±à¼ÍƼö: |
±¾ÎÄÖ÷Òª´ÓÒ»¸öIOT©¶´×Ô¶¯»¯ÀûÓù¤¾ßAutoSploit½²Æð£¬½²µ½ÎÒÃǸÃÈçºÎ¼ì²âÎÒÃdz£¼ûµÄÎïÁªÍø´æÔڵݲȫÎÊÌ⣬ϣÍû¶ÔÄúÄÜÓÐËù°ïÖú¡£
±¾ÎÄÀ´×ÔÓÚCSDN£¬ÓÉ»ðÁú¹ûÈí¼þAlice±à¼ÍƼö¡£ |
|
ÎÒÃÇÕâ´Î˵°²È«¼ì²â£¬´ÓÒµÎñ²ãÏÈ¿ªÊ¼£¬È»ºó½µµ½¸ÐÖª²ã£¬È»ºóÌáµ½ÍøÂç²ãµÄÊÚȨºÍ°²È«²ßÂÔ£¬ËùÒÔÏȽéÉÜϹ¤¾ßAutoSploit£¬AutoSploit»ùÓÚ
Python2.7µÄ½Å±¾£¬Ê¹Óà Shodan.io API ×Ô¶¯ÊÕ¼¯Ä¿±ê£¬MetasploitÄ£¿éÓÐÖúÓÚʵʩԶ³Ì´úÂëÖ´ÐУ¬²¢»ñµÃÄæÏò
TCP/Shells »òÕßMetasploit ¶Ô»°£¨¹Ù·½½éÉÜ£¬Êµ¼ÊÉÏÓÃShodanµÄAPIÃâ·ÑµÄÖ»ÓÐÄǼ¸Ò³£©¡£
GitHubµØÖ·£ºhttps://github.com/NullArray/AutoSploit
ÎÒÃÇÏȰ²×°Ò»Ï£¬¸ãÒ»¸ö²âÊÔ£º
°²×°»·¾³£ºkail2.0¡¢Python 2.7
°²×°²½Ö裺
1£ºÏÂÔØÎļþ git clone https://github.com/NullArray/AutoSploit.git
2£ºÖ´ÐÐinstall.sh °²×°

3£ºÒòΪAutoSploit°²×°ÐèÒªpythonµÄ¿âÎļþÖ§³Ö£¬¸ÃÎļþÒѾдºÃÁË£¬ÔÚĿ¼ÏµÄrequirentx.txtÎļþ£¬Ö±½Ópip°²×°¼´¿É¡£


