt-ie7 #ie-header span.logo .iconLogo,.lt-ie8 #ie-header span.logo .iconLogo,.lt-ie9 #ie-header span.logo .iconLogo{color:#fff;font-size:60px}.lt-ie7 #ie-header .iconLogo,.lt-ie8 #ie-header .iconLogo,.lt-ie9 #ie-header .iconLogo{color:#fff;font-size:40px}.lt-ie7 #ie-header div.main-nav,.lt-ie8 #ie-header div.main-nav,.lt-ie9 #ie-header div.main-nav{display:inline-block;float:right;margin-right:50px}.lt-ie7 #ie-header li.nav-item,.lt-ie7 #ie-header ul.navbar-nav,.lt-ie8 #ie-header li.nav-item,.lt-ie8 #ie-header ul.navbar-nav,.lt-ie9 #ie-header li.nav-item,.lt-ie9 #ie-header ul.navbar-nav{display:inline-block}.lt-ie7 #ie-header .main-nav .nav .nav-item a,.lt-ie8 #ie-header .main-nav .nav .nav-item a,.lt-ie9 #ie-header .main-nav .nav .nav-item a{color:#fff}.lt-ie7 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary,.lt-ie8 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary,.lt-ie9 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary{border:1px solid #fff;color:#fff}.lt-ie7 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary:hover,.lt-ie8 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary:hover,.lt-ie9 #ie-header .main-nav .nav .nav-item.nav-item-cta a.btn-cta-secondary:hover{border:1px solid #fff;color:#fff;background:#006ec3}.explorer-list{width:1000px;margin:-320px auto auto -500px;position:absolute;top:50%;left:50%}.oneapm-logo{text-align:center;margin-bottom:40px}.oneapm-logo .iconLogo{color:#fff;text-align:center;font-size:150px}.explorer-remind{color:#fff}.explorer-remind .para1{font-size:40px;text-align:center;font-weight:600;line-height:.5}.explorer-remind .para2{font-size:16px;margin-bottom:30px;text-align:center;color:#eee}.explorer-box{display:inline-block;width:190px;text-align:center;vertical-align:top;color:#fff;float:left}.explorer-link{color:#fff}.explorer-link:hover{color:#fff;text-decoration:none}.explorer-link:hover .explorer-title{text-decoration:underline}.bottom-bar-ie{position:absolute;bottom:0;width:100%;margin:auto;text-align:center}.gt-ie11 .carousel-control .glyphicon-chevron-left,.gt-ie11 .carousel-control .glyphicon-chevron-right,.gt-ie11 .carousel-control .icon-next,.gt-ie11 .carousel-control .icon-prev{position:static!;top:0}.gt-ie11 #test .carousel-control.right{position:fixed;right:25px;left:inherit} -------------------------------------------------------------------------------- /css/img/bg.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/css/img/bg.png -------------------------------------------------------------------------------- /css/img/glyphicons-halflings-white.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/css/img/glyphicons-halflings-white.png -------------------------------------------------------------------------------- /css/img/glyphicons-halflings.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/css/img/glyphicons-halflings.png -------------------------------------------------------------------------------- /file.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /fileinfo.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /filespider.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /html/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/html/.DS_Store -------------------------------------------------------------------------------- /html/login.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | <?php echo soft_name?> 18 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 |
    51 | 52 |
    53 |
    54 |
    55 |
    56 |
    57 |
    58 |
    TideSec安全团队分布式Web漏洞扫描系统
    59 |
    60 | 61 |
    62 |
    63 |
    64 |

    Please sign in


    65 |

    用户名:

    66 | 67 |
    68 |

    密   码:

    69 | 70 | 71 |
    72 | 75 |
    76 | 77 |
    78 |
    79 | 80 |
    81 | 82 |
    83 |
    84 |
    85 |
    86 |
