Äú¿ÉÒÔ¾èÖú£¬Ö§³ÖÎÒÃǵĹ«ÒæÊÂÒµ¡£

1Ôª 10Ôª 50Ôª





ÈÏÖ¤Â룺  ÑéÖ¤Âë,¿´²»Çå³þ?Çëµã»÷Ë¢ÐÂÑéÖ¤Âë ±ØÌî



  ÇóÖª ÎÄÕ ÎÄ¿â Lib ÊÓÆµ iPerson ¿Î³Ì ÈÏÖ¤ ×Éѯ ¹¤¾ß ½²×ù Model Center   Code  
»áÔ±   
   
 
     
   
 ¶©ÔÄ
  ¾èÖú
°×»°ÎïÁªÍø°²È«£¨¶þ£©£ºÎïÁªÍøµÄ°²È«¼ì²â
 
×÷Õߣº´óÅÖ
  2368  次浏览      27
2020-4-8
 
±à¼­ÍƼö:
±¾ÎÄÖ÷Òª´ÓÒ»¸öIOT©¶´×Ô¶¯»¯ÀûÓù¤¾ßAutoSploit½²Æð£¬½²µ½ÎÒÃǸÃÈçºÎ¼ì²âÎÒÃdz£¼ûµÄÎïÁªÍø´æÔڵݲȫÎÊÌ⣬ϣÍû¶ÔÄúÄÜÓÐËù°ïÖú¡£
±¾ÎÄÀ´×ÔÓÚCSDN£¬ÓÉ»ðÁú¹ûÈí¼þAlice±à¼­ÍƼö¡£

ÎÒÃÇÕâ´Î˵°²È«¼ì²â£¬´ÓÒµÎñ²ãÏÈ¿ªÊ¼£¬È»ºó½µµ½¸ÐÖª²ã£¬È»ºóÌáµ½ÍøÂç²ãµÄÊÚȨºÍ°²È«²ßÂÔ£¬ËùÒÔÏȽéÉÜϹ¤¾ßAutoSploit£¬AutoSploit»ùÓÚ Python2.7µÄ½Å±¾£¬Ê¹Óà Shodan.io API ×Ô¶¯ÊÕ¼¯Ä¿±ê£¬MetasploitÄ£¿éÓÐÖúÓÚʵʩԶ³Ì´úÂëÖ´ÐУ¬²¢»ñµÃÄæÏò TCP/Shells »òÕßMetasploit ¶Ô»°£¨¹Ù·½½éÉÜ£¬Êµ¼ÊÉÏÓÃShodanµÄAPIÃâ·ÑµÄÖ»ÓÐÄǼ¸Ò³£©¡£

GitHubµØÖ·£ºhttps://github.com/NullArray/AutoSploit

ÎÒÃÇÏȰ²×°Ò»Ï£¬¸ãÒ»¸ö²âÊÔ£º

°²×°»·¾³£ºkail2.0¡¢Python 2.7

°²×°²½Ö裺

1£ºÏÂÔØÎļþ git clone https://github.com/NullArray/AutoSploit.git

2£ºÖ´ÐÐinstall.sh °²×°

3£ºÒòΪAutoSploit°²×°ÐèÒªpythonµÄ¿âÎļþÖ§³Ö£¬¸ÃÎļþÒѾ­Ð´ºÃÁË£¬ÔÚĿ¼ÏµÄrequirentx.txtÎļþ£¬Ö±½Ópip°²×°¼´¿É¡£

4£º°²×°ÍêÁËÎÒÃÇÖ±½ÓÖ´ÐÐ python autosploit.py¡£

5£º¿ªÊ¼×öÑ¡ÔñÌ⣬һ°ãÖ±½ÓÑ¡µÚÒ»¸ö¡£

6£ºÑ¡ÔñÊÕ¼¯Ö÷»ú£¬Ñ¡Ôñ×Ô¼ºÐèÒªµÄ¹Ø¼ü´Ê¡£

7£ºÈ»ºóÊÕ¼¯Ò»»á£¬Ñ¡Ôñ6£¬ÀûÓÃMSFÄ£¿é½øÐÐÊÕ¼¯ÐÅÏ¢¡£

ÉÏÃæ¾ÍÊÇÕâ¸ö¹¤¾ß°²×°ºÍʹÓ÷½·¨£¬ÎªÊ²Ã´ÎÒÃÇÒª°ÑÕâ¸ö¹¤¾ßAutoSploitµ¥¶ÀÀ­³öÀ´Ëµ£¬ÊÇÒòΪËû°Ñ³£¼ûµÄIOTµÄ©¶´´ÓMSFÖÐÀ­Á˳öÀ´£¬ÌṩÁË285³£¼ûµÄÈÝÒ×ÀûÓõIJå¼þ£¬ÔÛÃÇÀ´ËµËµIOTµÄ°²È«¼ì²â£¬×î»ù´¡Òª¼ì²éʲô¶«Î÷¡£

