File size: 4,560 Bytes
17e971c | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | help(){
echo "Usage: ./action.sh [options] [FILE] [OUTFILE] "
echo "Options:"
echo "xxx.sh san_log [FILE] 获取成功访问请求中带有xss|sql|敏感信息|php代码执行 关键字的日志列表 [OUTFILE] 11"
echo "xxx.sh san [FILE] 获取成功访问请求中带有sql关键字的日志列表 [OUTFILE] 11 "
}
if [ $# == 0 ]
then
help
exit
fi
if [ ! -e $2 ]
then
echo -e "$2: 日志文件不存在"
exit
fi
if [ ! -d "log" ]
then
mkdir log
fi
echo "[*] Starting ..."
if [ $1 == "san_log" ]
then
echo "1">./log/$3
echo "开始获取xss跨站脚本攻击日志..."
grep -E ' (200|302|301|500|444|403|304) ' $2 | grep -i -E "(javascript|data:|alert\(|onerror=|%3Cimg%20src=x%20on.+=|%3Cscript|%3Csvg/|%3Ciframe/|%3Cscript%3E).*?HTTP/1.1" >./log/$3xss.log
echo "分析日志已经保存到./log/$3xss.log"
echo "扫描到攻击次数: "`cat ./log/$3xss.log |wc -l`
echo "20">./log/$3
echo "开始获取sql注入漏洞攻击日志..."
echo "分析日志已经保存到./log/$3sql.log"
grep -E ' (200|302|301|500|444|403) ' $2 | grep -i -E "(from.+?information_schema.+|select.+(from|limit)|union(.*?)select|extractvalue\(|case when|extractvalue\(|updatexml\(|sleep\().*?HTTP/1.1" > ./log/$3sql.log
echo "扫描到攻击次数: "`cat ./log/$3sql.log |wc -l`
echo "40">./log/$3
echo -e "开始获取文件遍历/代码执行/扫描器信息/配置文件等相关日志"
grep -E ' (200|302|301|500|444|403) ' $2 | grep -i -E "(\.\.|WEB-INF|/etc|\w\{1,6\}\.jsp |\w\{1,6\}\.php|\w+\.xml |\w+\.log |\w+\.swp |\w*\.git |\w*\.svn |\w+\.json |\w+\.ini |\w+\.inc |\w+\.rar |\w+\.gz |\w+\.tgz|\w+\.bak |/resin-doc).*?HTTP/1.1" >./log/$3san.log
echo "分析日志已经保存到./log/$3san.log"
echo "扫描到攻击次数: "`cat ./log/$3san.log |wc -l`
echo "50">./log/$3
echo -e "开始获取php代码执行扫描日志"
grep -E ' (200|302|301|500|444|403) ' $2 | grep -i -E "(gopher://|php://|file://|phar://|dict://data://|eval\(|file_get_contents\(|phpinfo\(|require_once\(|copy\(|\_POST\[|file_put_contents\(|system\(|base64_decode\(|passthru\(|\/invokefunction\&|=call_user_func_array).*?HTTP/1.1" >./log/$3php.log
echo "分析日志已经保存到./log/$3php.log"
echo "扫描到攻击次数: "`cat ./log/$3php.log |wc -l`
echo "60">./log/$3
echo -e "正在统计访问次数最多ip的次数和值"
# cat $2|awk -F" " '{print $1}'|sort|uniq -c|sort -nrk 1 -t' '|head -100
awk '{print $1}' $2 |sort|uniq -c |sort -nr |head -100 >./log/$3ip.log
echo "80">./log/$3
echo -e "正在统计访问次数最多的请求接口的url的次数和值"
awk '{print $7}' $2 |sort|uniq -c |sort -nr |head -100 >./log/$3url.log
echo "100">./log/$3
elif [ $1 == "san" ]
then
echo "1">./log/$3
echo "开始获取xss跨站脚本攻击日志..."
grep -E ' (200|302|301|500|444|403|304) ' $2 | grep -i -E "(javascript|data:|alert\(|onerror=|%3Cimg%20src=x%20on.+=|%3Cscript|%3Csvg/|%3Ciframe/|%3Cscript%3E).*?HTTP/1.1" >./log/$3xss.log
echo "分析日志已经保存到./log/$3xss.log"
echo "扫描到攻击次数: "`cat ./log/$3xss.log |wc -l`
echo "20">./log/$3
echo "开始获取sql注入漏洞攻击日志..."
echo "分析日志已经保存到./log/$3sql.log"
grep -E ' (200|302|301|500|444|403) ' $2 | grep -i -E "(from.+?information_schema.+|select.+(from|limit)|union(.*?)select|extractvalue\(|case when|extractvalue\(|updatexml\(|sleep\().*?HTTP/1.1" > ./log/$3sql.log
echo "扫描到攻击次数: "`cat ./log/$3sql.log |wc -l`
echo "40">./log/$3
echo -e "开始获取文件遍历/代码执行/扫描器信息/配置文件等相关日志"
grep -E ' (200|302|301|500|444|403) ' $2 | grep -i -E "(\.\.|WEB-INF|/etc|\w\{1,6\}\.jsp |\w\{1,6\}\.php|\w+\.xml |\w+\.log |\w+\.swp |\w*\.git |\w*\.svn |\w+\.json |\w+\.ini |\w+\.inc |\w+\.rar |\w+\.gz |\w+\.tgz|\w+\.bak |/resin-doc).*?HTTP/1.1" >./log/$3san.log
echo "分析日志已经保存到./log/$3san.log"
echo "扫描到攻击次数: "`cat ./log/$3san.log |wc -l`
echo "60">./log/$3
echo -e "开始获取php代码执行扫描日志"
grep -E ' (200|302|301|500|444|403) ' $2 | grep -i -E "(gopher://|php://|file://|phar://|dict://data://|eval\(|file_get_contents\(|phpinfo\(|require_once\(|copy\(|\_POST\[|file_put_contents\(|system\(|base64_decode\(|passthru\(|\/invokefunction\&|=call_user_func_array).*?HTTP/1.1" >./log/$3php.log
echo "分析日志已经保存到./log/$3php.log"
echo "扫描到攻击次数: "`cat ./log/$3php.log |wc -l`
echo "100">./log/$3
else
help
fi
echo "[*] shut down"
|