3
3
"""
4
4
analyze_hosts - scans one or more hosts for security misconfigurations
5
5
6
- Copyright (C) 2015-2016 Peter Mosmans [Go Forward]
6
+ Copyright (C) 2015-2017 Peter Mosmans [Go Forward]
7
7
This program is free software: you can redistribute it and/or modify
8
8
it under the terms of the GNU General Public License as published by
9
9
the Free Software Foundation, either version 3 of the License, or
43
43
sys .stderr .flush ()
44
44
45
45
46
- VERSION = '0.33.1'
47
- ALLPORTS = [25 , 80 , 443 , 465 , 993 , 995 , 8080 ]
46
+ VERSION = '0.34.0'
47
+ ALLPORTS = [(22 , 'ssh' ), (25 , 'smtp' ), (80 , 'http' ), (443 , 'https' ),
48
+ (465 , 'smtps' ), (993 , 'imaps' ), (995 , 'pop3s' ) , (8080 , 'http-proxy' )]
49
+ SSL_PORTS = [25 , 443 , 465 , 993 , 995 ]
48
50
NMAP_ARGUMENTS = ['--open' , '-sV' ]
49
51
NMAP_SCRIPTS = ['banner' , 'dns-nsid' , 'dns-recursion' , 'http-cisco-anyconnect' ,
50
52
'http-php-version' , 'http-title' , 'http-trace' , 'ntp-info' ,
@@ -151,18 +153,16 @@ def requests_get(url, options, headers=None, allow_redirects=True):
151
153
return request
152
154
153
155
154
- def http_checks (host , port , options , logfile ):
156
+ def http_checks (host , port , protocol , options , logfile ):
155
157
"""
156
158
Perform various HTTP checks.
157
159
"""
158
- # TODO: this check is shoddy, as it relies on port number and not on protocol
159
- ssl_proto = (port == 443 )
160
- if ssl_proto :
160
+ if 'ssl' in protocol or 'https' in protocol :
161
161
url = 'https://{0}:{1}' .format (host , port )
162
162
else :
163
163
url = 'http://{0}:{1}' .format (host , port )
164
164
for tool in ['curl' , 'nikto' ]:
165
- use_tool (tool , host , port , options , logfile )
165
+ use_tool (tool , host , port , protocol , options , logfile )
166
166
if options ['dry_run' ]:
167
167
return
168
168
if options ['framework' ]:
@@ -173,12 +173,12 @@ def http_checks(host, port, options, logfile):
173
173
check_compression (url , options , ssl_proto = ssl_proto )
174
174
175
175
176
- def tls_checks (host , port , options , logfile ):
176
+ def tls_checks (host , port , protocol , options , logfile ):
177
177
"""
178
178
Perform various SSL/TLS checks.
179
179
"""
180
180
if options ['ssl' ]:
181
- use_tool ('testssl.sh' , host , port , options , logfile )
181
+ use_tool ('testssl.sh' , host , port , protocol , options , logfile )
182
182
if options ['sslcert' ]:
183
183
download_cert (host , port , options , logfile )
184
184
@@ -454,13 +454,14 @@ def do_portscan(host, options, logfile, stop_event):
454
454
stop_event: Event handler for stop event
455
455
456
456
Returns:
457
- A list of open ports.
457
+ A list with tuples of open ports and the protocol .