    87 | 107 | 108 | 109 | 110 | 111 | -------------------------------------------------------------------------------- /images/ewm.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/ewm.png -------------------------------------------------------------------------------- /images/logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/logo.png -------------------------------------------------------------------------------- /images/pic1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic1.jpg -------------------------------------------------------------------------------- /images/pic10.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic10.jpg -------------------------------------------------------------------------------- /images/pic11.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic11.jpg -------------------------------------------------------------------------------- /images/pic12.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic12.jpg -------------------------------------------------------------------------------- /images/pic13.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic13.jpg -------------------------------------------------------------------------------- /images/pic14.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic14.jpg -------------------------------------------------------------------------------- /images/pic14_1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic14_1.jpg -------------------------------------------------------------------------------- /images/pic14_2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic14_2.jpg -------------------------------------------------------------------------------- /images/pic15.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic15.jpg -------------------------------------------------------------------------------- /images/pic16.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic16.jpg -------------------------------------------------------------------------------- /images/pic17.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic17.jpg -------------------------------------------------------------------------------- /images/pic18.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic18.jpg -------------------------------------------------------------------------------- /images/pic2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic2.jpg -------------------------------------------------------------------------------- /images/pic3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic3.jpg -------------------------------------------------------------------------------- /images/pic4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic4.jpg -------------------------------------------------------------------------------- /images/pic5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic5.jpg -------------------------------------------------------------------------------- /images/pic6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic6.jpg -------------------------------------------------------------------------------- /images/pic7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic7.jpg -------------------------------------------------------------------------------- /images/pic8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic8.jpg -------------------------------------------------------------------------------- /images/pic9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/pic9.jpg -------------------------------------------------------------------------------- /images/vul_cn.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/vul_cn.jpg -------------------------------------------------------------------------------- /images/zjwf.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/images/zjwf.png -------------------------------------------------------------------------------- /include/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/include/.DS_Store -------------------------------------------------------------------------------- /include/IExcel.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/include/IExcel.php -------------------------------------------------------------------------------- /include/XmlExcel.