crack_ssh 是go写的协程版的ssh\redis\mongodb弱口令破解工具
xsec ip database为一个恶意IP和域名库(Malicious ip database),它获取恶意IP和域名的方式有以下几种:
$ ./main [xorm] [info] 2017/09/26 13:22:58.220496 PING DATABASE mysql NAME: xsec Malicious ip database - A Malicious ip database USAGE: main [global options] command [command options] [arguments...] VERSION: 20170925 AUTHOR(S): netxfly <x@xsec.io> COMMANDS: serve startup evil ips dump Fetch all evil ips info and save to file load load ips from file help, h Shows a list of commands or help for one command GLOBAL OPTIONS: --help, -h show help --version, -v print the version
导入恶意ip信息并启动WEB接口
恶意IP检测及实时提交测试
恶意域名检测及提交测试
其中测试与其他安全产品联动的测试代码的内容如下:
package routers_test import ( "testing" "time" "net/http" "net/url" "xsec-evil-ips/util" ) func TestUpdateIp(t *testing.T) { u := "http://127.0.0.1:8000/api/ip/" timestamp := time.Now().Format("2006-01-02 15:04:05") k := "aadcbfbc837757a9a24ac96cf9171c8b" ip := "212.129.58.111" pro := "xsec test pro" t.Log(http.PostForm(u, url.Values{"timestamp": {timestamp}, "secureKey": {util.MakeSign(timestamp, k)}, "ip": {ip}, "pro": {pro}})) } func TestUpdateDomain(t *testing.T) { u := "http://127.0.0.1:8000/api/domain/" timestamp := time.Now().Format("2006-01-02 15:04:05") k := "aadcbfbc837757a9a24ac96cf9171c8b" domain := "www.hosting2balooonba.com" pro := "xsec test pro" t.Log(http.PostForm(u, url.Values{"timestamp": {timestamp}, "secureKey": {util.MakeSign(timestamp, k)}, "domain": {domain}, "pro": {pro}})) }
提交的参数需要有以下几个参数,而且安全产品的key必须与恶意IP库的相同,否则不会接受提交的恶意ip或域名信息。