Skip to content
This repository has been archived by the owner on Apr 25, 2024. It is now read-only.

Latest commit

 

History

History
173 lines (125 loc) · 7.84 KB

README.zh-cn.md

File metadata and controls

173 lines (125 loc) · 7.84 KB

框架介绍

ISF(Industrial Exploitation Framework),是一款基于python编写的类似metasploit的工控安全测试框架。

ISF基于开源项目routersploit修改而来。

该文档的其他语言版本: English, 简体中文,

免责声明

未经事先双方同意,使用ISF对目标进行攻击性测试是非法的。最终用户有责任遵守所有适用的地方、州和联邦法律。 开发人员对使用该程序造成的任何损害不承担责任。

工控协议客户端

Name Path Description
modbus_tcp_client icssploit/clients/modbus_tcp_client.py Modbus-TCP客户端工具
wdb2_client icssploit/clients/wdb2_client.py WdbRPC Version 2 客户端工具(Vxworks 6.x)
s7_client icssploit/clients/s7_client.py s7comm 客户端工具(S7 300/400 PLC)

Exploit 模块

Name Path Description
s7_300_400_plc_control exploits/plcs/siemens/s7_300_400_plc_control.py S7-300/400 PLC 启停脚本
s7_1200_plc_control exploits/plcs/siemens/s7_1200_plc_control.py S7-1200 PLC 启停/重置
vxworks_rpc_dos exploits/plcs/vxworks/vxworks_rpc_dos.py Vxworks RPC 远程拒绝服务(CVE-2015-7599)
quantum_140_plc_control exploits/plcs/schneider/quantum_140_plc_control.py Schneider Quantum 140系列 PLC启停脚本
crash_qnx_inetd_tcp_service exploits/plcs/qnx/crash_qnx_inetd_tcp_service.py Crash QNX Inetd TCP Service
qconn_remote_exec exploits/plcs/qnx/qconn_remote_exec.py QNX QCONN 远程代码执行
profinet_set_ip exploits/plcs/siemens/profinet_set_ip.py Profinet DCP 设备 IP 配置

Scanner 模块

Name Path Description
profinet-dcp-scan scanners/profinet-dcp-scan.py Profinet DCP 扫描器
vxworks_6_scan scanners/vxworks_6_scan.py Vxworks 6.x 扫描器
s7comm_scan scanners/s7comm_scan.py S7comm 扫描器
enip_scan scanners/enip_scan.py EthernetIP 扫描器

ICS 协议模块 (使用Scapy编写)

这些协议模块能够与其他Fuzz框架进行结合,例如Kitty或用于编写属于你自己的客户端工具.

Name Path Description
pn_dcp icssploit/protocols/pn_dcp Profinet DCP 协议
modbus_tcp icssploit/protocols/modbus_tcp Modbus TCP 协议
wdbrpc2 icssploit/protocols/wdbrpc2 WDB RPC Version 2 协议
s7comm icssploit/protocols/s7comm.py S7comm 协议

安装

python依赖环境

在Kali 中安装

git clone https://github.com/dark-lbp/isf/
cd isf
python isf.py

使用

    root@kali:~/Desktop/temp/isf# python isf.py
    
      _____ _____  _____ _____ _____  _      ____ _____ _______
     |_   _/ ____|/ ____/ ____|  __ \| |    / __ \_   _|__   __|
       | || |    | (___| (___ | |__) | |   | |  | || |    | |
       | || |     \___ \\___ \|  ___/| |   | |  | || |    | |
      _| || |____ ____) |___) | |    | |___| |__| || |_   | |
     |_____\_____|_____/_____/|_|    |______\____/_____|  |_|
    
    
                    ICS Exploitation Framework
    
    Note     : ICSSPOLIT is fork from routersploit at
               https://github.com/reverse-shell/routersploit
    Dev Team : wenzhe zhu(dark-lbp)
    Version  : 0.1.0
    
    Exploits: 2 Scanners: 0 Creds: 13
    
    ICS Exploits:
        PLC: 2          ICS Switch: 0
        Software: 0
    
    isf >

Exploits

isf > use exploits/plcs/
exploits/plcs/siemens/  exploits/plcs/vxworks/
isf > use exploits/plcs/siemens/s7_300_400_plc_control
exploits/plcs/siemens/s7_300_400_plc_control
isf > use exploits/plcs/siemens/s7_300_400_plc_control
isf (S7-300/400 PLC Control) >

可以使用TAB键来补全路径。

Options

显示 options

isf (S7-300/400 PLC Control) > show options

Target options:

   Name       Current settings     Description
   ----       ----------------     -----------
   target                          Target address e.g. 192.168.1.1
   port       102                  Target Port


Module options:

   Name        Current settings     Description
   ----        ----------------     -----------
   slot        2                    CPU slot number.
   command     1                    Command 0:start plc, 1:stop plc.


isf (S7-300/400 PLC Control) >

设置 options 参数

isf (S7-300/400 PLC Control) > set target 192.168.70.210
[+] {'target': '192.168.70.210'}

执行module

isf (S7-300/400 PLC Control) > run
[*] Running module...
[+] Target is alive
[*] Sending packet to target
[*] Stop plc
isf (S7-300/400 PLC Control) >

显示module信息

isf (S7-300/400 PLC Control) > show info

Name:
S7-300/400 PLC Control

Description:
Use S7comm command to start/stop plc.

Devices:
-  Siemens S7-300 and S7-400 programmable logic controllers (PLCs)

Authors:
-  wenzhe zhu <jtrkid[at]gmail.com>

References:

isf (S7-300/400 PLC Control) >

说明文档