Flan Scan –  Cloudflare 出產的 vulnerability scanner (弱點掃描),利用 docker 生成環境,再用 NMAP 加上 vulners.nse 去掃描主機的弱點

安裝需要元件

yum install texlive-* docker -y

安裝 flan

git clone https://github.com/cloudflare/flan.git
cd flan
編輯 shared/ips.txt 加入要掃描的 IP
make build
make start # 開始掃

在 shared/reports/report_2019.11.22-06.50.tex 可以看到報告

可以用 pdflatex shared/reports/report_2019.11.22-06.50.tex 產出成 PDF 較好看

掃描的過程

docker run --name flan_1574406264 -v /var/www/vhosts/default/htdocs/flan/shared:/shared flan_scan
# Nmap 7.70 scan initiated Fri Nov 22 07:04:26 2019 as: nmap -sV -oX /shared/xml_files/2019.11.22-07.04/33.33.33.33.xml -oN - -v1 --script=vulners/vulners.nse 33.33.33.33
Nmap scan report for 33.33.33.33
Host is up (0.0060s latency).
Not shown: 983 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
| vulners:
| cpe:/a:openbsd:openssh:7.4:
| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
|_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
25/tcp open smtp Postfix smtpd
53/tcp open domain (unknown banner: none)
| fingerprint-strings:
| DNSVersionBindReqTCP:
| version
| bind
|_ none
80/tcp open http nginx
|_http-server-header: nginx
106/tcp open pop3pw poppassd
110/tcp open pop3 Dovecot pop3d
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
|_ 100000 2,3,4 111/udp rpcbind
143/tcp open imap Dovecot imapd
443/tcp open ssl/http nginx
|_http-server-header: nginx
465/tcp open ssl/smtp Postfix smtpd
993/tcp open ssl/imap Dovecot imapd
995/tcp open ssl/pop3 Dovecot pop3d
2000/tcp open tcpwrapped
3306/tcp open mysql MySQL 5.5.5-10.2.29-MariaDB
| vulners:
| MySQL 5.5.5-10.2.29-MariaDB:
|_ NODEJS:602 0.0 https://vulners.com/nodejs/NODEJS:602
5060/tcp open tcpwrapped
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port53-TCP:V=7.70%I=7%D=11/22%Time=5DD78887%P=x86_64-alpine-linux-musl%
SF:r(DNSVersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07ver
SF:sion\x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc
SF:0\x0c\0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
Service Info: Hosts: 33.33.33.33, cross.dev, cross.dev; OS: Unix

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Nov 22 07:04:47 2019 -- 1 IP address (1 host up) scanned in 21.13 seconds

產出的 PDF 報告

Flan Scan – Cloudflare 出產的 vulnerability scanner

Related posts 相關文章
我用 cloudflare 免費版的 WAF 阻擋 Crawlers 爬蟲
More...
網站使用 Cloudflare WAF 並設定瀏覽時為真實 IP
More...
Cloudflare Turnstile 免費的 CAPTCHA 替代方案
More...
AWS 說 IPv4 要收費,而 Cloudflare 要你來用免費的
More...

作者

留言

撰寫回覆或留言

發佈留言必須填寫的電子郵件地址不會公開。