Skip to content

Commit d6810cc

Browse files
committed
Implement proper protocol detection, closes #23
The protocol detection is done by nmap, and scan engines are run depending on those results.
1 parent d29758b commit d6810cc

File tree

1 file changed

+25
-34
lines changed

1 file changed

+25
-34
lines changed

analyze_hosts.py

+25-34
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"""
44
analyze_hosts - scans one or more hosts for security misconfigurations
55
6-
Copyright (C) 2015-2016 Peter Mosmans [Go Forward]
6+
Copyright (C) 2015-2017 Peter Mosmans [Go Forward]
77
This program is free software: you can redistribute it and/or modify
88
it under the terms of the GNU General Public License as published by
99
the Free Software Foundation, either version 3 of the License, or
@@ -43,8 +43,10 @@
4343
sys.stderr.flush()
4444

4545

46-
VERSION = '0.33.1'
47-
ALLPORTS = [25, 80, 443, 465, 993, 995, 8080]
46+
VERSION = '0.34.0'
47+
ALLPORTS = [(22, 'ssh'), (25, 'smtp'), (80, 'http'), (443, 'https'),
48+
(465, 'smtps'), (993, 'imaps'), (995, 'pop3s') , (8080, 'http-proxy')]
49+
SSL_PORTS = [25, 443, 465, 993, 995]
4850
NMAP_ARGUMENTS = ['--open', '-sV']
4951
NMAP_SCRIPTS = ['banner', 'dns-nsid', 'dns-recursion', 'http-cisco-anyconnect',
5052
'http-php-version', 'http-title', 'http-trace', 'ntp-info',
@@ -151,18 +153,16 @@ def requests_get(url, options, headers=None, allow_redirects=True):
151153
return request
152154

153155

154-
def http_checks(host, port, options, logfile):
156+
def http_checks(host, port, protocol, options, logfile):
155157
"""
156158
Perform various HTTP checks.
157159
"""
158-
# TODO: this check is shoddy, as it relies on port number and not on protocol
159-
ssl_proto = (port == 443)
160-
if ssl_proto:
160+
if 'ssl' in protocol or 'https' in protocol:
161161
url = 'https://{0}:{1}'.format(host, port)
162162
else:
163163
url = 'http://{0}:{1}'.format(host, port)
164164
for tool in ['curl', 'nikto']:
165-
use_tool(tool, host, port, options, logfile)
165+
use_tool(tool, host, port, protocol, options, logfile)
166166
if options['dry_run']:
167167
return
168168
if options['framework']:
@@ -173,12 +173,12 @@ def http_checks(host, port, options, logfile):
173173
check_compression(url, options, ssl_proto=ssl_proto)
174174

175175

176-
def tls_checks(host, port, options, logfile):
176+
def tls_checks(host, port, protocol, options, logfile):
177177
"""
178178
Perform various SSL/TLS checks.
179179
"""
180180
if options['ssl']:
181-
use_tool('testssl.sh', host, port, options, logfile)
181+
use_tool('testssl.sh', host, port, protocol, options, logfile)
182182
if options['sslcert']:
183183
download_cert(host, port, options, logfile)
184184