AutoSploitµÄ285¸öMSF²å¼þ°üÀ¨259¸öexp£¬26¸ö¸¨Öú²å¼þ£¬ÆäÖÐ259¸öexp°üÀ¨ÁË61¸öwindows²å¼þ£¬61¸öLinux²å¼þ£¬96¸ömulti²å¼þ£¬37¸öunix²å¼þ£¬4¸öÆäËûÀàÐͲå¼þ¡£´Ó·ÖÀàÉÏÀ´½²£¬Ö÷Òª¼¯ÖÐÔÚÒµÎñϵͳ²úÉú©¶´£¨Öмä¼þ£¬Ó¦Óñ¾Éí£¬Êý¾Ý¿â£©£¬Ö÷Òª²úÉúÔÚhttp/httpsЭÒéÉÏ¡£

ÄÇôÎÒÃÇÕûÀíÇå³þÁË£¬¶ÔÒµÎñ²ãÀ´Ëµ£¬ÈÝÒ×ÀûÓò¢ÇÒÄܹ¹³ÉÖØ´óΣº¦µÄ°²È«ÎÊÌ⣬Óֻع鵽ÎÒÃdz£ËµµÄÒµÎñϵͳ°²È«ÎÊÌ⣨Ö÷ÒªÒÀ¾Ý2017ÄêCNVDÊÕ¼IOTÉ豸©¶´È¨ÏÞÈÆ¹ý¡¢¾Ü¾ø·þÎñ¡¢ÐÅϢй¶¡¢¿çÕ¾¡¢ÃüÁîÖ´ÐС¢»º³åÇøÒç³ö¡¢SQL×¢Èë¡¢Èõ¿ÚÁî¡¢Éè¼ÆÈ±ÏݵÈ©¶´£©£¬¶ÔÕâÒ»²ã´ÎÀ´Ëµ£¬É¨ÃèÆ÷£¬¼à¿ØÔ¤¾¯µÈµÈÀûÓòâÊÔ·½·¨½â¾ö³£¼ûµÄÖ±½ÓÀûÓõݲȫÎÊÌâµÄ·½·¨¶¼ÒѾ­ºÜ³ÉÊìÁË£¬ÉÌÓÃɨÃèÆ÷£¬¿ªÔ´É¨ÃèÆ÷Ò»°ã¶¼Äܼì²é²âÊÔ£¬Í¬Àí¿ÉÍÆ£¬ÎÒÃÇ×÷Ϊ°²È«ÔËάµÄ´óÖÂÄÚÈÝÈçÏ£¬ÎÒÕÒÁËÕÅ˼άµ¼Í¼£º

ÄÇô¶ÔÓÚÎïÁªÍøÀ´Ëµ£¬½ö½ö¼ì²âÁËÒµÎñ²ãµÄ¶«Î÷ÊÇÔ¶Ô¶²»¹»µÄ£¬ÄÇôÎÒÃÇ»¹Òª¶ÔÍøÂç²ãºÍ¸ÐÖª²ã½øÐа²È«¼ì²â£¬Õâʱºò¾Í²»µÃÌá¼°Ò»ÏÂÎïÁªÍøµÄ°²È«¼Ü¹¹£¬ºê¹Û½Ç¶È£¨Éæ¼°·¶Î§¹ã£¬º­¸ÇÈ«²¿ÎïÁªÍøÌåϵ£©ÉÏÀ´Ëµ£¬·ÖΪÁËËĸö´ó¿é£º

ÈÏÖ¤ £¨Authentication£©£ºÌṩÑéÖ¤ÎïÁªÍøÊµÌåµÄ±êʶÐÅÏ¢²¢ÓÃÓÚÑéÖ¤¡£

ÊÚȨ £¨Authorization£©£º¿ØÖÆÉ豸ÔÚÕû¸öÍøÂç½á¹¹ÖеķÃÎÊÊÚȨ¡£

Ç¿ÖÆÐԵݲȫ²ßÂÔ £¨Network Enforced Policy£©£º°üÀ¨ÔÚ»ù´¡¼Ü¹¹Éϰ²È«µØroute²¢´«Êä¶ËµãÁ÷Á¿µÄËùÓÐÔªËØ£¬ÎÞÂÛÊÇ¿ØÖƲãÃæ¡¢¹ÜÀí²ãÃæ»¹ÊÇʵ¼ÊÊý¾ÝÁ÷Á¿Öеģ¬Ôٴλù´¡ÉÏÔËÓúÏÊʵݲȫ²ßÂÔ¡£