4£º°²×°ÍêÁËÎÒÃÇÖ±½ÓÖ´ÐÐ python autosploit.py¡£

5£º¿ªÊ¼×öÑ¡ÔñÌ⣬һ°ãÖ±½ÓÑ¡µÚÒ»¸ö¡£

6£ºÑ¡ÔñÊÕ¼¯Ö÷»ú£¬Ñ¡Ôñ×Ô¼ºÐèÒªµÄ¹Ø¼ü´Ê¡£

7£ºÈ»ºóÊÕ¼¯Ò»»á£¬Ñ¡Ôñ6£¬ÀûÓÃMSFÄ£¿é½øÐÐÊÕ¼¯ÐÅÏ¢¡£

ÉÏÃæ¾ÍÊÇÕâ¸ö¹¤¾ß°²×°ºÍʹÓ÷½·¨£¬ÎªÊ²Ã´ÎÒÃÇÒª°ÑÕâ¸ö¹¤¾ßAutoSploitµ¥¶ÀÀ³öÀ´Ëµ£¬ÊÇÒòΪËû°Ñ³£¼ûµÄIOTµÄ©¶´´ÓMSFÖÐÀÁ˳öÀ´£¬ÌṩÁË285³£¼ûµÄÈÝÒ×ÀûÓõIJå¼þ£¬ÔÛÃÇÀ´ËµËµIOTµÄ°²È«¼ì²â£¬×î»ù´¡Òª¼ì²éʲô¶«Î÷¡£
AutoSploitµÄ285¸öMSF²å¼þ°üÀ¨259¸öexp£¬26¸ö¸¨Öú²å¼þ£¬ÆäÖÐ259¸öexp°üÀ¨ÁË61¸öwindows²å¼þ£¬61¸öLinux²å¼þ£¬96¸ömulti²å¼þ£¬37¸öunix²å¼þ£¬4¸öÆäËûÀàÐͲå¼þ¡£´Ó·ÖÀàÉÏÀ´½²£¬Ö÷Òª¼¯ÖÐÔÚÒµÎñϵͳ²úÉú©¶´£¨Öмä¼þ£¬Ó¦Óñ¾Éí£¬Êý¾Ý¿â£©£¬Ö÷Òª²úÉúÔÚhttp/httpsÐÒéÉÏ¡£
ÄÇôÎÒÃÇÕûÀíÇå³þÁË£¬¶ÔÒµÎñ²ãÀ´Ëµ£¬ÈÝÒ×ÀûÓò¢ÇÒÄܹ¹³ÉÖØ´óΣº¦µÄ°²È«ÎÊÌ⣬Óֻع鵽ÎÒÃdz£ËµµÄÒµÎñϵͳ°²È«ÎÊÌ⣨Ö÷ÒªÒÀ¾Ý2017ÄêCNVDÊÕ¼IOTÉ豸©¶´È¨ÏÞÈÆ¹ý¡¢¾Ü¾ø·þÎñ¡¢ÐÅϢй¶¡¢¿çÕ¾¡¢ÃüÁîÖ´ÐС¢»º³åÇøÒç³ö¡¢SQL×¢Èë¡¢Èõ¿ÚÁî¡¢Éè¼ÆÈ±ÏݵÈ©¶´£©£¬¶ÔÕâÒ»²ã´ÎÀ´Ëµ£¬É¨ÃèÆ÷£¬¼à¿ØÔ¤¾¯µÈµÈÀûÓòâÊÔ·½·¨½â¾ö³£¼ûµÄÖ±½ÓÀûÓõݲȫÎÊÌâµÄ·½·¨¶¼ÒѾºÜ³ÉÊìÁË£¬ÉÌÓÃɨÃèÆ÷£¬¿ªÔ´É¨ÃèÆ÷Ò»°ã¶¼Äܼì²é²âÊÔ£¬Í¬Àí¿ÉÍÆ£¬ÎÒÃÇ×÷Ϊ°²È«ÔËάµÄ´óÖÂÄÚÈÝÈçÏ£¬ÎÒÕÒÁËÕÅ˼άµ¼Í¼£º

ÄÇô¶ÔÓÚÎïÁªÍøÀ´Ëµ£¬½ö½ö¼ì²âÁËÒµÎñ²ãµÄ¶«Î÷ÊÇÔ¶Ô¶²»¹»µÄ£¬ÄÇôÎÒÃÇ»¹Òª¶ÔÍøÂç²ãºÍ¸ÐÖª²ã½øÐа²È«¼ì²â£¬Õâʱºò¾Í²»µÃÌá¼°Ò»ÏÂÎïÁªÍøµÄ°²È«¼Ü¹¹£¬ºê¹Û½Ç¶È£¨Éæ¼°·¶Î§¹ã£¬º¸ÇÈ«²¿ÎïÁªÍøÌåϵ£©ÉÏÀ´Ëµ£¬·ÖΪÁËËĸö´ó¿é£º
