diff --git a/README.md b/README.md index e1b4527..69d9e06 100644 --- a/README.md +++ b/README.md @@ -107,4 +107,10 @@ - thinkphp5_inj_info - thinkphp5_x_rce -> moon.py -u thinkphp \ No newline at end of file +> moon.py -u thinkphp + +## Memcache + +- 未授权访问 + +> moon.py -u memcache diff --git a/memcache_vuln/Main_memcache_vuln.py b/memcache_vuln/Main_memcache_vuln.py new file mode 100644 index 0000000..4c9e02c --- /dev/null +++ b/memcache_vuln/Main_memcache_vuln.py @@ -0,0 +1,11 @@ +# -*- coding: utf-8 -*- +import memcache_vuln.memcache_un + + +def exec(URL): + # memcahce_un.attack(URL) + memcache_vuln.memcache_un.attack(URL) + + +if __name__ == "__main__": + exec() diff --git a/memcache_vuln/__init__.py b/memcache_vuln/__init__.py new file mode 100644 index 0000000..40a96af --- /dev/null +++ b/memcache_vuln/__init__.py @@ -0,0 +1 @@ +# -*- coding: utf-8 -*- diff --git a/memcache_vuln/memcache_un.py b/memcache_vuln/memcache_un.py new file mode 100644 index 0000000..63e9a81 --- /dev/null +++ b/memcache_vuln/memcache_un.py @@ -0,0 +1,20 @@ +# -*- coding: utf-8 -*- +import memcache + + +def attack(URL): + list = URL.split('/') + try: + print('[+]开始检测-memcache未授权访问漏洞。[+]') + mc = memcache.Client([list[-1]], debug=True) + print('[!]memcache获取信息结果:[!]') + ret = mc.get_stats() + print(ret) + except: + print('[-]未发现-发现-memcache未授权访问漏洞。[-]') + pass + print('[+]检测结束-memcache未授权访问漏洞。[+]') + + +if __name__ == "__main__": + attack() diff --git a/moon.py b/moon.py index f9beb59..b14b4b3 100644 --- a/moon.py +++ b/moon.py @@ -17,6 +17,8 @@ import kindeditor.Main_kindeditor import durpal.Main_durpal import bf_dicts.Main_bf import thinkphp.Main_thinkphp +import memcache_vuln.Main_memcache_vuln + if __name__ == "__main__": @@ -25,7 +27,7 @@ if __name__ == "__main__": print(''' 漏洞检测: userage: python -u module http://xx.xx.xx.xx:xx -modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass +modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor memcache IP归属查询: userage: python -u ip www.xxxxx.com/xx.xx.xx.xx modul:ip ipq @@ -72,12 +74,14 @@ modul:ip ipq durpal.Main_durpal.exec(sys.argv[3]) elif sys.argv[2] == 'thinkphp': thinkphp.Main_thinkphp.exec(sys.argv[3]) + elif sys.argv[2] == 'memcache': + memcache_vuln.Main_memcache_vuln.exec(sys.argv[3]) else: print(''' 漏洞检测: userage: python -u module http://xx.xx.xx.xx:xx -modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor +modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor memcache IP归属查询: userage: python -u ip www.xxxxx.com/xx.xx.xx.xx modul:ip ipq @@ -90,7 +94,7 @@ modul:ip ipq print(''' 漏洞检测: userage: python -u module http://xx.xx.xx.xx:xx -modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass +modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor memcache IP归属查询: userage: python -u ip www.xxxxx.com/xx.xx.xx.xx modul:ip ipq