import sys
import getopt
import socket
def get_target():
opts, args = getopt.getopt(sys.argv[1:], '-i:-p:-h')
# print(opts)
for opt_name, opt_value in opts:
if opt_name == '-h':
print('[*]This is help information [*]n'
'[*]-i + vulnerable-ip [*]n'
'[*]-p + vulnerable-port [*]n'
'[*]Example:python3 -i 127.0.0.1 -p 6379[*]n')
if opt_name in ('-i', ):
ip = opt_value
if opt_name in ('-p', ):
port = opt_value
return ip, port
def passwd_dict():
passwd = ['redis@123', 'Redis@123', 'Passw0rd', '123456']
return passwd
def main(ip, port, passwd):
print("[*]Redis Unauthorized and Weak Password Detection [*]n"
"[*]By: Zh1z3ven [*]n"
"[*]Blog: https://www.cnblogs.com/Zh1z3ven/ [*]n")
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((ip, int(port)))
send_data = 'INFOrn'
s.send(send_data.encode())
res = s.recv(1024)
response = bytes.decode(res)
# print(response)
if 'redis_version' in response:
result = '[!]Vulnerable {0}:{1} 存在未授权访问 [!]'.format(ip, port)
print(result)
return result
elif 'NOAUTH' in response:
for item in passwd:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((ip, int(port)))
send_data = 'AUTH {0}rn'.format(item)
s.send(send_data.encode())
res = s.recv(1024)
response = bytes.decode(res)
# print(response)
if '+OK' in response:
result = '[!]Vulnerable: {0}:{1} 存在弱口令{2} [!]'.format(ip, port, item)
print(result)
return result
else:
result = '[*] 不存在未授权及弱口令 [*]'
print(result)
return result
if __name__ == '__main__':
ip, port = get_target()
passwd = passwd_dict()
main(ip, port, passwd)
登录后复制【本文转自:
香港高防服务器 http://www.558idc.com/hkgf.html 复制请保留原URL】