mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-06-21 10:21:35 +00:00
37 lines
1.2 KiB
Python
37 lines
1.2 KiB
Python
#!/usr/bin/env python3
|
|
# _*_ coding:utf-8 _*_
|
|
'''
|
|
____ _ _ _ _ __ __ _
|
|
| _ \ __ _| |__ | |__ (_) |_| \/ | __ _ ___| | __
|
|
| |_) / _` | '_ \| '_ \| | __| |\/| |/ _` / __| |/ /
|
|
| _ < (_| | |_) | |_) | | |_| | | | (_| \__ \ <
|
|
|_| \_\__,_|_.__/|_.__/|_|\__|_| |_|\__,_|___/_|\_\
|
|
|
|
'''
|
|
import logging
|
|
import sys
|
|
import requests
|
|
|
|
logging.basicConfig(filename='Weblogic.log',
|
|
format='%(asctime)s %(message)s',
|
|
filemode="w", level=logging.INFO)
|
|
|
|
headers = {'user-agent': 'ceshi/0.0.1'}
|
|
|
|
def islive(ur,port):
|
|
url='http://' + str(ur)+':'+str(port)+'/console/login/LoginForm.jsp'
|
|
r = requests.get(url, headers=headers)
|
|
return r.status_code
|
|
|
|
def run(url,port):
|
|
if islive(url,port)==200:
|
|
u='http://' + str(url)+':'+str(port)+'/console/login/LoginForm.jsp'
|
|
logging.info("[+]{}:{} console address is exposed! The path is: {} Please try weak password blasting!".format(url,port,u))
|
|
else:
|
|
logging.info('[-]{}:{} console address not found!'.format(url,port))
|
|
|
|
if __name__=="__main__":
|
|
url = sys.argv[1]
|
|
port = int(sys.argv[2])
|
|
run(url,port)
|