Commit Graph

52 Commits

Author SHA1 Message Date
Aarush 65bf88e68f
Fix #1147: Add SMB signature to port.yaml (#1162)
* Add regex for SMB protocol in port.yaml to fix the bug #1147

Signed-off-by: Aarush289 <cs24b064@smail.iitm.ac.in>

* smb_fix done

* Enable SMB regex match in port.yaml to fix the bug #1147

Signed-off-by: Aarush289 <cs24b064@smail.iitm.ac.in>

---------

Signed-off-by: Aarush289 <cs24b064@smail.iitm.ac.in>
Co-authored-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2025-11-18 15:50:22 +00:00
Prabhat Kumar 2d3f39c7a3
Refactor: Correct 'vuln' tag for 5 SSL modules (#1164) 2025-10-30 20:17:00 +00:00
Achintya Jai 1d37e0e3a2
Removing redundancy and cleaning profiles (#1041)
* removed the vulnerability profile as it a subset of vuln

* removed brute_force profile as it is exactly same as brute

* removed cve_2021_38702 as a profile, its already there in cve, cve2021 and more relevant ones

* removed the puneethreddyrc profile

* removed information_gathering profile, added graphql.yaml to info

* removed the wp profile, it was a subset of wordpress

* removed the infortmation profile

* made relevant changes to the doc

* coderabbit suggestions
2025-09-04 18:39:00 +00:00
Sam Stepanyan 1ff4258318
New module: adobe_aem_lastpatcheddate_scan (#1125)
* New module: adobe_aem_lastpatcheddate_scan

* docs update

* Update nettacker/modules/scan/adobe_aem_lastpatcheddate.yaml

coderabbit suggested improvements

Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

* Update nettacker/modules/scan/adobe_aem_lastpatcheddate.yaml

coderabbit suggestion

Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

---------

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
2025-08-30 03:29:49 +00:00
Sam Stepanyan 6eb1f5731d
New module to detect CrushFTP CVE-2025-31161 (#1126)
* New module: crushftp_cve_2025_31161_vuln

* Update nettacker/modules/vuln/crushftp_cve_2025_31161.yaml

coderabbit formatting fix

Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

* clean-up coderabbit issues

---------

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
2025-08-30 03:25:18 +00:00
Sam Stepanyan 518321718c
New module: crushftp_lastpatcheddate_scan (#1124)
* crushftp_lastpatcheddate_scan module

* docs update

* Fix typos found by code-rabbit

Co-authored-by: Arkadii Yakovets <2201626+arkid15r@users.noreply.github.com>
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

---------

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
Co-authored-by: Arkadii Yakovets <2201626+arkid15r@users.noreply.github.com>
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
2025-08-13 00:02:26 +00:00
Sam Stepanyan 630de628b9
New module to detect PaloAlto GlobalProtect XSS CVE-2025-0133 (#1109)
* Create paloalto_globalprotect_cve_2025_0133.yaml

new module for CVE-2025-0133

* Updated docs/Modules.md

updated docs

* Update nettacker/modules/vuln/paloalto_globalprotect_cve_2025_0133.yaml

CodeRabbit YAML formatting suggestion - we have this issue pretty much with all YAML files, so a separate tidy-up PR will be needed in the future

Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

---------

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
2025-07-30 21:57:08 +00:00
Achintya Jai 6e7a6519cf
changed rege (#1098) 2025-07-12 10:11:13 +00:00
Achintya Jai cd34fba676
fixing the global flags issue in joomla_template_scan and drupal_theme_scan (#1091)
* fixing the global flags issue in joomla template and drupal theme scans, and adding a regex validation testcase

* ruff fixes
2025-06-25 14:06:50 +00:00
Achintya Jai 04c2097fbe
regex fixes for mysql and mariaDB (#1083) 2025-06-11 12:43:20 +00:00
Packet Phantom 958e1bc075
feature: add smb_brute command (#1070)
* Update dependencies in poetry.lock and pyproject.toml for new packages

* feat: add SMB brute force module

* feat: add unit tests for SMB brute force module

* ran make pre-commit

---------

Co-authored-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2025-06-09 15:49:15 +00:00
Achintya Jai d77becc42a
fixing regex introduced in PR1062 (#1067) 2025-05-06 11:34:34 +00:00
Manav Acharya 423f66151a
Adding config_file_scan (#1051)
* Config-scan

