前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >SploitScan:一款多功能实用型安全漏洞管理平台

SploitScan:一款多功能实用型安全漏洞管理平台

作者头像
FB客服
发布2024-06-11 15:42:13
1170
发布2024-06-11 15:42:13
举报
文章被收录于专栏:FreeBufFreeBuf

关于SploitScan

SploitScan是一款功能完善的实用型网络安全漏洞管理工具,该工具提供了用户友好的界面,旨在简化广大研究人员识别已知安全漏洞的相关信息和复现过程。

SploitScan可以帮助网络安全专业人员快速识别和测试已知安全漏洞,如果你需要寻求加强安全措施或针对新出现威胁制定强大检测策略,那么SploitScan会是你的绝佳选择。

功能介绍

当前版本的SploitScan支持下列功能:

1、CVE信息检索:从国家漏洞数据库获取CVE详细信息; 2、EPSS集成:包括利用预测评分系统(EPSS)数据,为CVE利用的可能性提供概率评分,有助于确定漏洞优先级; 3、公共漏洞信息聚合:收集公开可用的漏洞及其相关信息,帮助研究人员更好地了解漏洞的信息; 4、CISA KEV:显示CVE是否已列入CISA的已知可利用安全漏洞(KEV)中; 5、修复优先级系统:根据包括公共漏洞可利用性在内的各种因素,评估并分配漏洞修复的优先级; 6、多CVE支持和导出选项:在一次任务执行中支持多个CVE,并允许将结果导出为HTML、JSON和CSV格式; 7、漏洞扫描程序导入:从流行的漏洞扫描程序中导入漏洞扫描功能,并直接搜索已知的漏洞利用PoC; 8、人工智能驱动的风险评估:利用OpenAI提供详细的风险评估、潜在攻击场景、缓解建议和执行摘要; 9、用户友好的界面:易于使用,提供清晰简洁的信息; 10、全面的安全工具:非常适合进行快速安全评估,并随时了解最近的漏洞信息;

支持的漏洞利用数据库

1、GitHub; 2、ExploitDB; 3、VulnCheck;(需要一个免费的VulnCheck API密钥) 4、Packet Storm; 5、Nuclei;

支持漏洞的扫描功能

1、Nessus (.nessus) 2、Nexpose (.xml) 3、OpenVAS (.xml) 4、Docker (.json)

工具安装

GitHub安装

代码语言:javascript
复制
git clone https://github.com/xaitax/SploitScan.git

cd sploitscan

pip install -r requirements.txt

pip安装

代码语言:javascript
复制
pip install --user sploitscan

Kali/Ubuntu/Debian安装

代码语言:javascript
复制
apt install sploitscan

配置文件

在使用该工具之前,我们还需要在下列其中一个位置创建一个config.json文件,并提供自己的API密钥:

代码语言:javascript
复制
~/.当前目录

~/.sploitscan/

~/.config/sploitscan/

/etc/sploitscan/

config.json文件内容格式如下:

代码语言:javascript
复制
{"vulncheck_api_key": "your_vulncheck_api_key","openai_api_key": "your_openai_api_key"}

工具使用

参数选项

代码语言:javascript
复制
-h, --help            显示工具帮助信息和退出

-e {json,JSON,csv,CSV,html,HTML}, --export {json,JSON,csv,CSV,html,HTML}

                    可选: 将结果导出为JSON、CSV或HTML文件格式

-t {nessus,nexpose,openvas,docker}, --type {nessus,nexpose,openvas,docker}

                    指定导入文件的类型: 'nessus'、'nexpose'、'openvas'或'docker'

-i IMPORT_FILE, --import-file IMPORT_FILE

                    导入文件的路径

查询单个CVE

代码语言:javascript
复制
sploitscan CVE-2024-1709

查询多个CVE

代码语言:javascript
复制
sploitscan CVE-2024-1709 CVE-2024-21413

从漏洞扫描器导入

需指定导入的类型,例如'nessus'、'nexpose'、'openvas'或'docker,并提供文件路径:

代码语言:javascript
复制
sploitscan --import-file path/to/yourfile.nessus --type nessus

结果导出

需指定导出格式,例如'json'、'csv'或'html':

代码语言:javascript
复制
sploitscan CVE-2024-1709 -e html

Docker

代码语言:javascript
复制
docker build -t sploitscan .

docker run --rm sploitscan CVE-2024-1709

Windows(PowerShell)

代码语言:javascript
复制
docker run -v ${PWD}:/app --rm sploitscan CVE-2024-1709 -e JSON

Linux

代码语言:javascript
复制
docker run -v $(pwd):/app --rm sploitscan CVE-2024-1709 -e JSON

工具输出样例

代码语言:javascript
复制
$ sploitscan.py CVE-2024-21413



[...]



