javafx编写的poc管理和漏洞扫描小工具
本工具是采用javafx编写,使用sqllite进行poc储存的poc管理和漏洞扫描集成化工具。可以可视化添加POC和指纹进行POC管理和漏洞扫描功能,包含POC管理、漏洞扫描、指纹识别、指纹库等模块。
主要更新:
- 1.指纹库录入格式改变。
- 2.增加了JNDI注入漏洞使用远程ldap检测方法,使用https://github.com/r00tSe7en/JNDIMonitor在VPS进行默认端口的部署,设置里填写VPS的IP即可
- 3.增加了需要请求远程文件的漏洞检测方法,VPS用Python起一个文件服务,将地址填入到设置里即可。
- 4.其他更新不一一列举,大家多多使用鼠标右键点击试试。添加POC时点击感叹号图标有一些提示和例子。
- 5.修了一堆bug,记不得哪些了,不列举了。
1.又又又修复了一些bug
2.增加了几个添加POC时使用的占位关键字,详情查看release里的说明
1.多次请求 添加漏洞POC时可添加多个请求,以适应某些需要多次发包的POC;
2.漏洞扫描逻辑优化 将之前漏洞扫描的多种方式进行整合,简化逻辑。
3.修复一些已知bug
4.移除了一些鸡肋的功能
1.加入web指纹模块 现在可以添加web指纹,并在添加poc时选择;在扫描时会先识别指纹,再获取该指纹对应的poc进行扫描,提高扫描效率。
2.加入漏洞利用功能 文件上传等漏洞可以一键利用,节省抓包修改的操作步骤。
3.修复已知bug
4.移除了某些鸡肋的功能
1.修复了某些情况下返回的header中字段名重复时丢失字段值的bug
2.调整了页面布局和部分样式
3.添加poc时可选择是否进行302跳转
4.双击poc可查看poc描述
Poc管理模块包含poc的预览、增加、导入、导出、编辑、删除功能。
CMS可选从指纹库拉取的CMS名或者自定义输入,漏洞名称、漏洞类型、漏洞描述均自定义填写。
右键添加请求包可添加编辑删除多个请求,以适应某些需要多次发包的POC;Headers填写请求时必须的Header头,一行填写一个;请求次序选择该请求包发送的顺序;
![image](https://private-user-images.githubusercontent.com/62692103/293609545-5fbeb8c9-1b7d-4955-9558-9514b357d76a.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.qcWCn3peaitAD_G8WXERtJTyMIUqQEvXyeNLkuHL23k)
![image](https://private-user-images.githubusercontent.com/62692103/293609522-62d0a54c-8c2e-45ab-8459-e877dccbe36b.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3MjA5NDI2NjYsIm5iZiI6MTcyMDk0MjM2NiwicGF0aCI6Ii82MjY5MjEwMy8yOTM2MDk1MjItNjJkMGE1NGMtOGMyZS00NWFiLTg0NTktZTg3N2RjY2JlMzZiLnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNDA3MTQlMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjQwNzE0VDA3MzI0NlomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPWVjMDExYzc4ZDM5NDY5YmEwNmExNTdjMmIxYjlkNjNjYmFmOWMyZWY0ZjRhYzk1YTM1ZjdkNTAyZjBiMTJhMTkmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0JmFjdG9yX2lkPTAma2V5X2lkPTAmcmVwb19pZD0wIn0.KrMd24LTqHsYcXlUSohFin7Wcm-JIPmL2PmHdjumKdI)
自定义变量可对该次请求的的结果进行处理,提取需要的字段保存为公共变量(直接用~代替需要截取的部分),后续请求包带上{{变量名}}即可使用该变量;
![image](https://private-user-images.githubusercontent.com/62692103/297011301-18e3f7dc-bca7-4d73-82fe-7a881234d051.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.ek4L9AAqU6eJrNIJ2_VqJgs7-i3_8VDKrc9sd77Oo7Q)
![image](https://private-user-images.githubusercontent.com/62692103/293609635-566ff72c-ab37-4dc1-98bd-741d4e0f4c33.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.0dNRo81d4ro52dXEogyYdbovbz7QiDpoUKQgQXF_2eg)
在填写完所有请求包后,选择请求包中的某次请求作为二次验证的请求包:
提示:添加POC时使用的占位关键字: 1.使用HexDecode{{内容}}可在发包时将{{}}内的内容进行16进制数据解码;适配于反序列化等漏洞。如图:
![image](https://private-user-images.githubusercontent.com/62692103/300855960-9abbdffe-9e38-47ba-8146-a0ef22157199.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3MjA5NDI2NjYsIm5iZiI6MTcyMDk0MjM2NiwicGF0aCI6Ii82MjY5MjEwMy8zMDA4NTU5NjAtOWFiYmRmZmUtOWUzOC00N2JhLTgxNDYtYTBlZjIyMTU3MTk5LnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNDA3MTQlMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjQwNzE0VDA3MzI0NlomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPTY2NWMwYjI2YWVlYjdmYzhjMGMyNDQyMTEzMDA0MTUyNDIyYjRhZjY0ZTFmNGVjMWE5ZjU0YmI1NmMwNGQ0MDEmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0JmFjdG9yX2lkPTAma2V5X2lkPTAmcmVwb19pZD0wIn0.F_A2tFdAS9postM4kjiELDNpy9d-braSuQhYFdi7RGc)
2.使用Base64Decode{{内容}}可在发包时将{{}}内的内容进行base64数据解码;适配于压缩包上传等漏洞。如图:
