一种是调用Nsa泄露的smbtouch-1.1.1.exe,另一种是参考巡风的poc
1
import os import fileinput print "---This is Ms17010‘s tools for 139/445---" #ip开始 BeginIP = raw_input(" [+] >输入开始ip:") #172.16.9.1 #ip终点 EndIP = raw_input(" [+] >输入终端ip:") #Log file fp = open(‘log.txt‘, ‘w+‘) #向Smbtouch-1.1.1.xml里面按照xml的格式文档写入默认127.0.0.1 OldIP = ‘ <value>127.0.0.1</value>‘ TempIP = OldIP print "------------------scaning----------------" print "" #切片操作 IP1 = BeginIP.split(‘.‘)[0] IP2 = BeginIP.split(‘.‘)[1] IP3 = BeginIP.split(‘.‘)[2] IP4 = BeginIP.split(‘.‘)[-1] EndIP_last = EndIP.split(‘.‘)[-1] for i in range(int(IP4)-1,int(EndIP_last)): ip = str(IP1+‘.‘+IP2+‘.‘+IP3+‘.‘+IP4) int_IP4 = int(IP4) int_IP4 += 1 IP4 = str(int_IP4) NewIP= ‘ <value>‘+ip+‘</value>‘ for line in fileinput.input(‘Smbtouch-1.1.1.xml‘,inplace=1): print line.rstrip().replace(TempIP,NewIP) TempIP = NewIP Output = os.popen(r"Smbtouch-1.1.1.exe").read() Output = Output[0:Output.find(‘<config‘,1)] fp.writelines(Output) Flag = Output.find(‘[-] Touch failed‘) if Flag == -1 : print ‘[+] Touch success: ‘ +ip else: print ‘[-] Touch failed: ‘ +ip else: fp.close( ) for line in fileinput.input(‘Smbtouch-1.1.1.xml‘,inplace=1): print line.rstrip().replace(NewIP,OldIP)
前两天看到freebuf的关于《如何转换永恒之蓝(Eternalblue)的POC》
ms17-010 poc
#!/usr/bin/python # coding: utf-8 ‘‘‘ The poc is used to detecte MS17-010 ‘‘‘ import binascii import socket import struct import sys import threading negotiate_protocol_request = binascii.unhexlify( "00000085ff534d4272000000001853c00000000000000000000000000000fffe00004000006200025043204e4554574f524b2050524f4752414d20312e3000024c414e4d414e312e30000257696e646f777320666f7220576f726b67726f75707320332e316100024c4d312e325830303200024c414e4d414e322e3100024e54204c4d20302e313200") session_setup_request = binascii.unhexlify( "00000088ff534d4273000000001807c00000000000000000000000000000fffe000040000dff00880004110a000000000000000100000000000000d40000004b000000000000570069006e0064006f007700730020003200300030003000200032003100390035000000570069006e0064006f007700730020003200300030003000200035002e0030000000") tree_connect_request = binascii.unhexlify( "00000060ff534d4275000000001807c00000000000000000000000000000fffe0008400004ff006000080001003500005c005c003100390032002e003100360038002e003100370035002e003100320038005c00490050004300240000003f3f3f3f3f00") trans2_session_setup = binascii.unhexlify( "0000004eff534d4232000000001807c00000000000000000000000000008fffe000841000f0c0000000100000000000000a6d9a40000000c00420000004e0001000e000d0000000000000000000000000000") def main(ips): ip = ips if ip != "": check_ip(ip) if filename != "": with open(filename, "r") as fp: for line in fp: semaphore.acquire() ip_address = line.strip() t = threading.Thread(target=threaded_check, args=(ip_address,)) t.start() num_threads = 10 timeout = 10 filename = "" print_lock = threading.Lock() if len(sys.argv) == 5: ip = sys.argv[1] filename = sys.argv[2] timeout = sys.argv[3] num_threads = sys.argv[4] semaphore = threading.BoundedSemaphore(value=num_threads) else: print "[!] >............... " def print_status(ip, message): global print_lock with print_lock: print "[*] [%s] %s" % (ip, message) def check_ip(ip): global negotiate_protocol_request, session_setup_request, tree_connect_request, trans2_session_setup, timeout, verbose # Connect to