log4j漏洞一鍵批量檢測【CVE-2021-44228】


  • log4j批量檢測(CVE-2021-44228)

實現思路:

1、python讀取urls.txt所有應用資產

2、調用rad對urls頁面進行爬蟲

3、爬取到的數據包轉發到burp

4、使用burp的log4j插件對數據包所有字段進行POC探測

需要工具:

batch_rad.py

rad【https://github.com/chaitin/rad】

burp插件(log4jShell Scanner)【burp插件倉庫自帶】

batch_rad.py代碼如下:

 1 import os
 2 import time
 3 import sys
 4 import datetime
 5 
 6 def globalPath():#文件路徑
 7     global radPath #rad
 8     global urlPath #url資產
 9     radPath = r"C:\Users\jues\Desktop\rad\rad.exe"
10     urlPath = r"C:\Users\jues\Desktop\rad\urls.txt"
11 
12 def getUrl(path):#獲取urls
13     file = open(path)  
14     urls = []
15     for line in file:
16         urls.append(line.strip('\n'))  # 移除換行符將url添加到數組
17     file.close()
18     return urls
19 
20 def addFiles(pathName):#創建掃描報告文件夾
21     try:
22         filePath = sys.path[0] + "\\" + datetime.datetime.now().strftime('%Y.%m.%d-') + pathName  #D:\xxxx\xxxx\batch_scan\2020.11.11-scan_domains\
23         os.mkdir(filePath)
24     except:
25         pass
26     return filePath
27 
28 
29 def scan():#rad_burp聯動掃描
30     urls = getUrl(urlPath)
31     filePath = addFiles("scan_rad_burp\\")
32     sum = 0
33     for url in urls:
34         sum += 1
35         name = str(sum) + ',' + url.replace('https://', '').replace('http://','').replace('/','').replace('\n','').replace(':','-').rstrip() + '.txt' #創建的爬蟲文件名
36         radcmd = r'{0} -t {1} --http-proxy 127.0.0.1:8080 -text-output {2}'.format(radPath, url.replace('\n', ''), filePath + name)  # cmd
37         os.system(radcmd.replace('\n', ''))
38         time.sleep(1)
39 
40 if __name__ == "__main__":
41     globalPath()
42     scan()

 


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM