added Comments
This commit is contained in:
26
Scanner.src
26
Scanner.src
@@ -1,24 +1,31 @@
|
||||
// name import Database/functions
|
||||
import_code("/root/myprogram")
|
||||
|
||||
if params.len == 0 then exit("<b>Usage: </b>scanner [IP]")
|
||||
if params.len == 0 then exit("<b>Usage: </b>scanner [IP/WEB_Address]")
|
||||
|
||||
|
||||
// import metaexploit from /lib or current folder
|
||||
metaxploit = include_lib("/lib/metaxploit.so")
|
||||
if not metaxploit then
|
||||
metaxploit = include_lib(current_path + "/metaxploit.so")
|
||||
end if
|
||||
if not metaxploit then exit("Error: Can't find metaxploit library in the /lib path or the current folder")
|
||||
|
||||
// convert argv for easier readability
|
||||
target_ip = params[0]
|
||||
|
||||
if not is_valid_ip(target_ip) then exit(target_ip + " is not a valid ip")
|
||||
|
||||
if nslookup(target_ip) == "Not found" then
|
||||
exit("<color=red><b>That domain is not valid.</b></color>")
|
||||
if not is_valid_ip(target_ip) then
|
||||
target_ip = nslookup(target_ip)
|
||||
if not is_valid_ip(target_ip) then exit("<b>Usage: </b>scanner [IP/WEB_Address]")
|
||||
end if
|
||||
|
||||
// fetch router object en configured ports
|
||||
target_router = get_router(target_ip)
|
||||
target_ports = target_router.used_ports
|
||||
|
||||
// print details of router and configured ports
|
||||
// TODO: Add port status
|
||||
// TODO: Add deepscan for connected devices
|
||||
column = "<b>Number Type Version IP</b>"
|
||||
column = column + "\n" + "0" + " " + "kernel_router" + " " + target_router.kernel_version + " " + target_router.local_ip
|
||||
for port in target_ports
|
||||
@@ -29,7 +36,8 @@ print("\nIP Address : " + target_ip)
|
||||
print(format_columns(column))
|
||||
|
||||
|
||||
|
||||
// Trying to figure out what privileges the connected user has by checking what permissions are avaiable on commen files.
|
||||
// TODO: Needs confirming, initial tests seem correct.
|
||||
checkPrivilege = function(result)
|
||||
if(typeof(result) == "shell") then result = result.host_computer
|
||||
if(typeof(result) == "computer") then
|
||||
@@ -45,6 +53,10 @@ checkPrivilege = function(result)
|
||||
return "null"
|
||||
end function
|
||||
|
||||
|
||||
// scan port on IP address. Set optional local ip address for extra kernel_router exploits and a password for pass change exploits
|
||||
// TODO: figure out how to get proper feedback from firewall exploits and pass change exploits.
|
||||
// TODO: figure out how to get requirments for exploits.
|
||||
scanPort = function(ip, port, optional)
|
||||
net_session = metaxploit.net_use(ip,port)
|
||||
|
||||
@@ -71,7 +83,7 @@ end function
|
||||
|
||||
|
||||
|
||||
|
||||
// DO ALL THE THINGS. needs cleaning
|
||||
scanPort(target_ip, 0, target_router.local_ip)
|
||||
for port in target_ports
|
||||
|
||||
|
||||
Reference in New Issue
Block a user