SploitScan:一款多功能实用型安全漏洞管理平台

server/2024/10/19 2:26:29/

关于SploitScan

SploitScan是一款功能完善的实用型网络安全漏洞管理工具,该工具提供了用户友好的界面,旨在简化广大研究人员识别已知安全漏洞的相关信息和复现过程。

SploitScan可以帮助网络安全专业人员快速识别和测试已知安全漏洞,如果你需要寻求加强安全措施或针对新出现威胁制定强大检测策略,那么SploitScan会是你的绝佳选择。

功能介绍

当前版本的SploitScan支持下列功能:

1、CVE信息检索:从国家漏洞数据库获取CVE详细信息;

2、EPSS集成:包括利用预测评分系统(EPSS)数据,为CVE利用的可能性提供概率评分,有助于确定漏洞优先级;

3、公共漏洞信息聚合:收集公开可用的漏洞及其相关信息,帮助研究人员更好地了解漏洞的信息;

4、CISA KEV:显示CVE是否已列入CISA的已知可利用安全漏洞(KEV)中;

5、修复优先级系统:根据包括公共漏洞可利用性在内的各种因素,评估并分配漏洞修复的优先级;

6、多CVE支持和导出选项:在一次任务执行中支持多个CVE,并允许将结果导出为HTML、JSON和CSV格式;

7、漏洞扫描程序导入:从流行的漏洞扫描程序中导入漏洞扫描功能,并直接搜索已知的漏洞利用PoC;

8、人工智能驱动的风险评估:利用OpenAI提供详细的风险评估、潜在攻击场景、缓解建议和执行摘要;

9、用户友好的界面:易于使用,提供清晰简洁的信息;

10、全面的安全工具:非常适合进行快速安全评估,并随时了解最近的漏洞信息;

支持的漏洞利用数据库

1、GitHub;

2、ExploitDB;

3、VulnCheck;(需要一个免费的VulnCheck API密钥)

4、Packet Storm;

5、Nuclei;

支持导入的漏洞扫描功能

1、Nessus (.nessus)

2、Nexpose (.xml)

3、OpenVAS (.xml)

4、Docker (.json)

工具安装

GitHub安装

git clone https://github.com/xaitax/SploitScan.gitcd sploitscanpip install -r requirements.txt

pip安装

pip install --user sploitscan

Kali/Ubuntu/Debian安装

apt install sploitscan

配置文件

在使用该工具之前,我们还需要在下列其中一个位置创建一个config.json文件,并提供自己的API密钥:

~/.当前目录~/.sploitscan/~/.config/sploitscan//etc/sploitscan/

config.json文件内容格式如下:

{"vulncheck_api_key": "your_vulncheck_api_key","openai_api_key": "your_openai_api_key"}

工具使用

参数选项

-h, --help            显示工具帮助信息和退出-e {json,JSON,csv,CSV,html,HTML}, --export {json,JSON,csv,CSV,html,HTML}可选: 将结果导出为JSON、CSV或HTML文件格式-t {nessus,nexpose,openvas,docker}, --type {nessus,nexpose,openvas,docker}指定导入文件的类型: 'nessus'、'nexpose'、'openvas'或'docker'-i IMPORT_FILE, --import-file IMPORT_FILE导入文件的路径

查询单个CVE

sploitscan CVE-2024-1709

查询多个CVE

sploitscan CVE-2024-1709 CVE-2024-21413

漏洞扫描器导入

需指定导入的类型,例如'nessus'、'nexpose'、'openvas'或'docker,并提供文件路径:

sploitscan --import-file path/to/yourfile.nessus --type nessus

结果导出

需指定导出格式,例如'json'、'csv'或'html':

sploitscan CVE-2024-1709 -e html

Docker

docker build -t sploitscan .docker run --rm sploitscan CVE-2024-1709

Windows(PowerShell)