* Update config_wordlist.txt

Adding possible configuration file names

* Update config_wordlist.txt

Updating the wordlist to remove spaces in the urls

---------

Co-authored-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2025-05-05 12:11:37 +00:00
Achintya Jai 0c2d21405e
regex updates for port.yaml (#1062)
* updated regexes

* Implementing logging response_dependent conditions in socket.py (#1060)

* logging matched services along with output from tcp_connect_send_and_recieve

* fixed tests

* fixed module.py

---------

Signed-off-by: Achintya Jai <153343775+pUrGe12@users.noreply.github.com>
2025-04-28 19:40:31 +00:00
Achintya Jai 3f214b76cf
Implementing logging response_dependent conditions in socket.py (#1060)
* logging matched services along with output from tcp_connect_send_and_recieve

* fixed tests

* fixed module.py
2025-04-27 22:18:11 +00:00
Achintya Jai f7ce6a0e2c
added amqp detection regex (#1046) 2025-03-18 00:57:35 +00:00
Sam Stepanyan 6ad4ce083c
added missing url logging (#1040)
* added missing url logging

* Update nettacker/modules/scan/pma.yaml

Co-authored-by: Arkadii Yakovets <2201626+arkid15r@users.noreply.github.com>
Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

---------

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
Co-authored-by: Arkadii Yakovets <2201626+arkid15r@users.noreply.github.com>
2025-03-18 00:47:32 +00:00
Achintya Jai 2667369af0
Custom wordlist functionality addition for scan modules (#1026)
* adding default loop policy for asyncio

* added custom wordlist functionality

* lint fix

* bug fixes

* added break after first detection to exit for loop

* removed custom read from brute scans because its already implemented there

* updated according to suggested changes

* cleared old code

* fixed lint

* made requested changes

* made suggested changes

* lint fix

* changed user_wordlist to read_from_file
2025-03-07 11:40:16 +00:00
Manav Acharya 71ea8a7c5e
create 'wp_plugin_cve_2023_47668_vuln' (#1029)
* create 'wp_plugin_cve_2023_47668_vuln'

* Update wp_plugin_cve_2023_47668.yaml
2025-03-02 23:57:48 +00:00
Achintya Jai 65192c8fc6
Added base path for directory enumeration (#1019)
* added base path addition functionality

* fixed ruff

* unbound variable fix

---------

Co-authored-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2025-02-21 21:33:02 +00:00
Sam Stepanyan 626a765708
adding SonicWALL SSLVPN CVE-2024-53704 module (#1018)
* Update paloalto_panos_cve_2025_0108.yaml added cisa_kev

Adding cisa_kev profile to the module:
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has just added this CVE-2025-0108 impacting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

* adding sonicwall_sslvpn_cve_2024_53704_vuln module
2025-02-20 02:30:11 +00:00
Sam Stepanyan 2456cd1951
Update paloalto_panos_cve_2025_0108.yaml added cisa_kev (#1017)
Adding cisa_kev profile to the module:
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has just added this CVE-2025-0108 impacting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
2025-02-19 16:30:59 +00:00
Achintya Jai d143f4302b
updated regex for SSH scanning to include more matches (#1012)
Co-authored-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2025-02-17 17:53:29 +00:00
Sam Stepanyan 507a098041
palo module location fix (#1014)
* move paloalto_panos_cve_2025_0108.yaml to nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml

Fix of the incorrect location for the module

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

* Delete Modules.md in wrong location

location fix

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

* Update Modules.md with CVE-2025-0108

added CVE-2025-0108 module to the docs

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

---------

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2025-02-17 17:41:20 +00:00
Sam Stepanyan aff7fe3dc2 Revert "adding paloalto_panos_cve_2025_0108_vuln module"
This reverts commit d76eb0b7d9.
2025-02-17 01:39:23 +00:00
Sam Stepanyan d76eb0b7d9 adding paloalto_panos_cve_2025_0108_vuln module 2025-02-17 01:24:52 +00:00
Achintya Jai 34523c8e43
fixed the admin_scan output to include the hit URLs (#1008) 2025-02-11 20:00:18 +00:00
tanaydin sirin 9aaa7033a5
Correct the issue with port scanner output (#978)
The issue caused the program to erroneously run a regex pattern on HTML content instead of the request data. This was because the port number wasn't displayed in the HTML's body content. The commit rectifies this problem, ensuring that regex operates on the correct data.
2024-12-22 12:34:12 +00:00
Sam Stepanyan 546042dea5 New module: cups_version_scan to help with the vulnerable CUPS printer detection 2024-09-29 19:41:48 +01:00
Sam Stepanyan 0a0e2d6fc1 new module: ivanti_vtm_version_scan 2024-09-26 21:05:52 +01:00
Sam Stepanyan 5eab2709c1
Merge branch 'master' into ivanti_csa 2024-09-20 01:54:07 +01:00
Sam Stepanyan 0de0aa167b ivanti_csa_lastpatcheddate_scan module 2024-09-20 01:44:15 +01:00
Sam Stepanyan 8ab4e48ac0
YAML indent fix in ivanti_ics_lastpatcheddate.yaml
Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2024-09-20 01:05:58 +01:00
Sam Stepanyan ed9ab85d20
dir_scan module update
removed unnecessary extra trailing newlines

