From ebf990eca0df90865a3abc0e86173c392c498dee Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E5=BD=B1=E8=88=9E=E8=80=85?= Date: Mon, 10 Jan 2022 16:45:55 +0800 Subject: [PATCH] update nobr --- Plugins/CVE-2020-0796.go | 5 ++++- Plugins/fcgiscan.go | 5 ++++- Plugins/mongodb.go | 7 +++++-- Plugins/ms17010.go | 8 +++++++- Plugins/smb.go | 5 ++++- 5 files changed, 24 insertions(+), 6 deletions(-) diff --git a/Plugins/CVE-2020-0796.go b/Plugins/CVE-2020-0796.go index b63404b..38c8e05 100644 --- a/Plugins/CVE-2020-0796.go +++ b/Plugins/CVE-2020-0796.go @@ -96,6 +96,9 @@ const ( ) func SmbGhost(info *common.HostInfo) error { + if common.IsBrute { + return nil + } err := SmbGhostScan(info) return err } @@ -105,7 +108,7 @@ func SmbGhostScan(info *common.HostInfo) error { addr := fmt.Sprintf("%s:%v", info.Host, port) conn, err := net.DialTimeout("tcp", addr, timeout) defer func() { - if conn != nil{ + if conn != nil { conn.Close() } }() diff --git a/Plugins/fcgiscan.go b/Plugins/fcgiscan.go index 202eed7..4d3bd93 100644 --- a/Plugins/fcgiscan.go +++ b/Plugins/fcgiscan.go @@ -20,6 +20,9 @@ import ( //https://github.com/wofeiwo/webcgi-exploits func FcgiScan(info *common.HostInfo) { + if common.IsBrute { + return + } url := "/etc/issue" if info.Path != "" { url = info.Path @@ -54,7 +57,7 @@ func FcgiScan(info *common.HostInfo) { fcgi, err := New(addr, info.Timeout) defer func() { - if fcgi.rwc != nil{ + if fcgi.rwc != nil { fcgi.rwc.Close() } }() diff --git a/Plugins/mongodb.go b/Plugins/mongodb.go index 819c02b..2b35191 100644 --- a/Plugins/mongodb.go +++ b/Plugins/mongodb.go @@ -10,6 +10,9 @@ import ( ) func MongodbScan(info *common.HostInfo) error { + if common.IsBrute { + return nil + } _, err := MongodbUnauth(info) if err != nil { errlog := fmt.Sprintf("[-] Mongodb %v:%v %v", info.Host, info.Ports, err) @@ -25,14 +28,14 @@ func MongodbUnauth(info *common.HostInfo) (flag bool, err error) { realhost := fmt.Sprintf("%s:%v", info.Host, info.Ports) conn, err := net.DialTimeout("tcp", realhost, time.Duration(info.Timeout)*time.Second) defer func() { - if conn != nil{ + if conn != nil { conn.Close() } }() if err != nil { return flag, err } - err = conn.SetReadDeadline(time.Now().Add(time.Duration(info.Timeout)*time.Second)) + err = conn.SetReadDeadline(time.Now().Add(time.Duration(info.Timeout) * time.Second)) if err != nil { return flag, err } diff --git a/Plugins/ms17010.go b/Plugins/ms17010.go index 2b71949..6e7a811 100644 --- a/Plugins/ms17010.go +++ b/Plugins/ms17010.go @@ -20,6 +20,9 @@ var ( ) func MS17010(info *common.HostInfo) error { + if common.IsBrute { + return nil + } err := MS17010Scan(info) if err != nil { errlog := fmt.Sprintf("[-] Ms17010 %v %v", info.Host, err) @@ -33,7 +36,7 @@ func MS17010Scan(info *common.HostInfo) error { // connecting to a host in LAN if reachable should be very quick conn, err := net.DialTimeout("tcp", ip+":445", time.Duration(info.Timeout)*time.Second) defer func() { - if conn != nil{ + if conn != nil { conn.Close() } }() @@ -129,6 +132,9 @@ func MS17010Scan(info *common.HostInfo) error { //} else{fmt.Printf("\033[33m%s\tMS17-010\t(%s)\033[0m\n", ip, os)} result := fmt.Sprintf("[+] %s\tMS17-010\t(%s)", ip, os) common.LogSuccess(result) + if common.SC != "" { + MS17010EXP(info) + } // detect present of DOUBLEPULSAR SMB implant trans2SessionSetupRequest[28] = treeID[0] trans2SessionSetupRequest[29] = treeID[1] diff --git a/Plugins/smb.go b/Plugins/smb.go index 2bf1954..5878659 100644 --- a/Plugins/smb.go +++ b/Plugins/smb.go @@ -10,6 +10,9 @@ import ( ) func SmbScan(info *common.HostInfo) (tmperr error) { + if common.IsBrute { + return nil + } starttime := time.Now().Unix() for _, user := range common.Userdict["smb"] { for _, pass := range common.Passwords { @@ -73,6 +76,6 @@ func doWithTimeOut(info *common.HostInfo, user string, pass string) (flag bool, case <-signal: return flag, err case <-time.After(time.Duration(info.Timeout) * time.Second): - return false,errors.New("time out") + return false, errors.New("time out") } }