之前在使用WVS的时候只是简单的使用,但是后来想知道WVS到底能扫描出那些漏洞,即它的扫描功能和种类有哪些,一直也不知道该怎么获取,后来在访问其官网时找到了这样的一个列表,当时就借鉴别人的抓取脚本自己也写了个脚本进行抓取(但是现在回想起来,其实最好的方法还是用shell调用curl/sed/awk/grep等工具抓取页面然后合并成HTML文件,观看起来效果更好),下面就把之前的一个过程稍微描述一下:
Which Vulnerabilities does Acunetix Web Vulnerability Scanner Check for?
Acunetix Web Vulnerability Scanner automatically checks for the following vulnerabilities, among others{ http://www.acunetix.com/vulnerabilities/ }:
Web Server Configuration Checks{Web服务器配置检测}
- Checks for Web Servers Problems – Determines if dangerous HTTP methods are enabled on the web server (e.g. PUT, TRACE, DELETE)
- Verify Web Server Technologies
- Vulnerable Web Servers
- Vulnerable Web Server Technologies – such as “PHP 4.3.0 file disclosure and possible code execution.
Parameter Manipulation Checks{参数操纵检测}
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- SQL Injection
- Code Execution
- Directory Traversal
- HTTP Parameter Pollution
- File Inclusion
- Script Source Code Disclosure
- CRLF Injection
- Cross Frame Scripting (XFS)
- PHP Code Injection
- XPath Injection
- Path Disclosure
(Unix and Windows) - LDAP Injection
- Cookie Manipulation
- Arbitrary File creation (AcuSensor Technology)
- Arbitrary File deletion (AcuSensor Technology)
- Email Injection (AcuSensor Technology)
- File Tampering (AcuSensor Technology)
- URL redirection
- Remote XSL inclusion
- DOM XSS
- MultiRequest Parameter Manipulation
- Blind SQL/XPath Injection
- Input Validation
- Buffer Overflows
- Sub-Domain Scanning
File Checks{文件、脚本检测}
- Checks for Backup Files or Directories – Looks for common files (such as logs, application traces, CVS web repositories)
- Cross Site Scripting in URI
- Checks for Script Errors
File Uploads{文件上传漏洞检测}
Directory Checks{目录遍历相关漏洞检测}
- Looks for Common Files (such as logs, traces, CVS)
- Discover Sensitive Files/Directories
- Discovers Directories with Weak Permissions
- Cross Site Scripting in Path and PHPSESSID Session Fixation.
- Web Applications
- HTTP Verb Tampering
Text Search{文本信息检测}
- Directory Listings
- Source Code Disclosure
- Check for Common Files
- Check for Email Addresses
- Microsoft Office Possible Sensitive Information
- Local Path Disclosure
- Error Messages
- Trojan Shell Scripts (such as popular PHP shell scripts like r57shell, c99shell etc)
Weak Password Checks{弱密码检测–暴力破解}
- Weak HTTP Passwords
- Authentication attacks
- Weak FTP passwords
Google Hacking Database (GHDB){GHDB检测}http://www.acunetix.com/websitesecurity/google-hacking/
Port Scanner and Network Alerts{端口扫描&网络脆弱性检测}
- Finds All Open Ports on Servers
- Displays Network Banner of Port
- DNS Server Vulnerability: Open Zone Transfer
- DNS Server Vulnerability: Open Recursion
- DNS Server Vulnerability: Cache Poisoning
- Finds List of Writable FTP Directories
- FTP Anonymous Access Allowed
- Checks for Badly Configured Proxy Servers
- Checks for Weak SNMP Community Strings
- Finds Weak SSL Cyphers
综上,WVS主要可检测的内容为9大类,63个小类的漏洞。
————————————————-
而通过WVS页面上给出的Web应用程序的脆弱性列表的链接可以知道:Web应用程序存在431种漏洞(Web_vul_list.txt)。
抓取脚本也是非常简单-> py_spider_webVulList_re.py
————————————————-
还可以做的工作就是,将抓取的431种漏洞的介绍内容页面一个一个抓取下来(可参考之前的抓取Freebuf工具列表的Python脚本进行改写)
See which Vulnerabilities Acunetix WVS checks for http://www.acunetix.com/support/vulnerability-checks/ #WVS可以检测的漏洞
Web Application Vulnerabilities | Acunetix http://www.acunetix.com/vulnerabilities/ #Web应用程序的脆弱性列表
—————————————-
代码非常简单:
#!/usr/bin/env python #--coding: utf-8-- import sys import urllib2 import re import HTMLParser URL_REG = re.compile(r'<li><a href='(.+?)'>', re.I) baseURL = 'http://www.acunetix.com/?post_type=page&p=26&vulnerability_page=' content = '' for i in xrange(1, 10): print baseURL + str(i) content += (urllib2.urlopen(baseURL + str(i))).read() URL_list = URL_REG.findall(content) fp = open("Web_vul_list.txt", 'a') for url in URL_list: print 'http:' + url fp.write('http:' + url + 'n') fp.close() print str(len(URL_list)) + ' URL.'
因为用到了HTMLParser所以这段代码非常简单,但效果还不错`(*∩_∩*)′
《 “获取WVS可以检测的漏洞列表” 》 有 3 条评论
调用Acunetix11 API接口实现扫描
http://0cx.cc/about_awvs11_api.jspx
About Acunetix WVS Console
http://0cx.cc/about_wvs_console.jspx
基于WVS的批量扫描工具
https://www.n0tr00t.com/2015/09/22/WVS_Patcher-Assistant-for-WVS-Scaner.html
https://github.com/dabeike/WVS_Patcher
Acunetix Web Vulnerability Scanner 11.x KeyGen By Hmily[LCG]
http://www.52pojie.cn/thread-609275-1-1.html
整合了一个wvs11的扫描
http://0cx.cc/wvs_console_scan.jspx
关于wvs11的api之前有做过介绍
http://0cx.cc/about_awvs11_api.jspx
具体的利用方式以及导出为xml格式的报告。最后对xml进行处理的脚本都在:
https://github.com/0xa-saline/acunetix-api
域名爆破修改自lijiejie的subDomainsBrute。加入第三方的收集,以及在端口扫描之前对ip进行处理,就是同c段的取最大和最小的来强制加入中间段的扫描
https://github.com/0xa-saline/subDomainsBrute
端口扫描主要依赖是nmap,这里调用的是python-nmap
http://0cx.cc/solve_bug_withe-python-nmap.jspx
http://0cx.cc/some_skill_for_quen.jspx
Web应用漏洞索引(Web Application Vulnerabilities Index)
https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/