![image](https://private-user-images.githubusercontent.com/62692103/300856471-702398c2-dbd6-4cb5-b6d4-f41045fc1c07.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.MuhBIngPiNxFiw8YAV9JIZw-tXzoatW9KKGuoVOyQzA)
3.使用{{RequestUrl}}可在发包时替换成当前请求的url;适配于某些需要refer头或者请求路径中需要当前拼接请求URL的情况。如图:
![image](https://private-user-images.githubusercontent.com/62692103/300856811-6b771d48-7fd9-4ab4-a711-e788630f7b9c.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3MjA5NDI2NjYsIm5iZiI6MTcyMDk0MjM2NiwicGF0aCI6Ii82MjY5MjEwMy8zMDA4NTY4MTEtNmI3NzFkNDgtN2ZkOS00YWI0LWE3MTEtZTc4ODYzMGY3YjljLnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNDA3MTQlMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjQwNzE0VDA3MzI0NlomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPWY2MGJkMTc4ZjkwYjExY2QyYzEyMDUxOWQ3Yjc5ZTgyOWZkNTc1NGQyY2NjY2VhYWVhMjE5YmU4NDFlZWIyMDAmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0JmFjdG9yX2lkPTAma2V5X2lkPTAmcmVwb19pZD0wIn0.tbc6yPFFXiSRPYKMxJtfTjpW8OfnJDChhz_Zf5mNQnM)
4.使用{{RemoteHttpLog}}可在发包时替换成设置里设置的httplog地址。适用于命令执行不回显的情况。如图:
![image](https://private-user-images.githubusercontent.com/62692103/300857106-103358b6-82b5-4526-8190-b0f0cc51a0e4.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.hasm2ovh3VWSG8a82PdonoAZoRH4XwFrJ48pV9un7Ss)
![image](https://private-user-images.githubusercontent.com/62692103/300855462-e3f3d0a5-8e6c-437e-bfda-ac60124ed2fe.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.MvDXAx0i4q9P6j4TzKmp4veLzdK6s83mblHysN6L8lw)
再在设置里填你部署的vps的地址和端口
![image](https://private-user-images.githubusercontent.com/62692103/300860093-0ba9661d-b098-4142-849f-a2cd8d18460d.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3MjA5NDI2NjYsIm5iZiI6MTcyMDk0MjM2NiwicGF0aCI6Ii82MjY5MjEwMy8zMDA4NjAwOTMtMGJhOTY2MWQtYjA5OC00MTQyLTg0OWYtYTJjZDhkMTg0NjBkLnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNDA3MTQlMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjQwNzE0VDA3MzI0NlomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPWNjZmEwOTg2ZWFkNzBhNDQyNTlhMjA2ZDhhNDMyN2E3ZmRmYzM0M2FlYTFkZWZhMGY3ZmNhYmFmODZhODFjMzcmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0JmFjdG9yX2lkPTAma2V5X2lkPTAmcmVwb19pZD0wIn0.KEGVneAwc7B3QR_tI2J_3-_eFUtJR6VebuPrZeRFVu8)
左侧选择需要扫描的漏洞;勾选匹配指纹后,在漏洞扫描前先对URL进行指纹识别,识别到指纹的URL扫描对应指纹的POC和CMS名称为All的POC,未识别到指纹的URL进行全部POC扫描;右键扫描结果,可对结果进行二次验证;扫描结果可保存为CSV文件(macos打开该CSV文件中时,其中的文字符会乱码)。
![image](https://private-user-images.githubusercontent.com/62692103/293610008-245ed34c-990e-4e55-99ad-61b5baafc54a.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.3aOZ5RIBrGHFwpNUhepRFCt_x9r3RuofLZeeX1JtZ9k)
![image](https://private-user-images.githubusercontent.com/62692103/293610034-dae7e149-1db4-4f92-b913-2728a3cfda76.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.MkyMJDKh5T1qQ-GmdOpphCdzTW4wONl6C76yGRLDJ0U)
这个工具可以看作一个简单的漏洞扫描框架,需要扫描什么漏洞,就可以自己进行调试添加;调试好的poc可以导出分享给团队成员,也可以导入他人调试好的poc。它可以是oa漏洞扫描工具,也可以是框架漏洞扫描工具,也可以是默认弱口令扫描工具,这完全取决于添加的poc。
目前还没有做指纹识别,是比较傻瓜式的全部遍历扫描,虽然使用了多线程,但是在poc数量较多且目标资产较多的情况下,扫描速度还是不尽如人意。且会增加误报概率。
工具为本人初学安全开发写的一个练手的小工具,不足之处还请各位大佬轻喷。
本工具思路部分借鉴了h4ckdepy大佬的Un1kPoc工具,f0ng大佬的poc2jar工具,感谢各位大佬的无私分享。 欢迎各路大佬给工具提提建议,给我改进的动力,谢谢!
本工具截图所进行的演示均在本地环境或授权情况下进行,且本工具不包含任何权限级别的漏洞利用poc,也不包含漏洞利用功能,仅作为企业或个人资产漏洞自查的安全建设工具。在使用本工具时,您应确保该行为符合当地的法律法规,并且已经取得了足够的授权,请勿对非授权目标进行访问。如您在使用本工具的过程中存在任何非法行为,您需自行承担相应后果,我们将不承担任何法律及连带责任。请勿将本项目技术或代码应用在恶意软件制作、软件著作权/知识产权盗取或不当牟利等非法用途中。