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/include/XmlExcel.php -------------------------------------------------------------------------------- /include/config.inc.php: -------------------------------------------------------------------------------- 1 |  -------------------------------------------------------------------------------- /include/ip.conf: -------------------------------------------------------------------------------- 1 | |testphp.vulnweb.com|testphp.vulnweb.com|10.211.55.2 -------------------------------------------------------------------------------- /include/sqlsafe.php: -------------------------------------------------------------------------------- 1 | |<|=|in|like)|\\/\\*.+?\\*\\/|<\\s*script\\b|\\bEXEC\\b|UNION.+?SELECT|UPDATE.+?SET|INSERT\\s+INTO.+?VALUES|(SELECT|DELETE).+?FROM|(CREATE|ALTER|DROP|TRUNCATE)\\s+(TABLE|DATABASE)"; 4 | private $postfilter = "\\b(and|or)\\b.{1,6}?(=|>|<|\\bin\\b|\\blike\\b)|\\/\\*.+?\\*\\/|<\\s*script\\b|\\bEXEC\\b|UNION.+?SELECT|UPDATE.+?SET|INSERT\\s+INTO.+?VALUES|(SELECT|DELETE).+?FROM|(CREATE|ALTER|DROP|TRUNCATE)\\s+(TABLE|DATABASE)"; 5 | private $cookiefilter = "\\b(and|or)\\b.{1,6}?(=|>|<|\\bin\\b|\\blike\\b)|\\/\\*.+?\\*\\/|<\\s*script\\b|\\bEXEC\\b|UNION.+?SELECT|UPDATE.+?SET|INSERT\\s+INTO.+?VALUES|(SELECT|DELETE).+?FROM|(CREATE|ALTER|DROP|TRUNCATE)\\s+(TABLE|DATABASE)"; 6 | /** 7 | * 构造函数 8 | */ 9 | public function __construct() { 10 | //echo "hi"; 11 | foreach($_GET as $key=>$value){$this->stopattack($key,$value,$this->getfilter);} 12 | foreach($_POST as $key=>$value){$this->stopattack($key,$value,$this->postfilter);} 13 | foreach($_COOKIE as $key=>$value){$this->stopattack($key,$value,$this->cookiefilter);} 14 | } 15 | /** 16 | * 参数检查并写日志 17 | */ 18 | public function stopattack($StrFiltKey, $StrFiltValue, $ArrFiltReq){ 19 | if(is_array($StrFiltValue))$StrFiltValue = implode($StrFiltValue); 20 | if (preg_match("/".$ArrFiltReq."/is",$StrFiltValue) == 1){ 21 | $this->writeslog($_SERVER["REMOTE_ADDR"]." ".strftime("%Y-%m-%d %H:%M:%S")." ".$_SERVER["PHP_SELF"]." ".$_SERVER["REQUEST_METHOD"]." ".$StrFiltKey." ".$StrFiltValue); 22 | echo('您提交的参数非法,系统已记录您的本次操作!'); 23 | exit(); 24 | } 25 | } 26 | /** 27 | * SQL注入日志 28 | */ 29 | public function writeslog($log){ 30 | $log_path = dirname(__FILE__).'\data\sqlinject_log.txt'; 31 | //echo $log_path; 32 | $ts = fopen($log_path,"a+"); 33 | fputs($ts,$log."\r\n"); 34 | fclose($ts); 35 | } 36 | } 37 | ?> -------------------------------------------------------------------------------- /include/vhost-demo.conf: -------------------------------------------------------------------------------- 1 | server { 2 | listen 8000; 3 | server_name #host#; 4 | 5 | location / { 6 | root html; 7 | index index.html index.htm; 8 | 9 | proxy_pass #url#; 10 | proxy_redirect off; 11 | proxy_set_header Host #host#; 12 | proxy_set_header X-Real-IP $remote_addr; 13 | proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; 14 | proxy_set_header Cookie "#cookie#"; 15 | } 16 | 17 | } 18 | -------------------------------------------------------------------------------- /index.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /js/action.js: -------------------------------------------------------------------------------- 1 | function cpasswd(){ 2 | 3 | if ( $('#newpasswd').val() == $('#repasswd').val() ) { 4 | 5 | //alert( $('#newpasswd').val() + $('#oldpasswd').val()); 6 | $.ajax({ 7 | type: "POST", 8 | url: "ajax.php?m=cpasswd", 9 | data: { oldpasswd: $('#oldpasswd').val() , newpasswd: $('#newpasswd').val() }, 10 | success: function(data) { alert(data); } 11 | }); 12 | } 13 | } 14 | 15 | function del(p){ 16 | 17 | //alert( p ); 18 | $.ajax({ 19 | type: "POST", 20 | url: "ajax.php?m=del", 21 | data: { hash : p }, 22 | success: function(data) { 23 | alert(data); 24 | window.location.reload(); 25 | } 26 | }); 27 | } 28 | 29 | 30 | function delcustomer(id){ 31 | 32 | $.ajax({ 33 | type: "POST", 34 | url: "ajax.php?m=delcustomer", 35 | data: { id : id }, 36 | success: function(data) { 37 | alert(data); 38 | window.location.reload(); 39 | } 40 | }); 41 | } 42 | 43 | function delinfo(id){ 44 | 45 | $.ajax({ 46 | type: "POST", 47 | url: "ajax.php?m=delinfo", 48 | data: { id : id }, 49 | success: function(data) { 50 | alert(data); 51 | window.location.reload(); 52 | } 53 | }); 54 | } 55 | 56 | function delall(id){ 57 | 58 | $.ajax({ 59 | type: "POST", 60 | url: "ajax.php?m=delall", 61 | data: { id : id }, 62 | success: function(data) { 63 | alert(data); 64 | window.location.reload(); 65 | } 66 | }); 67 | } 68 | 69 | function delspider(id){ 70 | 71 | $.ajax({ 72 | type: "POST", 73 | url: "ajax.php?m=delspider", 74 | data: { id : id }, 75 | success: function(data) { 76 | alert(data); 77 | window.location.reload(); 78 | } 79 | }); 80 | } 81 | 82 | function resetall(id){ 83 | 84 | $.ajax({ 85 | type: "POST", 86 | url: "ajax.php?m=resetall", 87 | data: { id : id }, 88 | success: function(data) { 89 | alert(data); 90 | window.location.reload(); 91 | } 92 | }); 93 | } 94 | function resetscan(id){ 95 | 96 | $.ajax({ 97 | type: "POST", 98 | url: "ajax.php?m=resetscan", 99 | data: { id : id }, 100 | success: function(data) { 101 | alert(data); 102 | window.location.reload(); 103 | } 104 | }); 105 | } 106 | function resetspider(id){ 107 | 108 | $.ajax({ 109 | type: "POST", 110 | url: "ajax.php?m=resetspider", 111 | data: { id : id }, 112 | success: function(data) { 113 | alert(data); 114 | window.location.reload(); 115 | } 116 | }); 117 | } 118 | function resetinfo(id){ 119 | 120 | $.ajax({ 121 | type: "POST", 122 | url: "ajax.php?m=resetinfo", 123 | data: { id : id }, 124 | success: function(data) { 125 | alert(data); 126 | window.location.reload(); 127 | } 128 | }); 129 | } 130 | 131 | 132 | function search11(id){ 133 | 134 | $.ajax({ 135 | type: "POST", 136 | url: "ajax.php?m=search11", 137 | data: { id : id }, 138 | success: function(data) { 139 | alert(data); 140 | //window.location.reload(); 141 | } 142 | }); 143 | } 144 | 145 | function exportreport(p){ 146 | window.location.href = 'ajax.php?m=export&hash=' + p; 147 | } -------------------------------------------------------------------------------- /js/html5shiv.js: -------------------------------------------------------------------------------- 1 | /* 2 | HTML5 Shiv v3.6.2 | @afarkas @jdalton @jon_neal @rem | MIT/GPL2 Licensed 3 | */ 4 | (function(l,f){function m(){var a=e.elements;return"string"==typeof a?a.split(" "):a}function i(a){var b=n[a[o]];b||(b={},h++,a[o]=h,n[h]=b);return b}function p(a,b,c){b||(b=f);if(g)return b.createElement(a);c||(c=i(b));b=c.cache[a]?c.cache[a].cloneNode():r.test(a)?(c.cache[a]=c.createElem(a)).cloneNode():c.createElem(a);return b.canHaveChildren&&!s.test(a)?c.frag.appendChild(b):b}function t(a,b){if(!b.cache)b.cache={},b.createElem=a.createElement,b.createFrag=a.createDocumentFragment,b.frag=b.createFrag(); 5 | a.createElement=function(c){return!e.shivMethods?b.createElem(c):p(c,a,b)};a.createDocumentFragment=Function("h,f","return function(){var n=f.cloneNode(),c=n.createElement;h.shivMethods&&("+m().join().replace(/\w+/g,function(a){b.createElem(a);b.frag.createElement(a);return'c("'+a+'")'})+");return n}")(e,b.frag)}function q(a){a||(a=f);var b=i(a);if(e.shivCSS&&!j&&!b.hasCSS){var c,d=a;c=d.createElement("p");d=d.getElementsByTagName("head")[0]||d.documentElement;c.innerHTML="x"; 6 | c=d.insertBefore(c.lastChild,d.firstChild);b.hasCSS=!!c}g||t(a,b);return a}var k=l.html5||{},s=/^<|^(?:button|map|select|textarea|object|iframe|option|optgroup)$/i,r=/^(?:a|b|code|div|fieldset|h1|h2|h3|h4|h5|h6|i|label|li|ol|p|q|span|strong|style|table|tbody|td|th|tr|ul)$/i,j,o="_html5shiv",h=0,n={},g;(function(){try{var a=f.createElement("a");a.innerHTML="";j="hidden"in a;var b;if(!(b=1==a.childNodes.length)){f.createElement("a");var c=f.createDocumentFragment();b="undefined"==typeof c.cloneNode|| 7 | "undefined"==typeof c.createDocumentFragment||"undefined"==typeof c.createElement}g=b}catch(d){g=j=!0}})();var e={elements:k.elements||"abbr article aside audio bdi canvas data datalist details figcaption figure footer header hgroup main mark meter nav output progress section summary time video",version:"3.6.2",shivCSS:!1!==k.shivCSS,supportsUnknownElements:g,shivMethods:!1!