°²È«·ÖÎö£º¿É¼ûÐÔÓë¿É¿ØÐÔ £¨Secure Analytics: Visibility and Control£©£º°²È«·ÖÎö²ãÈ·¶¨ÁËËùÓÐÔªËØ£¨¶ËµãºÍÍøÂç»ù´¡ÉèÊ©£¬°üÀ¨Êý¾ÝÖÐÐÄ£©¿ÉÄܲÎÓëµÄ·þÎñ£¬Ìṩң¸Ð¿±²â£¬ÊµÏֿɼûÐÔ²¢×îÖÕ¿ØÖÆÎïÁªÍøÉú̬ϵͳ¡£

ÎÒÃÇÏÖÔÚÊÇ´ÓÍâÏòÀï¿´£¬ÏÖ½×¶ÎÔÚÓ¦Óòã½â¾öµÄÎÊÌ⣬ÆäʵÊÇÊôÓÚÔÚ΢¹Û½Ç¶ÈÉϽâ¾öÁËIOTÔÚÒµÎñ²ã²¿·Ö°²È«·ÖÎöµÄÊÂÇ飬ÏÖÔÚҪ˵Çå³þ¸ÐÖª²ãºÍÍøÂç²ã°²È«¼ì²â£¬Ê×ÏÈÒª×öµÄ£¬¾ÍÊǼì²âÈÏÖ¤£¬ÒòΪÎïÁªÍøµÄÄ©¶ËÉ豸ÈÏÖ¤¸ü¶àÒÀ¿¿ÉäÆµÊ¶±ð£¨RFID£©¡¢¹²ÏíÃÜÔ¿¡¢X.509Ö¤Êé¡¢¶ËµãµÄMACµØÖ·»òijÖÖÀàÐ͵ĻùÓÚ²»¿É±äÓ²¼þµÄ¿ÉÐÅroot£¬¼ÓÉϼ«ÉÙÊýµÄÈËΪÈÏÖ¤£¨ÈçÓû§Ãû¡¢ÃÜÂë¡¢ÁîÅÆ»òÉúÎïÌØÕ÷£©£¬ÎÒÃÇÔÚ×ö¼ì²âµÄʱºò£¬ÏÈÈ·¶¨Ä©¶ËÉ豸µÄÉí·ÝÐÅÏ¢ÊÇ·ñÔÚµ¥Ò»ÊÚȨµÄÇé¿öÏ¿ÉÒÔ½øÐзÃÎÊ£¬ÊÇ·ñ¿ª·ÅÉí·ÝÐÅÏ¢£¬Éí·ÝÐÅÏ¢ÊÇ·ñ¿ÉÒÔαÔ죬Éí·ÝÐÅÏ¢ÊÇ·ñ×㹻ǿ׳¡£ ¸ÐÖª²ã³ýÁ˵¥Ò»É豸ÈÏÖ¤ÃæÁÙµÄÎÊÌ⣬¸ÐÖª²ã»¹ÓÐÒ»¸öºÜÍ·ÌÛµÄÌØµã£ºÊýÁ¿¾Þ´ó£¬²¢ÇÒÆÕ±é´æÔÚÒÆ¶¯ÐÔ¡£Õâ¾Íµ¼ÖÂÁËÒ»¸ö´óÎÊÌ⣬×ʲúÊáÀí£¨×ʲú×·×ٺ͹ÜÀí£©³ÉΪÁË¿¨ÔÚ¶Ô¸ÐÖª²ã°²È«¼ì²âµÄµÚÒ»µÀÃż÷¡£

ÄÇÎÒÃÇ×öÒ»¸ö¼òµ¥µÄÉè¼Æ£¬¸ù¾ÝÎïÁªÍø½ÓÈëÉ豸µÄÒªÇó£¬ÏÈÊáÀí×ʲú£¨¹«ÍøµÄÖ±½ÓÕÒÖ¸ÎÆÓÃAutoSploitÈ¥ÅÜ£©£¬ÔÚ¶Ô×ʲú½øÐйÜÀí¡£