┌───[  AI-Powered Risk Assessment ]

|

| 1. Risk Assessment

| -------------------

| The vulnerability identified by CVE-2024-21413 is a critical remote code execution flaw in

| Microsoft Outlook with a CVSS score of 9.8. The impact on business operations can be severe due to

| its high potential to be exploited over a network without any user interactions or elevated

| privileges. This unvalidated input vulnerability (CWE-20) could allow an attacker to execute

| arbitrary code on the target system, thereby compromising the confidentiality, integrity, and

| availability of critical business data and systems. Given its critical rating and the existence of

| multiple exploits on public repositories like GitHub, the likelihood of exploitation is very high.

| This necessitates immediate attention from the security teams to mitigate the risks associated.

|

| 2. Potential Attack Scenarios

| ------------------------------

| An attacker could exploit this vulnerability by sending a specially crafted email to a victim

| using Microsoft Outlook. Once the email is opened or previewed, the malicious payload would

| execute, allowing the attacker to gain control over the victim's system. The process involves: 1.

| Crafting a malicious email leveraging the specific flaw in email handling within Microsoft

| Outlook. 2. Sending the email to the intended victim. 3. Upon opening or previewing the email, the

| victim’s system executes the malicious code. The potential outcomes of this attack include theft

| of sensitive information, installation of malware or ransomware, and compromising other systems

| within the same network due to lateral movement capabilities.

|

| 3. Mitigation Recommendations

| ------------------------------

| Immediate mitigation recommendation includes: 1. Applying the latest security patches provided by

| Microsoft. Reference: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413 2.

| Implementing network-level protections such as email filtering and network segmentation to limit

| the spread of potential infections. 3. Conducting regular security awareness training for users to

| recognize phishing and malicious emails. 4. Monitoring network and system activity for signs of

| suspicious behavior and unauthorized execution. 5. Regularly backing up critical data and ensuring

| the integrity of backups.

|

| 4. Executive Summary

| ---------------------

| CVE-2024-21413, a critical remote code execution vulnerability in Microsoft Outlook, poses a

| significant risk to businesses due to its potential to be exploited without user interaction.

| Multiple exploit proofs are publicly available, increasing the likelihood of attacks.

| Organizations must act swiftly by applying the necessary patches from Microsoft, enhancing their

| email security protocols, and educating their staff to identify potential phishing attempts.

| Mitigating this vulnerability is essential to protect sensitive information, maintain business

| integrity, and ensure system availability, thus preventing potential financial and reputational

| damage. Immediate action is crucial to safeguard the organization against this severe threat.

|

└────────────────────────────────────────

许可证协议

本项目的开发与发布遵循GPL-3.0开源许可协议。

项目地址

SploitScan:

https://github.com/xaitax/SploitScan

https://poc-in-github.motikan2010.net/ https://www.exploit-db.com/ https://vulncheck.com/ https://packetstormsecurity.com/ https://github.com/projectdiscovery/nuclei-templates https://www.tenable.com/products/nessus https://www.rapid7.com/products/nexpose/ https://www.openvas.org/ https://docs.docker.com/scout/

本文参与 腾讯云自媒体同步曝光计划,分享自微信公众号。
原始发表:2024-06-04,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 FreeBuf 微信公众号,前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体同步曝光计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • GitHub安装
  • pip安装
  • Kali/Ubuntu/Debian安装
  • 配置文件
  • 参数选项
  • 查询单个CVE
  • 查询多个CVE
  • 从漏洞扫描器导入
  • 结果导出
  • Docker
  • Windows(PowerShell)
  • Linux
相关产品与服务
容器服务
腾讯云容器服务(Tencent Kubernetes Engine, TKE)基于原生 kubernetes 提供以容器为核心的、高度可扩展的高性能容器管理服务,覆盖 Serverless、边缘计算、分布式云等多种业务部署场景,业内首创单个集群兼容多种计算节点的容器资源管理模式。同时产品作为云原生 Finops 领先布道者,主导开源项目Crane,全面助力客户实现资源优化、成本控制。
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档