==k.shivMethods,type:"default",shivDocument:q,createElement:p,createDocumentFragment:function(a,b){a||(a=f);if(g)return a.createDocumentFragment(); 8 | for(var b=b||i(a),c=b.frag.cloneNode(),d=0,e=m(),h=e.length;d1){return;}g.preventDefault();var i=g.originalEvent.changedTouches[0],f=document.createEvent("MouseEvents");f.initMouseEvent(h,true,true,window,1,i.screenX,i.screenY,i.clientX,i.clientY,false,false,false,false,0,null);g.target.dispatchEvent(f);}c._touchStart=function(g){var f=this;if(a||!f._mouseCapture(g.originalEvent.changedTouches[0])){return;}a=true;f._touchMoved=false;d(g,"mouseover");d(g,"mousemove");d(g,"mousedown");};c._touchMove=function(f){if(!a){return;}this._touchMoved=true;d(f,"mousemove");};c._touchEnd=function(f){if(!a){return;}d(f,"mouseup");d(f,"mouseout");if(!this._touchMoved){d(f,"click");}a=false;};c._mouseInit=function(){var f=this;f.element.bind("touchstart",b.proxy(f,"_touchStart")).bind("touchmove",b.proxy(f,"_touchMove")).bind("touchend",b.proxy(f,"_touchEnd"));e.call(f);};})(jQuery); -------------------------------------------------------------------------------- /proxy-ip.php: -------------------------------------------------------------------------------- 1 | query($sql); 25 | 26 | if (mysql_num_rows($results) > 0){ 27 | $i = 1; 28 | while ($fs = $db->fetch_array($results)) 29 | { 30 | 31 | echo $fs["0"]; 32 | echo '
    '; 33 | $i ++; 34 | }} 35 | #print $html_str; 36 | else{ 37 | print "False";} 38 | 39 | ?> 40 | 41 | 42 | -------------------------------------------------------------------------------- /proxy.php: -------------------------------------------------------------------------------- 1 | query($sql); 27 | 28 | if (mysql_num_rows($results) > 0) { 29 | $i = 1; 30 | while ($fs = $db->fetch_array($results)) { 31 | 32 | $id = $i; 33 | $ip = $fs["0"]; 34 | $test_times = $fs["1"]; 35 | $failure_times = $fs["2"]; 36 | $response_time = $fs["4"]; 37 | $score = $fs["5"]; 38 | 39 | $html_str .= " 40 | 41 | 42 | $id 43 | 44 | 45 |
    $ip 46 | 47 | 48 | $test_times 49 | 50 | 51 | $failure_times 52 | 53 | 54 | $response_time 55 | 56 | 57 | $score 58 | 59 | 60 | 61 | 刷新|删除 62 | 63 | \r\n"; 64 | $i++; 65 | } 66 | return $html_str; 67 | } 68 | else { 69 | print "False"; 70 | } 71 | #include("html/proxy.html"); 72 | } 73 | ?> 74 | 75 | 76 | -------------------------------------------------------------------------------- /readme.txt: -------------------------------------------------------------------------------- 1 | WDScanner开发日志 2 | 3 | 、网站敏感字检索、暗链检索、存储网页快照 4 | 5 | v1.9(2017.08.22) 6 | 网页链接搜集、动态URL搜集 7 | 完善了CMS的识别; 8 | 9 | v1.8(2017.08.20) 10 | 完善信息收集模块,如端口扫描、子域名扫描、网站指纹识别,waf探测等; 11 | 对漏洞结果的显示进行了优化; 12 | 13 | v1.7(2017.08.17) 14 | 添加专项脚本检测模块,具体实现有待完善; 15 | 16 | v1.6(2017.08.14) 17 | 添加了代理模块,下一步计划将代理用于扫描任务。 18 | 19 | v1.5(2017.08.13) 20 | 添加了客户管理模块,将各网站进行客户归类,添加联系人、服务期限、服务类型、扫描周期等; 21 | 22 | v1.4(2017.08.11) 23 | 添加了控制中心和检索中心,可按关键字对网站或网站技术进行检索; 24 | 检索中心耗费了不少的时间和精力。 25 | 26 | v1.3(2017.08.08) 27 | 对扫描结果的XML解析进行了重新完善; 28 | 报告导出功能出现异常,暂未解决。 29 | 30 | v1.2(2017.08.06) 31 | 添加了信息收集和网站爬虫模块; 32 | 为方便检索,重新设计了数据库结构。 33 | 34 | v1.1(2017.07.29) 35 | 扫描模块添加了扫描周期、实现定期自动扫描。 36 | 37 | v1.0(2017.07.23) 38 | 完善了登录界面和主界面,仅限于火狐下的显示效果; 39 | 完善用户登录、操作、用户权限; 40 | 41 | v0.1(2017.07.18) 42 | 完成扫描的核心,使用了部分secscanner的扫描结果,融合了w3af和awvs的扫描结果; 43 | 设置了扫描节点,可实现分布式扫描; 44 | 完善了系统管理和用户权限分离机制。 -------------------------------------------------------------------------------- /report/0ddf68dcf63e0cc39aed76cd96d5773d/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/0ddf68dcf63e0cc39aed76cd96d5773d/scan-results.wvs -------------------------------------------------------------------------------- /report/0ddf68dcf63e0cc39aed76cd96d5773d/wvs_log_2019031916004400.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/0ddf68dcf63e0cc39aed76cd96d5773d/wvs_log_2019031916004400.csv -------------------------------------------------------------------------------- /report/358066961ec043941983855238c65619/export.