fscan内网资产扫描并输出报告

fscan内网资产扫描并输出报告

fscan介绍

一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。
支持主机存活探测、端口扫描、常见服务的爆破、ms17010、redis批量写公钥、计划任务反弹shell、读取win网卡信息、web指纹识别、web漏洞扫描、netbios探测、域控识别等功能。

fscan开源,github上游详细的说明,详见:https://github.com/shadow1ng/fscan

使用说明(Linux)

  • 指定单个IP
./fscan -h 192.168.160.1
  • 指定网段
./fscan -h 192.168.75.0/24
  • 将扫描结果保存到指定文件(默认保存到:result.txt)
./fscan -h 192.168.75.0/24 -o 192-168-75-0-24.txt
  • 扫描结果样例
   ___                              _    
  / _ \     ___  ___ _ __ __ _  ___| | __ 
 / /_\/____/ __|/ __| '__/ _` |/ __| |/ /
/ /_\\_____\__ \ (__| | | (_| | (__|   <    
\____/     |___/\___|_|  \__,_|\___|_|\_\   
                     fscan version: 1.8.4
start infoscan
192.168.160.1:8089 open
192.168.160.1:9000 open
192.168.160.1:22 open
192.168.160.1:80 open
192.168.160.1:8008 open
192.168.160.1:3306 open
192.168.160.1:9001 open
192.168.160.1:8012 open
192.168.160.1:8443 open
192.168.160.1:8083 open
[*] alive ports len is: 10
start vulscan
[*] WebTitle http://192.168.160.1      code:307 len:61     title:None 跳转url: http://192.168.22.68:9001
[*] WebTitle http://192.168.160.1:9000 code:307 len:61     title:None 跳转url: http://192.168.160.1:9001
[*] WebTitle http://192.168.22.68:9001 code:200 len:1310   title:MinIO Console
[*] WebTitle http://192.168.160.1:9001 code:200 len:1310   title:MinIO Console
[*] WebTitle http://192.168.160.1:8089 code:403 len:555    title:403 Forbidden
[*] WebTitle http://192.168.160.1:8012 code:302 len:0      title:None 跳转url: http://192.168.160.1:8012/index
[*] WebTitle http://192.168.160.1:8012/index code:200 len:12409  title:kkFileView演示首页
[*] WebTitle http://192.168.160.1:9001 code:200 len:1310   title:MinIO Console
[*] WebTitle https://192.168.160.1:8083 code:502 len:559    title:502 Bad Gateway
[*] WebTitle https://192.168.160.1:8443 code:404 len:232    title:404 Not Found
[*] WebTitle http://192.168.160.1:8008 code:404 len:232    title:404 Not Found
[+] SSH 192.168.12.20:22:root root
[+] SSH 192.168.12.19:22:root root
[+] SSH 192.168.12.18:22:root root
[+] PocScan https://192.168.69.58:8443 poc-yaml-springboot-cve-2021-21234 spring3
[+] PocScan https://192.168.69.61:8443 poc-yaml-springboot-cve-2021-21234 spring3
[+] PocScan http://192.168.69.58:18000 poc-yaml-springboot-cve-2021-21234 spring3

输出报告

可以看出来,fscan扫出来的内容包含很多描述性的INFO级别日志,如何提取出主要信息并输出报告。

可以结合Python + Pandas的形式利用正则表达式提取出主要信息再通过Pandas导出Excel。

  • 首先要有Python3.5+的Python环境
  • 安装pandas
pip install pandas
  • 代码部分
#!/usr/bin/env python
# -*- coding:utf-8 -*-
# @Time:2024/6/27 14:35
# @Software:PyCharm
__author__ = "JentZhang"

import re

import pandas


def extract_info(text):

    # 匹配SSH类型的文本
    pattern = re.compile(r'\[\+\] (.+) (http://|https://)?([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3})(:(\d+))?.*')

    match = pattern.search(text)

    if match:
        return {
            '类型': match.group(1),
            'IP': match.group(3),
            '端口': match.group(5)
        }

    return None


def extract_lines(filepath, start_msg='[+]'):
    """
    抽取扫描结果中的指定行
    :param filepath:
    :param start_msg:
    :return:
    """
    matching_lines = []
    with open(filepath, 'r', encoding='utf-8') as file:
        for line in file:
            if line.startswith(start_msg):
                matching_lines.append(line.strip())
    return matching_lines


def export_to_excel(data, filename):
    """
    导出数据到excel
    :param data:
    :param filename:
    :return:
    """
    df = pandas.DataFrame(data)
    df.to_excel(f"{filename}资产测绘.xlsx", index=False)


def analysis_data(file_data):
    """
    分析扫描的文件数据
    :param file_data:
    :return:
    """
    res = []
    for i in file_data:
        # print(f"before: {i}")
        info = extract_info(i)
        if info:
            info["扫描结果"] = i
            res.append(info)
            # print(f"after: {info}")
    return res


if __name__ == '__main__':
    # files = ["10_139_0_0_23.txt", "10_139_162_0_23.txt", "10_139_176_0_21.txt"]
    files = ["172_16_0_0_16.txt"]
    for file in files:  # 循环便利扫描的结果文件,分析出结果并导出Excel
        d = extract_lines(file)
        export_to_excel(analysis_data(d), file.split(".")[0])

  • 报告样式

image

posted on 2024-06-28 15:33  JentZhang  阅读(135)  评论(0编辑  收藏  举报