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2024-09-19 23:49:20 +01:00
Sam Stepanyan 6c68fb91a4
Merge branch 'master' into sam_dirb 2024-09-19 23:11:55 +01:00
Sam Stepanyan a86b9095fd dir_scan module 2024-09-19 23:08:19 +01:00
Sam Stepanyan b62c037900
Update wp_plugin.yaml
yaml update

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2024-09-18 09:06:58 +01:00
Sam Stepanyan 4e6cabb331
Updated wp_plugin.yaml
Minor improvements - added plugin version to regex and fixed overlooked previously copy-pasted text from another module

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2024-09-18 08:46:23 +01:00
Sam Stepanyan c91d2db971
Updates subdomain.yaml removing defunct services
Defunct services: bufferoverflow, threatminer and threatcrowd - replaced

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
2024-09-05 01:19:52 +01:00
Captain-T2004 0615a1fe2e Fixed ssl_* module responses 2024-09-02 00:25:48 +05:30
Captain-T2004 97eb4f9c4c Made suggested changes
1. changed the date format from "%Y/%m/%d" to "%Y-%m-%d" to make it ANSI and ISO 8601 compliant.

2. Changed the issuer and subject to issuer_str and subject_str which are formatted string from the x509 objects.

3. Added subject to  ssl_expired_certificate_vuln and ssl_expiring_certificate_scan modules
2024-09-01 18:03:29 +05:30
Akshay Behl 01766065b8
Merge branch 'master' into SSL/TLS_MODULES 2024-09-01 04:20:57 +05:30
Sam Stepanyan b44218bf7a Apache OFBiz CVE-2024-38856 module 2024-08-30 23:19:03 +01:00
Captain-T2004 e47ef52929 Made changes following suggestion
1. Change the date format from d/m/Y to Y-m-d (e.g. 2004-08-28)

2. In the return/output of ssl_certificate_scan in SSL library please  add certificate "subject" and "issuer" so these could be logged

3. Rename ssl_version module to ssl_weak_version

4. Change ssl_expired_certificate module to return expired certs only ( do not count expiring_soon certs - it is not a vulnerability!)

5. Create a separate ssl_expiring_certificate module in modules/scan (remember  'expiring soon'  is not a vulnerability, so we need to make this a 'scan' module)

6. Rename ssl_signed_certificate module to ssl_certificate_weak_signature and remove the self-signed check from it

7. Create a separate ssl_self_signed_certificate module in modules/vuln

Next in  nettacker/core/lib/ssl.py
 in class SslLibrary(BaseLibrary): you have ssl_certificate_scan and ssl_version_and_cipher_scan methods.
 There is a common code in these two methods so these could be refactored to remove the repetition.  Please refactor/improve this.
 In ssl_version_and_cipher_scan also please add add  to the output /return certificate "subject" ,"issuer" and an expiry date.
 This way if a user scans they network using IP addresses and some servers will come up with weak SSL versions/ciphers it will be easier for user to identify the servers using the certificate subject/issuer
2024-08-31 02:42:15 +05:30
Captain-T2004 e8f57c1d16 Added SSL/TLS Modules 2024-08-25 19:49:53 +05:30
Arkadii Yakovets 310938b6cf
Simplify module fuzzer config syntax 2024-08-21 08:39:37 -07:00
Arkadii Yakovets 57cf98a036
Update scan/admin config syntax 2024-08-20 16:17:44 -07:00
Arkadii Yakovets 560d94aced
Improve module configuration compatibility 2024-08-20 09:12:08 -07:00
Arkadii Yakovets 6dfa9a231b
Update fuzzer configurations 2024-08-19 16:18:26 -07:00
Arkadii Yakovets 7cfb811c25
Update scan/drupal_modules configuration 2024-08-19 14:41:21 -07:00