mirror of
https://github.com/lanjelot/patator
synced 2024-11-10 01:13:31 +00:00
Fix xml output
This commit is contained in:
parent
c9656b5ea6
commit
cbf7be1d12
62
README.md
62
README.md
@ -3,37 +3,37 @@ Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metaspl
|
|||||||
Currently it supports the following modules:
|
Currently it supports the following modules:
|
||||||
|
|
||||||
```
|
```
|
||||||
* `ftp_login` : Brute-force FTP
|
* ftp_login : Brute-force FTP
|
||||||
* `ssh_login` : Brute-force SSH
|
* ssh_login : Brute-force SSH
|
||||||
* `telnet_login` : Brute-force Telnet
|
* telnet_login : Brute-force Telnet
|
||||||
* `smtp_login` : Brute-force SMTP
|
* smtp_login : Brute-force SMTP
|
||||||
* `smtp_vrfy` : Enumerate valid users using the SMTP VRFY command
|
* smtp_vrfy : Enumerate valid users using the SMTP VRFY command
|
||||||
* `smtp_rcpt` : Enumerate valid users using the SMTP RCPT TO command
|
* smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
|
||||||
* `finger_lookup` : Enumerate valid users using Finger
|
* finger_lookup : Enumerate valid users using Finger
|
||||||
* `http_fuzz` : Brute-force HTTP/HTTPS
|
* http_fuzz : Brute-force HTTP/HTTPS
|
||||||
* `ajp_fuzz` : Brute-force AJP
|
* ajp_fuzz : Brute-force AJP
|
||||||
* `pop_login` : Brute-force POP
|
* pop_login : Brute-force POP
|
||||||
* `pop_passd` : Brute-force poppassd (not POP3)
|
* pop_passd : Brute-force poppassd (not POP3)
|
||||||
* `imap_login` : Brute-force IMAP
|
* imap_login : Brute-force IMAP
|
||||||
* `ldap_login` : Brute-force LDAP
|
* ldap_login : Brute-force LDAP
|
||||||
* `smb_login` : Brute-force SMB
|
* smb_login : Brute-force SMB
|
||||||
* `smb_lookupsid` : Brute-force SMB SID-lookup
|
* smb_lookupsid : Brute-force SMB SID-lookup
|
||||||
* `rlogin_login` : Brute-force rlogin
|
* rlogin_login : Brute-force rlogin
|
||||||
* `vmauthd_login` : Brute-force VMware Authentication Daemon
|
* vmauthd_login : Brute-force VMware Authentication Daemon
|
||||||
* `mssql_login` : Brute-force MSSQL
|
* mssql_login : Brute-force MSSQL
|
||||||
* `oracle_login` : Brute-force Oracle
|
* oracle_login : Brute-force Oracle
|
||||||
* `mysql_login` : Brute-force MySQL
|
* mysql_login : Brute-force MySQL
|
||||||
* `mysql_query` : Brute-force MySQL queries
|
* mysql_query : Brute-force MySQL queries
|
||||||
* `rdp_login` : Brute-force RDP (NLA)
|
* rdp_login : Brute-force RDP (NLA)
|
||||||
* `pgsql_login` : Brute-force PostgreSQL
|
* pgsql_login : Brute-force PostgreSQL
|
||||||
* `vnc_login` : Brute-force VNC
|
* vnc_login : Brute-force VNC
|
||||||
* `dns_forward` : Brute-force DNS
|
* dns_forward : Brute-force DNS
|
||||||
* `dns_reverse` : Brute-force DNS (reverse lookup subnets)
|
* dns_reverse : Brute-force DNS (reverse lookup subnets)
|
||||||
* `ike_enum` : Enumerate IKE transforms
|
* ike_enum : Enumerate IKE transforms
|
||||||
* `snmp_login` : Brute-force SNMPv1/2 and SNMPv3
|
* snmp_login : Brute-force SNMPv1/2 and SNMPv3
|
||||||
* `unzip_pass` : Brute-force the password of encrypted ZIP files
|
* unzip_pass : Brute-force the password of encrypted ZIP files
|
||||||
* `keystore_pass` : Brute-force the password of Java keystore files
|
* keystore_pass : Brute-force the password of Java keystore files
|
||||||
* `umbraco_crack` : Crack Umbraco HMAC-SHA1 password hashes
|
* umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes
|
||||||
```
|
```
|
||||||
|
|
||||||
The name "Patator" comes from https://www.youtube.com/watch?v=kU2yPJJdpag
|
The name "Patator" comes from https://www.youtube.com/watch?v=kU2yPJJdpag
|
||||||
|
@ -789,8 +789,10 @@ def process_logs(queue, indicatorsfmt, argv, log_dir):
|
|||||||
f.write('<results>\n')
|
f.write('<results>\n')
|
||||||
|
|
||||||
else: # remove "</results>...</root>"
|
else: # remove "</results>...</root>"
|
||||||
with open(results_xml, 'r+') as f:
|
with open(results_xml, 'r+b') as f:
|
||||||
f.seek(f.read().find('</results>'))
|
offset = f.read().find('</results>')
|
||||||
|
if offset != -1:
|
||||||
|
f.seek(offset)
|
||||||
f.truncate(f.tell())
|
f.truncate(f.tell())
|
||||||
|
|
||||||
handler_log = logging.FileHandler(runtime_log)
|
handler_log = logging.FileHandler(runtime_log)
|
||||||
|
Loading…
Reference in New Issue
Block a user