Security Scan Framework For Enterprise Intranet Based Services
Python3.x
pip install -r requirements.txt
usage: biu.py [-h] [-f F] [-t T] [-r R] [-p P] [-d D] [-T T]
Biu~
optional arguments:
-h, --help show this help message and exit
-f F target file: ip\n or host\n
-t T target: host or ip
-r R ipaddress range: <ADDRESS>/<NETMASK>
-p P plugin: plugins to scan
-ps PS plugins search
-d D Debug
-T T Timeout
✨🍰✨Below are a series of example usages:
python biu.py -p elasticsearch -f target/elasticsearch.txt
python biu.py -p elastic -t 1.1.1.1:9200
python biu.py -p elastic -t 1.1.1.1
python biu.py -p elastic -r 1.1.1.0/24
python biu.py -p elastic,kibana -r 1.1.1.0/24
python biu.py -p elastic -t 1.1.1.1:9200 -d 1
Biu-framework -f
argument support scan results of masscan via -oL
masscan -p9200,5601 --rate=1000 10.10.0.0/16 -oL targets.txt
python biu.py -p elasticsearch,kibana -f targets.txt
The scan report is in the ./reports
directory, formate: today_pluginname.txt
{
"name":"",
"method": "GET",
"port": [8080],
"suffix":[""],
"hits":[""]
}
OR
{
"name": "Cacti_default_account_authentication",
"method": "POST",
"port": [
80
],
"suffix": [
"/index.php",
"/cacti/index.php"
],
"headers": {
"Content-Type": "application/x-www-form-urlencoded"
},
"data": {
"action": "login",
"login_username": "admin",
"login_password": "admin"
},
"hits": [
"graph_view.php"
]
}
OR
{
"name": "RabbitMQManagement_guest",
"method": "AUTH",
"port": [
80,
8080
],
"suffix": [
"/api/whoami"
],
"data": [
{
"user": "guest",
"pass": "guest"
}
],
"hits": [
"\"tags\":\"administrator\""
]
}