docker run -v ${PWD}:/app --rm sploitscan CVE-2024-1709 -e JSON

Linux

docker run -v $(pwd):/app --rm sploitscan CVE-2024-1709 -e JSON

工具输出样例

$ sploitscan.py CVE-2024-21413[...]┌───[  AI-Powered Risk Assessment ]|| 1. Risk Assessment| -------------------| The vulnerability identified by CVE-2024-21413 is a critical remote code execution flaw in| Microsoft Outlook with a CVSS score of 9.8. The impact on business operations can be severe due to| its high potential to be exploited over a network without any user interactions or elevated| privileges. This unvalidated input vulnerability (CWE-20) could allow an attacker to execute| arbitrary code on the target system, thereby compromising the confidentiality, integrity, and| availability of critical business data and systems. Given its critical rating and the existence of| multiple exploits on public repositories like GitHub, the likelihood of exploitation is very high.| This necessitates immediate attention from the security teams to mitigate the risks associated.|| 2. Potential Attack Scenarios| ------------------------------| An attacker could exploit this vulnerability by sending a specially crafted email to a victim| using Microsoft Outlook. Once the email is opened or previewed, the malicious payload would| execute, allowing the attacker to gain control over the victim's system. The process involves: 1.| Crafting a malicious email leveraging the specific flaw in email handling within Microsoft| Outlook. 2. Sending the email to the intended victim. 3. Upon opening or previewing the email, the| victim’s system executes the malicious code. The potential outcomes of this attack include theft| of sensitive information, installation of malware or ransomware, and compromising other systems| within the same network due to lateral movement capabilities.|| 3. Mitigation Recommendations| ------------------------------| Immediate mitigation recommendation includes: 1. Applying the latest security patches provided by| Microsoft. Reference: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413 2.| Implementing network-level protections such as email filtering and network segmentation to limit| the spread of potential infections. 3. Conducting regular security awareness training for users to| recognize phishing and malicious emails. 4. Monitoring network and system activity for signs of| suspicious behavior and unauthorized execution. 5. Regularly backing up critical data and ensuring| the integrity of backups.|| 4. Executive Summary| ---------------------| CVE-2024-21413, a critical remote code execution vulnerability in Microsoft Outlook, poses a| significant risk to businesses due to its potential to be exploited without user interaction.| Multiple exploit proofs are publicly available, increasing the likelihood of attacks.| Organizations must act swiftly by applying the necessary patches from Microsoft, enhancing their| email security protocols, and educating their staff to identify potential phishing attempts.| Mitigating this vulnerability is essential to protect sensitive information, maintain business| integrity, and ensure system availability, thus preventing potential financial and reputational| damage. Immediate action is crucial to safeguard the organization against this severe threat.|└────────────────────────────────────────

许可证协议

本项目的开发与发布遵循GPL-3.0开源许可协议。

项目地址

SploitScan:【GitHub传送门】

参考资料

PoC in GitHub

Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers

VulnCheck - Outpace Adversaries

Packet Storm

GitHub - projectdiscovery/nuclei-templates: Community curated list of templates for the nuclei engine to find security vulnerabilities.

Nessus Vulnerability Scanner: Network Security Solution | Tenable®

Nexpose On-Premise Vulnerability Scanner - Rapid7

OpenVAS - Open Vulnerability Assessment Scanner

https://docs.docker.com/scout/ 


http://www.ppmy.cn/server/47675.html

相关文章

C++的算法:贪心算法

贪心算法(Greedy Algorithm)是一种在每一步选择中都采取在当前状态下最好或最优(即最有利)的选择,从而希望导致结果是全局最好或最优的算法。贪心算法在有最优子结构的问题中尤为有效,它所做的每一个选择都是基于一个局部最优决策,从而希望导致全局最优解。然而,贪心算…

LeetCode-103. 二叉树的锯齿形层序遍历【树 广度优先搜索 二叉树】

LeetCode-103. 二叉树的锯齿形层序遍历【树 广度优先搜索 二叉树】 题目描述:解题思路一:层序遍历,唯一区别就是ans.append(level[::-1] if len(ans) % 2 else level)背诵版:解题思路三:0 题目描述: 给你二…

Python 高手编程系列三:用于保持跨版本兼容性的常用工具和技术

在 Python 不同版本之间保持兼容性是一项挑战。根据项目的大小不同,这项挑战可能 会增加许多额外的工作量,但绝对可行,也很值得去做。对于在许多环境中都会用到的 Python 包来说,必须要保持跨版本兼容性。如果开源包没有定义明确并…

Android AAudio——C API控制音频流(四)

上一篇文章我们介绍了 C API 中音频流的创建流程,以及打开音频流操作,这里我们再来看一下音频流的其他操作流程 一、音频流操作介绍 1、操作流程图 下图是状态变化流程图,虚线框表示瞬时状态,实线框表示稳定状态。 2、操作函数 上图中主要包含下面几个操作函数: aaudio…

微信小程序动画和Canvas笔记

微信小程序动画和Canvas 动画 使用wx.createAnimation创建动画对象 // 创建动画对象 const animation wx.createAnimation({duration: 1000, // 动画持续时间timingFunction: ease, // 动画速度曲线delay: 0, // 动画延迟时间transformOrigin: 50% 50% 0, // 动画的中心点 …

java项目使用jsch下载ftp文件

pom <dependency><groupId>com.jcraft</groupId><artifactId>jsch</artifactId><version>0.1.55</version> </dependency>demo1&#xff1a;main方法直接下载 package com.example.controller;import com.jcraft.jsch.*; im…

进程间通信(27000字超详解)

&#x1f30e;进程间通信 文章目录&#xff1a; 进程间通信 进程间通信简介       进程间通信目的       初识进程间通信       进程间通信的分类 匿名管道通信       认识管道       匿名管道       匿名管道测试       管道的四种…

OpenCV学习(4.1) 改变颜色空间

1.目标 在本教程中&#xff0c;你将学习如何将图像从一个色彩空间转换到另一个&#xff0c;像BGR↔灰色&#xff0c;BGR↔HSV等除此之外&#xff0c;我们还将创建一个应用程序&#xff0c;以提取视频中的彩色对象你将学习以下功能&#xff1a;cv2.cvtColor&#xff0c;**cv2.i…