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | -------------------------------------------------------------------------------- /report/358066961ec043941983855238c65619/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/358066961ec043941983855238c65619/scan-results.wvs -------------------------------------------------------------------------------- /report/36f0ec6fe6399491ed166c2132493e0b/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/36f0ec6fe6399491ed166c2132493e0b/scan-results.wvs -------------------------------------------------------------------------------- /report/36f0ec6fe6399491ed166c2132493e0b/wvs_log_2019051514483300.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/36f0ec6fe6399491ed166c2132493e0b/wvs_log_2019051514483300.csv -------------------------------------------------------------------------------- /report/45c20358adc310212646795fc0986a3e/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/45c20358adc310212646795fc0986a3e/scan-results.wvs -------------------------------------------------------------------------------- /report/6560689483f8fd7793b67ce4f79803b9/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/6560689483f8fd7793b67ce4f79803b9/scan-results.wvs -------------------------------------------------------------------------------- /report/8058d809b01005a65e3f3359b21de527/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/8058d809b01005a65e3f3359b21de527/scan-results.wvs -------------------------------------------------------------------------------- /report/8058d809b01005a65e3f3359b21de527/wvs_log_2019031915583600.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/8058d809b01005a65e3f3359b21de527/wvs_log_2019031915583600.csv -------------------------------------------------------------------------------- /report/9b20620a18e0ef7f542a1ef51ffa7b96/export.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | -------------------------------------------------------------------------------- /report/9b20620a18e0ef7f542a1ef51ffa7b96/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/9b20620a18e0ef7f542a1ef51ffa7b96/scan-results.wvs -------------------------------------------------------------------------------- /report/da12fdc291fdc06b67455a640a865d93/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/da12fdc291fdc06b67455a640a865d93/scan-results.wvs -------------------------------------------------------------------------------- /report/da12fdc291fdc06b67455a640a865d93/wvs_log_2019051514483300.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/da12fdc291fdc06b67455a640a865d93/wvs_log_2019051514483300.csv -------------------------------------------------------------------------------- /report/da7acffdbc450ed7a04e6ccf20fb5c82/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/da7acffdbc450ed7a04e6ccf20fb5c82/scan-results.wvs -------------------------------------------------------------------------------- /report/ec1d0085488097c51c6e433520b2cc5b/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/ec1d0085488097c51c6e433520b2cc5b/scan-results.wvs -------------------------------------------------------------------------------- /report/ec1d0085488097c51c6e433520b2cc5b/wvs_log_2019051514381500.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/ec1d0085488097c51c6e433520b2cc5b/wvs_log_2019051514381500.csv -------------------------------------------------------------------------------- /report/fcee4c56499a9d717304040dbf2e2590/scan-results.wvs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/fcee4c56499a9d717304040dbf2e2590/scan-results.wvs -------------------------------------------------------------------------------- /report/fcee4c56499a9d717304040dbf2e2590/wvs_log_2017093005184300.