ÄÇôIOT¸ÐÖª²ãµÄÈçºÎÕûÀí×ʲúºÍ¼ì²â£¬ÎÒÃÇÓÃÒ»¸ö¼òµ¥µÄÁ÷³ÌͼÍê³ÉÁË˼·£¬ºËÐĵÄIOT©¶´µÄ¹æÔò¿â£¬º£¿µÍþÊÓIPÉãÏñ»úȨÏÞÈÆ¹ýCVE2017-7921£¬CVE-2017-7923ΪÀý£¬´úÂëÎļþÈçÏ£º

if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.140373");
script_version("$Revision: 7182 $");
script_tag(name: "last_modification", value: "$Date: 2017-09-19 07:44:15 +0200 (Tue, 19 Sep 2017) $");
script_tag(name: "creation_date", value: "2017-09-18 11:41:11 +0700 (Mon, 18 Sep 2017)");
script_tag(name: "cvss_base", value: "7.5");
script_tag(name: "cvss_base_vector", value: "AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_cve_id("CVE-2017-7921", "CVE-2017-7923");
script_tag(name: "qod_type", value: "exploit");
script_tag(name: "solution_type", value: "VendorFix");
script_name("Hikvision IP Cameras Multiple Vulnerabilities");
script_category(ACT_GATHER_INFO);
script_copyright("This script is Copyright (C) 2017 Greenbone Networks GmbH");
script_family("Web application abuses");
script_dependencies("gb_get_http_banner.nasl");
script_mandatory_keys("App-webs/banner");
script_require_ports("Services/www", 443);
script_tag(name: "summary", value: "Multiple Hikvision IP cameras are prone to multiple vulnerabilities.");
script_tag(name: "vuldetect", value: "Sends a crafted HTTP GET request and checks the response.");
script_tag(name: "insight", value: "Multiple Hikvision IP cameras are prone to multiple vulnerabilities:
- Improper authentication vulnerability (CVE-2017-7921)
- Password in configuration file (CVE-2017-7923)");
script_tag(name: "impact", value: "Successful exploitation of these vulnerabilities could lead to a malicious
attacker escalating his or her privileges or assuming the identity of an authenticated user and obtaining
sensitive data.");
script_tag(name: "affected", value: "Hikvision reports that the following cameras and versions are affected:
- DS-2CD2xx2F-I Series: V5.2.0 build 140721 to V5.4.0 build 160530
- DS-2CD2xx0F-I Series: V5.2.0 build 140721 to V5.4.0 Build 160401
- DS-2CD2xx2FWD Series: V5.3.1 build 150410 to V5.4.4 Build 161125
- DS-2CD4x2xFWD Series: V5.2.0 build 140721 to V5.4.0 Build 160414
- DS-2CD4xx5 Series: V5.2.0 build 140721 to V5.4.0 Build 160421
- DS-2DFx Series: V5.2.0 build 140805 to V5.4.5 Build 160928
- DS-2CD63xx Series: V5.0.9 build 140305 to V5.3.5 Build 160106");
script_tag(name: "solution", value: "See the referenced advisory for a solution.");
script_xref(name: "URL", value: "https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01");
script_xref(name: "URL", value: "http://www.hikvision.com/us/about_10807.html");
script_xref(name: "URL", value: "http://seclists.org/fulldisclosure/2017/Sep/23");
exit(0);
}
include("http_func.inc");
include("http_keepalive.inc");
port = get_http_port(default: 443);
url = '/Security/users?auth=YWRtaW46MTEK';
if (http_vuln_check(port: port, url: url, pattern: "<UserList version", check_header: TRUE,
extra_check: "<userName>")) {
report = "It was possible to obtain a list of device users at: " +
report_vuln_url(port: port, url: url, url_only: TRUE);
security_message(port: port, data: report);
exit(0);
}
exit(99);

Ò»¸ö¼òµ¥µÄ©¶´¼ì²âµÄ¹æÔòÎļþ¾ÍÕâÑù³ÉÐÍÁË¡£

ÄÇô¼ÌÐø½øÐмì²â£¬½ÓÏÂÀ´¼ì²âÍøÂç²ã£¬ÍøÂç²ãÔÚ°²È«Éè¼ÆÀïÃæÇ£³¶µ½ÊÚȨºÍÇ¿ÖÆÐԵݲȫ²ßÂÔ£¬Ò²¾ÍÊÇÎÒÃÇÔÚÍøÂç²ãµÄÃæÁٵĺËÐݲȫÎÊÌâÊÇûÓÐÒ»¸öÊÚȨ±ê×¼£¬Ã»ÓÐͨÓõÄͨÐÅЭÒ飬°²²»°²È«¾Í¿¿³§É̵ÄÁ¼ÐÄÁË¡£