socket s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.settimeout(float(timeout) if timeout else None) host = ip port = 445 s.connect((host, port)) # Send/receive negotiate protocol request print_status(ip, "正在准备协议!") s.send(negotiate_protocol_request) s.recv(1024) # Send/receive session setup request print_status(ip, "正在设置请求!") s.send(session_setup_request) session_setup_response = s.recv(1024) # Extract user ID from session setup response user_id = session_setup_response[32:34] print_status(ip, "用户 ID = %s" % struct.unpack("<H", user_id)[0]) # Replace user ID in tree connect request packet modified_tree_connect_request = list(tree_connect_request) modified_tree_connect_request[32] = user_id[0] modified_tree_connect_request[33] = user_id[1] modified_tree_connect_request = "".join(modified_tree_connect_request) # Send tree connect request print_status(ip, "发送连接!!!") s.send(modified_tree_connect_request) tree_connect_response = s.recv(1024) # Extract tree ID from response tree_id = tree_connect_response[28:30] print_status(ip, "Tree ID = %s" % struct.unpack("<H", tree_id)[0]) # Replace tree ID and user ID in trans2 session setup packet modified_trans2_session_setup = list(trans2_session_setup) modified_trans2_session_setup[28] = tree_id[0] modified_trans2_session_setup[29] = tree_id[1] modified_trans2_session_setup[32] = user_id[0] modified_trans2_session_setup[33] = user_id[1] modified_trans2_session_setup = "".join(modified_trans2_session_setup) # Send trans2 sessions setup request print_status(ip, "发送成功!正在返回!") s.send(modified_trans2_session_setup) final_response = s.recv(1024) s.close() # Check for 0x51 response to indicate DOUBLEPULSAR infection if final_response[34] == "\x51": with print_lock: print("\033[0;31m%s\033[0m" % "[*] 存在:DOUBLEPULSAR !!!\n" ) else: with print_lock: print "[-] 不存在DOUBLEPULSAR !!!\n" def threaded_check(ip_address): global semaphore try: check_ip(ip_address) except Exception as e: with print_lock: print "[错误] [%s] - %s" % (ip_address, e) finally: semaphore.release() if __name__ == ‘__main__‘: ip = ‘192.168.1.1‘ main(ip)
扫描这里使用IPy模块处理输入扫描网段和使用multiprocessing机制
# coding: utf-8 # by:adislj import socket from datetime import datetime from multiprocessing.dummy import Pool as ThreadPool #多线程 import IPy from MS17_010_poc import * try: print ‘[*] >请输入你要扫描的ip段/如:192.168.1.0/24‘ remote_server = raw_input("[+] >输入ip段:") #172.16.9.0/24 ip_list = [] ips = IPy.IP(remote_server) #Class and tools for handling of IPv4 and IPv6 addresses and networks for ipx in ips: ip_list.append(ipx) ip_list = ip_list[1:-1] print ‘-‘ * 41 print ‘[*] >你扫描的网段是:‘, remote_server print ‘-‘ * 41 socket.setdefaulttimeout(0.5) except: pass def scan_port(ip_list): try: port_list = [445] for port in port_list: s = socket.socket(2, 1) res = s.connect_ex((str(ip_list), port)) if res == 0: # 如果端口开启 if port == 445: print ip_list print ‘[*] >端口:{}开放,正在发送MS17-010 Poc‘.format(port) main(str(ip_list)) s.close() else: print ‘.‘ * 41 s.close() except Exception, e: print str(e.message) if remote_server != ‘‘: t1 = datetime.now() pool = ThreadPool(processes=5) results = pool.map(scan_port, ip_list) pool.close() pool.join() else: print ‘请输入ip段!‘ exit(0) print ‘[*] >MS17-010扫描完成时间:‘, datetime.now() - t1
原文:http://www.cnblogs.com/adislj777/p/6970771.html