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/report/fcee4c56499a9d717304040dbf2e2590/wvs_log_2017093005184300.csv -------------------------------------------------------------------------------- /taskinfo.php: -------------------------------------------------------------------------------- 1 | query($sql); 8 | if (mysql_num_rows($results) > 0){ 9 | $i = 1; 10 | while ($fs = $db->fetch_array($results)) 11 | { 12 | $url = $fs['url']; 13 | $hash = $fs['hash']; 14 | $status = $fs['status']; 15 | //echo '----'; 16 | //echo $url; 17 | 18 | if ( $status =='ing' ){ 19 | //echo $hash; 20 | //echo '22'; 21 | // $sql = "select * from `info` where status='ing'"; 22 | // $sf = $db->fetch_assoc($sql); 23 | $get_hash = $hash; 24 | //$get_hash = '55984d6dd7d1496e7a347a7ec56eb623'; 25 | // echo $get_hash; 26 | if (!empty($get_hash)) { 27 | $url = "http://127.0.0.1/fileinfo.php?p=$get_hash"; 28 | //echo $url; 29 | $info_data = file_get_contents($url); 30 | //echo $info_data; 31 | 32 | if ($info_data != 'null'){ 33 | $up_arr = array(); 34 | // $info_data = iconv("gb2312","utf-8//IGNORE",$info_data); 35 | //echo $info_data; 36 | if ($json_data = json_decode($info_data, true)) { 37 | } else { 38 | $info_data = iconv("gb2312", "utf-8//IGNORE", $info_data); 39 | $json_data = json_decode($info_data, true); 40 | } 41 | // echo $json_data['domain_info']; 42 | //$up_arr['hash'] = $get_hash; 43 | $up_arr['ip'] = $json_data['ip']; 44 | // echo $up_arr['ip']; 45 | $up_arr['port_num'] = $json_data['port_num']; 46 | $up_arr['port'] = addslashes($json_data['port_info']); 47 | $up_arr['sub_num'] = $json_data['domain_num']; 48 | $up_arr['sub'] = $json_data['domain_info']; 49 | $up_arr['cms'] = $json_data['whatcms_text']; 50 | $up_arr['waf'] = $json_data['waf']; 51 | $up_arr['os'] = $json_data['os']; 52 | $up_arr['os_info'] = addslashes($json_data['os_info']); 53 | $up_arr['whatweb_info'] = addslashes($json_data['whatweb_text']); 54 | $up_arr['language'] = $json_data['xpb']; 55 | $up_arr['middleware'] = $json_data['httpserver']; 56 | $up_arr['weakfile_num'] = $json_data['weakfile_num']; 57 | $up_arr['weakfile'] = addslashes($json_data['weakfile']); 58 | // $up_arr['other'] = implode('#',$json_data); 59 | $up_arr['status'] = 'ok'; 60 | $up_arr['title'] = $json_data['title']; 61 | // print $json_data['title']; 62 | $insert = $db->update("info", $up_arr, "hash='{$get_hash}'"); 63 | }else if ($info_data == 'null'){ 64 | //print "aa"; 65 | continue; 66 | } 67 | } 68 | }else if ( $status =='new' ){ 69 | //echo '11'; 70 | $up_arr1 = array(); 71 | $up_arr1['status'] = 'ing'; 72 | $scan_arr['target_url'] = $url; 73 | $scan_arr['hash'] = $hash; 74 | //echo json_encode($scan_arr); 75 | 76 | echo base64_encode(json_encode($scan_arr)); 77 | 78 | $update = $db->update('info',$up_arr1,"status='new' and hash='{$hash}'"); 79 | exit(0); 80 | } 81 | } 82 | } 83 | 84 | 85 | ?> -------------------------------------------------------------------------------- /taskspider.php: -------------------------------------------------------------------------------- 1 | query($sql); 8 | if (mysql_num_rows($results) > 0){ 9 | $i = 1; 10 | while ($fs = $db->fetch_array($results)) 11 | { 12 | $url = $fs['url']; 13 | $siteuser = $fs['siteuser']; 14 | $sitepwd = $fs['sitepwd']; 15 | $hash = $fs['hash']; 16 | $check_status = $fs['check_status']; 17 | 18 | if ( $check_status =='ing' ) { 19 | $get_hash = $hash; 20 | if (!empty($get_hash)) { 21 | $url = "http://127.0.0.1/filespider.php?p=$get_hash"; 22 | // echo $url; 23 | //check_url($url, $get_hash); 24 | $spider_data = file_get_contents($url); 25 | if ($spider_data != 'null'){ 26 | check_url($url, $get_hash); 27 | }else if ($spider_data == 'null'){ 28 | //print "aa"; 29 | continue; 30 | } 31 | } 32 | }else if ( $check_status =='new' ){ 33 | $up_arr['check_status'] = 'ing'; 34 | //$hash = '4fd615f4a8c0eb8e7889a003587ae222'; 35 | $sql1 = "select url_all,url from spider where hash = '$hash'"; 36 | $results1 = $db->query($sql1); 37 | echo $hash."
    "; 38 | if (mysql_num_rows($results1) > 0){ 39 | while ($fs1 = $db->fetch_array($results1)){ 40 | echo $fs1[1]."
    ".$fs1[0]; 41 | if ($fs1[0] = '
    '){ 42 | echo $fs1[1]; 43 | } 44 | } 45 | } 46 | $update = $db->update('spider',$up_arr,"hash='{$hash}'"); 47 | exit(0); 48 | } 49 | } 50 | } 51 | 52 | ?> -------------------------------------------------------------------------------- /wdscanner.sql.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TideSec/WDScanner/aebfddd4eb2d4f719b56a798f3ff196302baa55e/wdscanner.sql.zip --------------------------------------------------------------------------------