package Plugins import ( "context" "fmt" "github.com/shadow1ng/fscan/Common" "golang.org/x/crypto/ssh" "io/ioutil" "net" "strings" "time" ) func SshScan(info *Common.HostInfo) (tmperr error) { if Common.DisableBrute { return } maxRetries := Common.MaxRetries target := fmt.Sprintf("%v:%v", info.Host, info.Ports) Common.LogDebug(fmt.Sprintf("开始扫描 %s", target)) totalUsers := len(Common.Userdict["ssh"]) totalPass := len(Common.Passwords) Common.LogDebug(fmt.Sprintf("开始尝试用户名密码组合 (总用户数: %d, 总密码数: %d)", totalUsers, totalPass)) tried := 0 total := totalUsers * totalPass // 遍历所有用户名密码组合 for _, user := range Common.Userdict["ssh"] { for _, pass := range Common.Passwords { tried++ pass = strings.Replace(pass, "{user}", user, -1) Common.LogDebug(fmt.Sprintf("[%d/%d] 尝试: %s:%s", tried, total, user, pass)) // 重试循环 for retryCount := 0; retryCount < maxRetries; retryCount++ { if retryCount > 0 { Common.LogDebug(fmt.Sprintf("第%d次重试: %s:%s", retryCount+1, user, pass)) } ctx, cancel := context.WithTimeout(context.Background(), time.Duration(Common.Timeout)*time.Second) done := make(chan struct { success bool err error }, 1) go func(user, pass string) { success, err := SshConn(info, user, pass) select { case <-ctx.Done(): case done <- struct { success bool err error }{success, err}: } }(user, pass) var err error select { case result := <-done: err = result.err if result.success { successMsg := fmt.Sprintf("SSH认证成功 %s User:%v Pass:%v", target, user, pass) Common.LogSuccess(successMsg) // 保存结果 details := map[string]interface{}{ "port": info.Ports, "service": "ssh", "username": user, "password": pass, "type": "weak-password", } // 如果使用了密钥认证,添加密钥信息 if Common.SshKeyPath != "" { details["auth_type"] = "key" details["key_path"] = Common.SshKeyPath details["password"] = nil } // 如果执行了命令,添加命令信息 if Common.Command != "" { details["command"] = Common.Command } vulnResult := &Common.ScanResult{ Time: time.Now(), Type: Common.VULN, Target: info.Host, Status: "vulnerable", Details: details, } Common.SaveResult(vulnResult) time.Sleep(100 * time.Millisecond) cancel() return nil } case <-ctx.Done(): err = fmt.Errorf("连接超时") } cancel() if err != nil { errMsg := fmt.Sprintf("SSH认证失败 %s User:%v Pass:%v Err:%v", target, user, pass, err) Common.LogError(errMsg) if retryErr := Common.CheckErrs(err); retryErr != nil { if retryCount == maxRetries-1 { return err } continue } } if Common.SshKeyPath != "" { Common.LogDebug("检测到SSH密钥路径,停止密码尝试") return err } break } } } Common.LogDebug(fmt.Sprintf("扫描完成,共尝试 %d 个组合", tried)) return tmperr } func SshConn(info *Common.HostInfo, user string, pass string) (flag bool, err error) { var auth []ssh.AuthMethod if Common.SshKeyPath != "" { pemBytes, err := ioutil.ReadFile(Common.SshKeyPath) if err != nil { return false, fmt.Errorf("读取密钥失败: %v", err) } signer, err := ssh.ParsePrivateKey(pemBytes) if err != nil { return false, fmt.Errorf("解析密钥失败: %v", err) } auth = []ssh.AuthMethod{ssh.PublicKeys(signer)} } else { auth = []ssh.AuthMethod{ssh.Password(pass)} } config := &ssh.ClientConfig{ User: user, Auth: auth, HostKeyCallback: func(hostname string, remote net.Addr, key ssh.PublicKey) error { return nil }, Timeout: time.Duration(Common.Timeout) * time.Millisecond, } client, err := ssh.Dial("tcp", fmt.Sprintf("%v:%v", info.Host, info.Ports), config) if err != nil { return false, err } defer client.Close() session, err := client.NewSession() if err != nil { return false, err } defer session.Close() // 如果需要执行命令 if Common.Command != "" { _, err := session.CombinedOutput(Common.Command) if err != nil { return true, err } } return true, nil }