From 0d2ec0aba57061300d61ef41b5d3b04041d911e6 Mon Sep 17 00:00:00 2001 From: rpkr <13591644403@139.com> Date: Mon, 4 Nov 2019 19:39:49 +0800 Subject: [PATCH] [+]Add memcache unauthorized --- README.md | 8 +++++++- memcache_vuln/Main_memcache_vuln.py | 11 +++++++++++ memcache_vuln/__init__.py | 1 + memcache_vuln/memcache_un.py | 20 ++++++++++++++++++++ moon.py | 10 +++++++--- 5 files changed, 46 insertions(+), 4 deletions(-) create mode 100644 memcache_vuln/Main_memcache_vuln.py create mode 100644 memcache_vuln/__init__.py create mode 100644 memcache_vuln/memcache_un.py diff --git a/README.md b/README.md index e1b4527..69d9e06 100644 --- a/README.md +++ b/README.md @@ -107,4 +107,10 @@ - thinkphp5_inj_info - thinkphp5_x_rce -> moon.py -u thinkphp \ No newline at end of file +> moon.py -u thinkphp + +## Memcache + +- 未授权访问 + +> moon.py -u memcache diff --git a/memcache_vuln/Main_memcache_vuln.py b/memcache_vuln/Main_memcache_vuln.py new file mode 100644 index 0000000..4c9e02c --- /dev/null +++ b/memcache_vuln/Main_memcache_vuln.py @@ -0,0 +1,11 @@ +# -*- coding: utf-8 -*- +import memcache_vuln.memcache_un + + +def exec(URL): + # memcahce_un.attack(URL) + memcache_vuln.memcache_un.attack(URL) + + +if __name__ == "__main__": + exec() diff --git a/memcache_vuln/__init__.py b/memcache_vuln/__init__.py new file mode 100644 index 0000000..40a96af --- /dev/null +++ b/memcache_vuln/__init__.py @@ -0,0 +1 @@ +# -*- coding: utf-8 -*- diff --git a/memcache_vuln/memcache_un.py b/memcache_vuln/memcache_un.py new file mode 100644 index 0000000..63e9a81 --- /dev/null +++ b/memcache_vuln/memcache_un.py @@ -0,0 +1,20 @@ +# -*- coding: utf-8 -*- +import memcache + + +def attack(URL): + list = URL.split('/') + try: + print('[+]开始检测-memcache未授权访问漏洞。[+]') + mc = memcache.Client([list[-1]], debug=True) + print('[!]memcache获取信息结果:[!]') + ret = mc.get_stats() + print(ret) + except: + print('[-]未发现-发现-memcache未授权访问漏洞。[-]') + pass + print('[+]检测结束-memcache未授权访问漏洞。[+]') + + +if __name__ == "__main__": + attack() diff --git a/moon.py b/moon.py index f9beb59..b14b4b3 100644 --- a/moon.py +++ b/moon.py @@ -17,6 +17,8 @@ import kindeditor.Main_kindeditor import durpal.Main_durpal import bf_dicts.Main_bf import thinkphp.Main_thinkphp +import memcache_vuln.Main_memcache_vuln + if __name__ == "__main__": @@ -25,7 +27,7 @@ if __name__ == "__main__": print(''' 漏洞检测: userage: python -u module http://xx.xx.xx.xx:xx -modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass +modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor memcache IP归属查询: userage: python -u ip www.xxxxx.com/xx.xx.xx.xx modul:ip ipq @@ -72,12 +74,14 @@ modul:ip ipq durpal.Main_durpal.exec(sys.argv[3]) elif sys.argv[2] == 'thinkphp': thinkphp.Main_thinkphp.exec(sys.argv[3]) + elif sys.argv[2] == 'memcache': + memcache_vuln.Main_memcache_vuln.exec(sys.argv[3]) else: print(''' 漏洞检测: userage: python -u module http://xx.xx.xx.xx:xx -modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor +modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor memcache IP归属查询: userage: python -u ip www.xxxxx.com/xx.xx.xx.xx modul:ip ipq @@ -90,7 +94,7 @@ modul:ip ipq print(''' 漏洞检测: userage: python -u module http://xx.xx.xx.xx:xx -modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass +modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor memcache IP归属查询: userage: python -u ip www.xxxxx.com/xx.xx.xx.xx modul:ip ipq