package Plugins import ( "fmt" "github.com/IBM/sarama" "github.com/shadow1ng/fscan/Common" "strings" "time" ) func KafkaScan(info *Common.HostInfo) (tmperr error) { if Common.DisableBrute { return } maxRetries := Common.MaxRetries target := fmt.Sprintf("%v:%v", info.Host, info.Ports) Common.LogDebug(fmt.Sprintf("开始扫描 %s", target)) // 尝试无认证访问 Common.LogDebug("尝试无认证访问...") for retryCount := 0; retryCount < maxRetries; retryCount++ { if retryCount > 0 { Common.LogDebug(fmt.Sprintf("第%d次重试无认证访问", retryCount+1)) } flag, err := KafkaConn(info, "", "") if flag && err == nil { // 保存无认证访问结果 result := &Common.ScanResult{ Time: time.Now(), Type: Common.VULN, Target: info.Host, Status: "vulnerable", Details: map[string]interface{}{ "port": info.Ports, "service": "kafka", "type": "unauthorized-access", }, } Common.SaveResult(result) Common.LogSuccess(fmt.Sprintf("Kafka服务 %s 无需认证即可访问", target)) return nil } if err != nil && Common.CheckErrs(err) != nil { if retryCount < maxRetries-1 { continue } return err } break } totalUsers := len(Common.Userdict["kafka"]) totalPass := len(Common.Passwords) Common.LogDebug(fmt.Sprintf("开始尝试用户名密码组合 (总用户数: %d, 总密码数: %d)", totalUsers, totalPass)) tried := 0 total := totalUsers * totalPass // 遍历所有用户名密码组合 for _, user := range Common.Userdict["kafka"] { for _, pass := range Common.Passwords { tried++ pass = strings.Replace(pass, "{user}", user, -1) Common.LogDebug(fmt.Sprintf("[%d/%d] 尝试: %s:%s", tried, total, user, pass)) for retryCount := 0; retryCount < maxRetries; retryCount++ { if retryCount > 0 { Common.LogDebug(fmt.Sprintf("第%d次重试: %s:%s", retryCount+1, user, pass)) } done := make(chan struct { success bool err error }, 1) go func(user, pass string) { success, err := KafkaConn(info, user, pass) select { case done <- struct { success bool err error }{success, err}: default: } }(user, pass) var err error select { case result := <-done: err = result.err if result.success && err == nil { // 保存爆破成功结果 vulnResult := &Common.ScanResult{ Time: time.Now(), Type: Common.VULN, Target: info.Host, Status: "vulnerable", Details: map[string]interface{}{ "port": info.Ports, "service": "kafka", "type": "weak-password", "username": user, "password": pass, }, } Common.SaveResult(vulnResult) Common.LogSuccess(fmt.Sprintf("Kafka服务 %s 爆破成功 用户名: %s 密码: %s", target, user, pass)) return nil } case <-time.After(time.Duration(Common.Timeout) * time.Second): err = fmt.Errorf("连接超时") } if err != nil { Common.LogError(fmt.Sprintf("Kafka服务 %s 尝试失败 用户名: %s 密码: %s 错误: %v", target, user, pass, err)) if retryErr := Common.CheckErrs(err); retryErr != nil { if retryCount == maxRetries-1 { continue } continue } } break } } } Common.LogDebug(fmt.Sprintf("扫描完成,共尝试 %d 个组合", tried)) return tmperr } // KafkaConn 尝试 Kafka 连接 func KafkaConn(info *Common.HostInfo, user string, pass string) (bool, error) { host, port := info.Host, info.Ports timeout := time.Duration(Common.Timeout) * time.Second config := sarama.NewConfig() config.Net.DialTimeout = timeout config.Net.TLS.Enable = false config.Version = sarama.V2_0_0_0 // 设置 SASL 配置 if user != "" || pass != "" { config.Net.SASL.Enable = true config.Net.SASL.Mechanism = sarama.SASLTypePlaintext config.Net.SASL.User = user config.Net.SASL.Password = pass config.Net.SASL.Handshake = true } brokers := []string{fmt.Sprintf("%s:%s", host, port)} // 尝试作为消费者连接测试 consumer, err := sarama.NewConsumer(brokers, config) if err == nil { defer consumer.Close() return true, nil } // 如果消费者连接失败,尝试作为客户端连接 client, err := sarama.NewClient(brokers, config) if err == nil { defer client.Close() return true, nil } // 检查错误类型 if strings.Contains(err.Error(), "SASL") || strings.Contains(err.Error(), "authentication") || strings.Contains(err.Error(), "credentials") { return false, fmt.Errorf("认证失败") } return false, err }