ÈÏÖ¤ £¨Authentication£©£ºÌṩÑéÖ¤ÎïÁªÍøÊµÌåµÄ±êʶÐÅÏ¢²¢ÓÃÓÚÑéÖ¤¡£
ÊÚȨ £¨Authorization£©£º¿ØÖÆÉ豸ÔÚÕû¸öÍøÂç½á¹¹ÖеķÃÎÊÊÚȨ¡£
Ç¿ÖÆÐԵݲȫ²ßÂÔ £¨Network Enforced Policy£©£º°üÀ¨ÔÚ»ù´¡¼Ü¹¹Éϰ²È«µØroute²¢´«Êä¶ËµãÁ÷Á¿µÄËùÓÐÔªËØ£¬ÎÞÂÛÊÇ¿ØÖƲãÃæ¡¢¹ÜÀí²ãÃæ»¹ÊÇʵ¼ÊÊý¾ÝÁ÷Á¿Öеģ¬Ôٴλù´¡ÉÏÔËÓúÏÊʵݲȫ²ßÂÔ¡£
°²È«·ÖÎö£º¿É¼ûÐÔÓë¿É¿ØÐÔ £¨Secure Analytics: Visibility and Control£©£º°²È«·ÖÎö²ãÈ·¶¨ÁËËùÓÐÔªËØ£¨¶ËµãºÍÍøÂç»ù´¡ÉèÊ©£¬°üÀ¨Êý¾ÝÖÐÐÄ£©¿ÉÄܲÎÓëµÄ·þÎñ£¬Ìṩң¸Ð¿±²â£¬ÊµÏֿɼûÐÔ²¢×îÖÕ¿ØÖÆÎïÁªÍøÉú̬ϵͳ¡£
ÎÒÃÇÏÖÔÚÊÇ´ÓÍâÏòÀï¿´£¬ÏÖ½×¶ÎÔÚÓ¦Óòã½â¾öµÄÎÊÌ⣬ÆäʵÊÇÊôÓÚÔÚ΢¹Û½Ç¶ÈÉϽâ¾öÁËIOTÔÚÒµÎñ²ã²¿·Ö°²È«·ÖÎöµÄÊÂÇ飬ÏÖÔÚҪ˵Çå³þ¸ÐÖª²ãºÍÍøÂç²ã°²È«¼ì²â£¬Ê×ÏÈÒª×öµÄ£¬¾ÍÊǼì²âÈÏÖ¤£¬ÒòΪÎïÁªÍøµÄÄ©¶ËÉ豸ÈÏÖ¤¸ü¶àÒÀ¿¿ÉäÆµÊ¶±ð£¨RFID£©¡¢¹²ÏíÃÜÔ¿¡¢X.509Ö¤Êé¡¢¶ËµãµÄMACµØÖ·»òijÖÖÀàÐ͵ĻùÓÚ²»¿É±äÓ²¼þµÄ¿ÉÐÅroot£¬¼ÓÉϼ«ÉÙÊýµÄÈËΪÈÏÖ¤£¨ÈçÓû§Ãû¡¢ÃÜÂë¡¢ÁîÅÆ»òÉúÎïÌØÕ÷£©£¬ÎÒÃÇÔÚ×ö¼ì²âµÄʱºò£¬ÏÈÈ·¶¨Ä©¶ËÉ豸µÄÉí·ÝÐÅÏ¢ÊÇ·ñÔÚµ¥Ò»ÊÚȨµÄÇé¿öÏ¿ÉÒÔ½øÐзÃÎÊ£¬ÊÇ·ñ¿ª·ÅÉí·ÝÐÅÏ¢£¬Éí·ÝÐÅÏ¢ÊÇ·ñ¿ÉÒÔαÔ죬Éí·ÝÐÅÏ¢ÊÇ·ñ×㹻ǿ׳¡£
¸ÐÖª²ã³ýÁ˵¥Ò»É豸ÈÏÖ¤ÃæÁÙµÄÎÊÌ⣬¸ÐÖª²ã»¹ÓÐÒ»¸öºÜÍ·ÌÛµÄÌØµã£ºÊýÁ¿¾Þ´ó£¬²¢ÇÒÆÕ±é´æÔÚÒÆ¶¯ÐÔ¡£Õâ¾Íµ¼ÖÂÁËÒ»¸ö´óÎÊÌ⣬×ʲúÊáÀí£¨×ʲú×·×ٺ͹ÜÀí£©³ÉΪÁË¿¨ÔÚ¶Ô¸ÐÖª²ã°²È«¼ì²âµÄµÚÒ»µÀÃż÷¡£
ÄÇÎÒÃÇ×öÒ»¸ö¼òµ¥µÄÉè¼Æ£¬¸ù¾ÝÎïÁªÍø½ÓÈëÉ豸µÄÒªÇó£¬ÏÈÊáÀí×ʲú£¨¹«ÍøµÄÖ±½ÓÕÒÖ¸ÎÆÓÃAutoSploitÈ¥ÅÜ£©£¬ÔÚ¶Ô×ʲú½øÐйÜÀí¡£