458
458
"""
459
459
open_ports = []
460
460
arguments = NMAP_ARGUMENTS
461
461
scripts = NMAP_SCRIPTS
462
462
if options ['no_portscan' ] and options ['port' ]:
463
- return [int (port ) for port in options ['port' ].split (',' ) if port .isdigit ()]
463
+ ports = [int (port ) for port in options ['port' ].split (',' ) if port .isdigit ()]
464
+ return zip (ports , ['unknown' ] * len (ports ))
464
465
if not options ['nmap' ] or (options ['no_portscan' ] and not options ['port' ]):
465
466
return ALLPORTS
466
467
if is_admin ():
@@ -494,8 +495,10 @@ def do_portscan(host, options, logfile, stop_event):
494
495
scanner .scan (hosts = host , arguments = arguments )
495
496
for ip_address in [x for x in scanner .all_hosts () if scanner [x ] and
496
497
scanner [x ].state () == 'up' ]:
497
- open_ports = [port for port in scanner [ip_address ].all_tcp () if
498
+ ports = [port for port in scanner [ip_address ].all_tcp () if
498
499
scanner [ip_address ]['tcp' ][port ]['state' ] == 'open' ]
500
+ for port in ports :
501
+ open_ports .append ([port , scanner [ip_address ]['tcp' ][port ]['name' ]])
499
502
if options ['no_portscan' ] or len (open_ports ):
500
503
append_file (logfile , options , temp_file )
501
504
if len (open_ports ):
@@ -521,15 +524,15 @@ def get_binary(tool):
521
524
return tool
522
525
523
526
524
- def do_testssl (host , port , options , logfile ):
527
+ def do_testssl (host , port , protocol , options , logfile ):
525
528
"""
526
529
Check SSL/TLS configuration and vulnerabilities.
527
530
"""
528
531
command = [get_binary ('testssl.sh' ), '--quiet' , '--warnings' , 'off' , '--color' , '0' ,
529
532
'-p' , '-f' , '-U' , '-S' ]
530
533
if options ['timeout' ]:
531
534
command = [get_binary ('timeout' ), str (options ['maxtime' ])] + command
532
- if port == 25 :
535
+ if 'smtp' in protocol :
533
536
command += ['--starttls' , 'smtp' ]
534
537
logging .info ('%s Starting testssl.sh on port %s' , host , port )
535
538
_result , stdout , _stderr = execute_command (command + # pylint: disable=unused-variable
@@ -604,19 +607,7 @@ def remove_from_queue(finished_queue, stop_event, options):
604
607
logging .debug ('Exiting remove_from_queue thread' )
605
608
606
609
607
- def port_open (port , open_ports ):
608
- """
609
- Check whether a port has been flagged as open.
610
- Returns True if the port was open, or hasn't been scanned.
611
-
612
- Arguments:
613
- - `port`: the port to look up
614
- - `open_ports`: a list of open ports, or -1 if it hasn't been scanned.
615
- """
616
- return (UNKNOWN in open_ports ) or (port in open_ports )
617
-
618
-
619
- def use_tool (tool , host , port , options , logfile ):
610
+ def use_tool (tool , host , port , protocol , options , logfile ):
620
611
"""
621
612
Wrapper to see if tool is available, and to start correct tool.
622
613
"""
@@ -627,7 +618,7 @@ def use_tool(tool, host, port, options, logfile):
627
618
if tool == 'curl' :
628
619
do_curl (host , port , options , logfile )
629
620
if tool == 'testssl.sh' :
630
- do_testssl (host , port , options , logfile )
621
+ do_testssl (host , port , protocol , options , logfile )
631
622
632
623
633
624
def process_host (options , host_queue , output_queue , finished_queue , stop_event ):
@@ -645,14 +636,14 @@ def process_host(options, host_queue, output_queue, finished_queue, stop_event):
645
636
if UNKNOWN in open_ports :
646
637
logging .info ('%s Scan interrupted ?' , host )
647
638
else :
648
- for port in open_ports :
639
+ for port , protocol in open_ports :
649
640
if stop_event .isSet ():
650
641
logging .info ('%s Scan interrupted ?' , host )
651
642
break
652
- if port in [ 80 , 443 , 8080 ] :
653
- http_checks (host , port , options , host_logfile )
654
- if port in [ 25 , 443 , 465 , 993 , 995 ] :
655
- tls_checks (host , port , options , host_logfile )
643
+ if 'http' in protocol :
644
+ http_checks (host , port , protocol , options , host_logfile )
645
+ if 'ssl' in protocol or port in SSL_PORTS :
646
+ tls_checks (host , port , protocol , options , host_logfile )
656
647
else :
657
648
logging .info ('%s Nothing to report' , host )
658
649
if os .path .isfile (host_logfile ) and os .stat (host_logfile ).st_size :
0 commit comments