@@ -454,13 +454,14 @@ def do_portscan(host, options, logfile, stop_event):
454454
stop_event: Event handler for stop event
455455
456456
Returns:
457-
A list of open ports.
457+
A list with tuples of open ports and the protocol.
458458
"""
459459
open_ports = []
460460
arguments = NMAP_ARGUMENTS
461461
scripts = NMAP_SCRIPTS
462462
if options['no_portscan'] and options['port']:
463-
return [int(port) for port in options['port'].split(',') if port.isdigit()]
463+
ports = [int(port) for port in options['port'].split(',') if port.isdigit()]
464+
return zip(ports, ['unknown'] * len(ports))
464465
if not options['nmap'] or (options['no_portscan'] and not options['port']):
465466
return ALLPORTS
466467
if is_admin():
@@ -494,8 +495,10 @@ def do_portscan(host, options, logfile, stop_event):
494495
scanner.scan(hosts=host, arguments=arguments)
495496
for ip_address in [x for x in scanner.all_hosts() if scanner[x] and
496497
scanner[x].state() == 'up']:
497-
open_ports = [port for port in scanner[ip_address].all_tcp() if
498+
ports = [port for port in scanner[ip_address].all_tcp() if
498499
scanner[ip_address]['tcp'][port]['state'] == 'open']
500+
for port in ports:
501+
open_ports.append([port, scanner[ip_address]['tcp'][port]['name']])
499502
if options['no_portscan'] or len(open_ports):
500503
append_file(logfile, options, temp_file)
501504
if len(open_ports):
@@ -521,15 +524,15 @@ def get_binary(tool):
521524
return tool
522525

523526

524-
def do_testssl(host, port, options, logfile):
527+
def do_testssl(host, port, protocol, options, logfile):
525528
"""
526529
Check SSL/TLS configuration and vulnerabilities.
527530
"""
528531
command = [get_binary('testssl.sh'), '--quiet', '--warnings', 'off', '--color', '0',
529532
'-p', '-f', '-U', '-S']
530533
if options['timeout']:
531534
command = [get_binary('timeout'), str(options['maxtime'])] + command
532-
if port == 25:
535+
if 'smtp' in protocol:
533536
command += ['--starttls', 'smtp']
534537
logging.info('%s Starting testssl.sh on port %s', host, port)
535538
_result, stdout, _stderr = execute_command(command + # pylint: disable=unused-variable
@@ -604,19 +607,7 @@ def remove_from_queue(finished_queue, stop_event, options):
604607
logging.debug('Exiting remove_from_queue thread')
605608

606609

607-
def port_open(port, open_ports):
608-
"""
609-
Check whether a port has been flagged as open.
610-
Returns True if the port was open, or hasn't been scanned.
611-
612-
Arguments:
613-
- `port`: the port to look up
614-
- `open_ports`: a list of open ports, or -1 if it hasn't been scanned.
615-
"""
616-
return (UNKNOWN in open_ports) or (port in open_ports)
617-
618-
619-
def use_tool(tool, host, port, options, logfile):
610+
def use_tool(tool, host, port, protocol, options, logfile):
620611
"""
621612
Wrapper to see if tool is available, and to start correct tool.
622613
"""
@@ -627,7 +618,7 @@ def use_tool(tool, host, port, options, logfile):
627618
if tool == 'curl':
628619
do_curl(host, port, options, logfile)
629620
if tool == 'testssl.sh':
630-
do_testssl(host, port, options, logfile)
621+
do_testssl(host, port, protocol, options, logfile)
631622

632623

633624
def process_host(options, host_queue, output_queue, finished_queue, stop_event):
@@ -645,14 +636,14 @@ def process_host(options, host_queue, output_queue, finished_queue, stop_event):
645636
if UNKNOWN in open_ports:
646637
logging.info('%s Scan interrupted ?', host)
647638
else:
648-
for port in open_ports:
639+
for port, protocol in open_ports:
649640
if stop_event.isSet():
650641
logging.info('%s Scan interrupted ?', host)
651642
break
652-
if port in [80, 443, 8080]:
653-
http_checks(host, port, options, host_logfile)
654-
if port in [25, 443, 465, 993, 995]:
655-
tls_checks(host, port, options, host_logfile)
643+
if 'http' in protocol:
644+
http_checks(host, port, protocol, options, host_logfile)
645+
if 'ssl' in protocol or port in SSL_PORTS:
646+
tls_checks(host, port, protocol, options, host_logfile)
656647
else:
657648
logging.info('%s Nothing to report', host)
658649
if os.path.isfile(host_logfile) and os.stat(host_logfile).st_size:

0 commit comments

Comments
 (0)