mirror of
https://github.com/shadow1ng/fscan.git
synced 2025-07-14 05:12:36 +08:00
183 lines
4.3 KiB
Go
183 lines
4.3 KiB
Go
package Plugins
|
||
|
||
import (
|
||
"context"
|
||
"fmt"
|
||
"github.com/shadow1ng/fscan/Common"
|
||
"golang.org/x/crypto/ssh"
|
||
"io/ioutil"
|
||
"net"
|
||
"strings"
|
||
"time"
|
||
)
|
||
|
||
func SshScan(info *Common.HostInfo) (tmperr error) {
|
||
if Common.DisableBrute {
|
||
return
|
||
}
|
||
|
||
maxRetries := Common.MaxRetries
|
||
target := fmt.Sprintf("%v:%v", info.Host, info.Ports)
|
||
|
||
Common.LogDebug(fmt.Sprintf("开始扫描 %s", target))
|
||
totalUsers := len(Common.Userdict["ssh"])
|
||
totalPass := len(Common.Passwords)
|
||
Common.LogDebug(fmt.Sprintf("开始尝试用户名密码组合 (总用户数: %d, 总密码数: %d)", totalUsers, totalPass))
|
||
|
||
tried := 0
|
||
total := totalUsers * totalPass
|
||
|
||
// 遍历所有用户名密码组合
|
||
for _, user := range Common.Userdict["ssh"] {
|
||
for _, pass := range Common.Passwords {
|
||
tried++
|
||
pass = strings.Replace(pass, "{user}", user, -1)
|
||
Common.LogDebug(fmt.Sprintf("[%d/%d] 尝试: %s:%s", tried, total, user, pass))
|
||
|
||
// 重试循环
|
||
for retryCount := 0; retryCount < maxRetries; retryCount++ {
|
||
if retryCount > 0 {
|
||
Common.LogDebug(fmt.Sprintf("第%d次重试: %s:%s", retryCount+1, user, pass))
|
||
}
|
||
|
||
ctx, cancel := context.WithTimeout(context.Background(), time.Duration(Common.Timeout)*time.Second)
|
||
done := make(chan struct {
|
||
success bool
|
||
err error
|
||
}, 1)
|
||
|
||
go func(user, pass string) {
|
||
success, err := SshConn(info, user, pass)
|
||
select {
|
||
case <-ctx.Done():
|
||
case done <- struct {
|
||
success bool
|
||
err error
|
||
}{success, err}:
|
||
}
|
||
}(user, pass)
|
||
|
||
var err error
|
||
select {
|
||
case result := <-done:
|
||
err = result.err
|
||
if result.success {
|
||
successMsg := fmt.Sprintf("SSH认证成功 %s User:%v Pass:%v", target, user, pass)
|
||
Common.LogSuccess(successMsg)
|
||
|
||
// 保存结果
|
||
details := map[string]interface{}{
|
||
"port": info.Ports,
|
||
"service": "ssh",
|
||
"username": user,
|
||
"password": pass,
|
||
"type": "weak-password",
|
||
}
|
||
|
||
// 如果使用了密钥认证,添加密钥信息
|
||
if Common.SshKeyPath != "" {
|
||
details["auth_type"] = "key"
|
||
details["key_path"] = Common.SshKeyPath
|
||
details["password"] = nil
|
||
}
|
||
|
||
// 如果执行了命令,添加命令信息
|
||
if Common.Command != "" {
|
||
details["command"] = Common.Command
|
||
}
|
||
|
||
vulnResult := &Common.ScanResult{
|
||
Time: time.Now(),
|
||
Type: Common.VULN,
|
||
Target: info.Host,
|
||
Status: "vulnerable",
|
||
Details: details,
|
||
}
|
||
Common.SaveResult(vulnResult)
|
||
|
||
time.Sleep(100 * time.Millisecond)
|
||
cancel()
|
||
return nil
|
||
}
|
||
case <-ctx.Done():
|
||
err = fmt.Errorf("连接超时")
|
||
}
|
||
|
||
cancel()
|
||
|
||
if err != nil {
|
||
errMsg := fmt.Sprintf("SSH认证失败 %s User:%v Pass:%v Err:%v",
|
||
target, user, pass, err)
|
||
Common.LogError(errMsg)
|
||
|
||
if retryErr := Common.CheckErrs(err); retryErr != nil {
|
||
if retryCount == maxRetries-1 {
|
||
return err
|
||
}
|
||
continue
|
||
}
|
||
}
|
||
|
||
if Common.SshKeyPath != "" {
|
||
Common.LogDebug("检测到SSH密钥路径,停止密码尝试")
|
||
return err
|
||
}
|
||
|
||
break
|
||
}
|
||
}
|
||
}
|
||
|
||
Common.LogDebug(fmt.Sprintf("扫描完成,共尝试 %d 个组合", tried))
|
||
return tmperr
|
||
}
|
||
|
||
func SshConn(info *Common.HostInfo, user string, pass string) (flag bool, err error) {
|
||
var auth []ssh.AuthMethod
|
||
if Common.SshKeyPath != "" {
|
||
pemBytes, err := ioutil.ReadFile(Common.SshKeyPath)
|
||
if err != nil {
|
||
return false, fmt.Errorf("读取密钥失败: %v", err)
|
||
}
|
||
|
||
signer, err := ssh.ParsePrivateKey(pemBytes)
|
||
if err != nil {
|
||
return false, fmt.Errorf("解析密钥失败: %v", err)
|
||
}
|
||
auth = []ssh.AuthMethod{ssh.PublicKeys(signer)}
|
||
} else {
|
||
auth = []ssh.AuthMethod{ssh.Password(pass)}
|
||
}
|
||
|
||
config := &ssh.ClientConfig{
|
||
User: user,
|
||
Auth: auth,
|
||
HostKeyCallback: func(hostname string, remote net.Addr, key ssh.PublicKey) error {
|
||
return nil
|
||
},
|
||
Timeout: time.Duration(Common.Timeout) * time.Millisecond,
|
||
}
|
||
|
||
client, err := ssh.Dial("tcp", fmt.Sprintf("%v:%v", info.Host, info.Ports), config)
|
||
if err != nil {
|
||
return false, err
|
||
}
|
||
defer client.Close()
|
||
|
||
session, err := client.NewSession()
|
||
if err != nil {
|
||
return false, err
|
||
}
|
||
defer session.Close()
|
||
|
||
// 如果需要执行命令
|
||
if Common.Command != "" {
|
||
_, err := session.CombinedOutput(Common.Command)
|
||
if err != nil {
|
||
return true, err
|
||
}
|
||
}
|
||
|
||
return true, nil
|
||
}
|