ÍøÂç²ãÎÒÃÇÒª¼ì²âµÄÖ÷ÒªÊÇÍøÂçÉ豸±¾ÉíµÄ°²È«ÐÔ£¬´«Êä¹ý³ÌÖеÄÐÅÈÎÁ´¼°°²È«²ßÂÔ¡£

ÍøÂçÉ豸±¾Éí°²È«ÐÔÕâ¸öÏÖ½×¶ÎɨÃèÆ÷ºÜ¶à£¬ÂòÒ»¸ö»òÕßÍøÉÏÕÒÒ»¸öÆÆ½â°æµÄɨÃèÆ÷¶¼Äܹ»Âú×ãÐèÇó¡£

´«Êä¹ý³ÌÖеÄÐÅÈÎÁ´¼°°²È«²ßÂÔÖ»ÄÜÒ»ÌõÒ»ÌõÈ¥²éÁË£¬Ã»ÓкõŤ¾ß£¬²»Í¬¼¶±ðºÍ²ã´ÎµÄÒªÇó²»Í¬£¬ÕâÀï¾ÍÒ»Ò»ÁоÙÁË¡£

ÏÖ½×¶ÎÊÐÃæÉÏÎÒÔÝʱûÕÒµ½Õë¶ÔIoTÉ豸µÄ×Ô¶¯»¯°²È«²âÊÔ¹¤¾ß(³ÉÊìµÄ¸÷ÖÖ¹¦Äܶ¼ÓеÄɨÃèÆ÷)½áºÏÎÒ¶Ô¼ì²âµÄÀí½âдÁ˰׻°ÎïÁªÍøµÚ¶þƪÎÄÕ£¬°×»°ÈýÎÒÃÇ̸̸»ùÓÚÏÖ×´£¬ÎÒÃÇÔõô¹¹¼ÜÎÒÃǵÄÎïÁªÍø·ÀÓùÌåϵ¡£

 

   
2368 ´Îä¯ÀÀ       27
????

HTTP????
nginx??????
SD-WAN???
5G?????
 
????

??????????
IPv6???????
??????????
???????
????

????????
????????
???????????????
??????????
×îл¼Æ»®
DeepSeekÔÚÈí¼þ²âÊÔÓ¦ÓÃʵ¼ù 4-12[ÔÚÏß]
DeepSeek´óÄ£ÐÍÓ¦Óÿª·¢Êµ¼ù 4-19[ÔÚÏß]
UAF¼Ü¹¹ÌåϵÓëʵ¼ù 4-11[±±¾©]
AIÖÇÄÜ»¯Èí¼þ²âÊÔ·½·¨Óëʵ¼ù 5-23[ÉϺ£]
»ùÓÚ UML ºÍEA½øÐзÖÎöÉè¼Æ 4-26[±±¾©]
ÒµÎñ¼Ü¹¹Éè¼ÆÓ뽨ģ 4-18[±±¾©]
 
×îÐÂÎÄÕÂ
ÔÆÔ­Éú¼Ü¹¹¸ÅÊö
K8S¸ß¿ÉÓü¯Èº¼Ü¹¹ÊµÏÖ
ÈÝÆ÷ÔÆ¹ÜÀíÖ®K8S¼¯Èº¸ÅÊö
k8s-ÕûÌå¸ÅÊöºÍ¼Ü¹¹
Ê®·ÖÖÓѧ»áÓÃdocker²¿Êð΢·þÎñ
×îпγÌ
ÔÆ¼ÆË㡢΢·þÎñÓë·Ö²¼Ê½¼Ü¹¹
Æóҵ˽ÓÐÔÆÔ­ÀíÓë¹¹½¨
»ùÓÚKubernetesµÄDevOpsʵ¼ù
ÔÆÆ½Ì¨¼Ü¹¹ÓëÓ¦Ó㨰¢ÀïÔÆ£©
Docker²¿Êð±»²âϵͳÓë×Ô¶¯»¯¿ò¼Üʵ¼ù
³É¹¦°¸Àý
±±¾© ÔÆÆ½Ì¨Óë΢·þÎñ¼Ü¹¹Éè¼Æ
ͨÓù«Ë¾GE DockerÔ­ÀíÓëʵ¼ùÅàѵ
ij¾ü¹¤Ñо¿µ¥Î» MDA£¨Ä£ÐÍÇý¶¯¼Ü¹¹£©
ÖªÃûÏû·Ñ½ðÈÚ¹«Ë¾ ÁìÓòÇý¶¯Éè¼Æ
ÉîÛÚijÆû³µÆóÒµ Ä£ÐÍÇý¶¯µÄ·ÖÎöÉè¼Æ