ÄÇôIOT¸ÐÖª²ãµÄÈçºÎÕûÀí×ʲúºÍ¼ì²â£¬ÎÒÃÇÓÃÒ»¸ö¼òµ¥µÄÁ÷³ÌͼÍê³ÉÁË˼·£¬ºËÐĵÄIOT©¶´µÄ¹æÔò¿â£¬º£¿µÍþÊÓIPÉãÏñ»úȨÏÞÈÆ¹ýCVE2017-7921£¬CVE-2017-7923ΪÀý£¬´úÂëÎļþÈçÏ£º
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.140373");
script_version("$Revision: 7182 $");
script_tag(name: "last_modification",
value: "$Date: 2017-09-19 07:44:15 +0200
(Tue, 19 Sep 2017) $");
script_tag(name: "creation_date",
value: "2017-09-18 11:41:11 +0700 (Mon,
18 Sep 2017)");
script_tag(name: "cvss_base", value:
"7.5");
script_tag(name: "cvss_base_vector",
value: "AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_cve_id("CVE-2017-7921",
"CVE-2017-7923"); script_tag(name: "qod_type", value:
"exploit");
script_tag(name: "solution_type",
value: "VendorFix");
script_name("Hikvision IP Cameras Multiple
Vulnerabilities");
script_category(ACT_GATHER_INFO);
script_copyright("This script is Copyright
(C) 2017 Greenbone Networks GmbH");
script_family("Web application abuses");
script_dependencies("gb_get_http_banner.nasl");
script_mandatory_keys("App-webs/banner");
script_require_ports("Services/www",
443);
script_tag(name: "summary", value:
"Multiple Hikvision IP cameras are prone
to multiple vulnerabilities.");
script_tag(name: "vuldetect",
value: "Sends a crafted HTTP GET request
and checks the response.");
script_tag(name: "insight", value:
"Multiple Hikvision IP cameras are prone
to multiple vulnerabilities:
- Improper authentication vulnerability (CVE-2017-7921)
- Password in configuration file (CVE-2017-7923)");
script_tag(name: "impact", value:
"Successful exploitation of these vulnerabilities
could lead to a malicious
attacker escalating his or her privileges
or assuming the identity of an authenticated
user and obtaining
sensitive data.");
script_tag(name: "affected", value:
"Hikvision reports that the following
cameras and versions are affected:
- DS-2CD2xx2F-I Series: V5.2.0 build 140721
to V5.4.0 build 160530
- DS-2CD2xx0F-I Series: V5.2.0 build 140721
to V5.4.0 Build 160401
- DS-2CD2xx2FWD Series: V5.3.1 build 150410
to V5.4.4 Build 161125
- DS-2CD4x2xFWD Series: V5.2.0 build 140721
to V5.4.0 Build 160414
- DS-2CD4xx5 Series: V5.2.0 build 140721
to V5.4.0 Build 160421
- DS-2DFx Series: V5.2.0 build 140805 to
V5.4.5 Build 160928
- DS-2CD63xx Series: V5.0.9 build 140305
to V5.3.5 Build 160106");
script_tag(name: "solution", value:
"See the referenced advisory for a solution.");
script_xref(name: "URL", value:
"https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01");
script_xref(name: "URL", value:
"http://www.hikvision.com/us/about_10807.html");
script_xref(name: "URL", value:
"http://seclists.org/fulldisclosure/2017/Sep/23");
exit(0);
}
include("http_func.inc");
include("http_keepalive.inc");
port = get_http_port(default: 443);
url = '/Security/users?auth=YWRtaW46MTEK';
if (http_vuln_check(port: port, url: url,
pattern: "<UserList version",
check_header: TRUE,
extra_check: "<userName>"))
{
report = "It was possible to obtain a
list of device users at: " +
report_vuln_url(port: port, url: url, url_only:
TRUE);
security_message(port: port, data: report);
exit(0);
}
exit(99); |
Ò»¸ö¼òµ¥µÄ©¶´¼ì²âµÄ¹æÔòÎļþ¾ÍÕâÑù³ÉÐÍÁË¡£
ÄÇô¼ÌÐø½øÐмì²â£¬½ÓÏÂÀ´¼ì²âÍøÂç²ã£¬ÍøÂç²ãÔÚ°²È«Éè¼ÆÀïÃæÇ£³¶µ½ÊÚȨºÍÇ¿ÖÆÐԵݲȫ²ßÂÔ£¬Ò²¾ÍÊÇÎÒÃÇÔÚÍøÂç²ãµÄÃæÁٵĺËÐݲȫÎÊÌâÊÇûÓÐÒ»¸öÊÚȨ±ê×¼£¬Ã»ÓÐͨÓõÄͨÐÅÐÒ飬°²²»°²È«¾Í¿¿³§É̵ÄÁ¼ÐÄÁË¡£
ÍøÂç²ãÎÒÃÇÒª¼ì²âµÄÖ÷ÒªÊÇÍøÂçÉ豸±¾ÉíµÄ°²È«ÐÔ£¬´«Êä¹ý³ÌÖеÄÐÅÈÎÁ´¼°°²È«²ßÂÔ¡£
ÍøÂçÉ豸±¾Éí°²È«ÐÔÕâ¸öÏÖ½×¶ÎɨÃèÆ÷ºÜ¶à£¬ÂòÒ»¸ö»òÕßÍøÉÏÕÒÒ»¸öÆÆ½â°æµÄɨÃèÆ÷¶¼Äܹ»Âú×ãÐèÇó¡£
´«Êä¹ý³ÌÖеÄÐÅÈÎÁ´¼°°²È«²ßÂÔÖ»ÄÜÒ»ÌõÒ»ÌõÈ¥²éÁË£¬Ã»ÓкõŤ¾ß£¬²»Í¬¼¶±ðºÍ²ã´ÎµÄÒªÇó²»Í¬£¬ÕâÀï¾ÍÒ»Ò»ÁоÙÁË¡£
ÏÖ½×¶ÎÊÐÃæÉÏÎÒÔÝʱûÕÒµ½Õë¶ÔIoTÉ豸µÄ×Ô¶¯»¯°²È«²âÊÔ¹¤¾ß(³ÉÊìµÄ¸÷ÖÖ¹¦Äܶ¼ÓеÄɨÃèÆ÷)½áºÏÎÒ¶Ô¼ì²âµÄÀí½âдÁ˰׻°ÎïÁªÍøµÚ¶þƪÎÄÕ£¬°×»°ÈýÎÒÃÇ̸̸»ùÓÚÏÖ×´£¬ÎÒÃÇÔõô¹¹¼ÜÎÒÃǵÄÎïÁªÍø·ÀÓùÌåϵ¡£
|