2
0
mirror of https://github.com/lanjelot/patator synced 2024-11-10 01:13:31 +00:00

Fix xml output

This commit is contained in:
lanjelot 2017-06-02 08:35:08 +10:00
parent c9656b5ea6
commit cbf7be1d12
2 changed files with 36 additions and 34 deletions

View File

@ -3,37 +3,37 @@ Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metaspl
Currently it supports the following modules: Currently it supports the following modules:
``` ```
* `ftp_login` : Brute-force FTP * ftp_login : Brute-force FTP
* `ssh_login` : Brute-force SSH * ssh_login : Brute-force SSH
* `telnet_login` : Brute-force Telnet * telnet_login : Brute-force Telnet
* `smtp_login` : Brute-force SMTP * smtp_login : Brute-force SMTP
* `smtp_vrfy` : Enumerate valid users using the SMTP VRFY command * smtp_vrfy : Enumerate valid users using the SMTP VRFY command
* `smtp_rcpt` : Enumerate valid users using the SMTP RCPT TO command * smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
* `finger_lookup` : Enumerate valid users using Finger * finger_lookup : Enumerate valid users using Finger
* `http_fuzz` : Brute-force HTTP/HTTPS * http_fuzz : Brute-force HTTP/HTTPS
* `ajp_fuzz` : Brute-force AJP * ajp_fuzz : Brute-force AJP
* `pop_login` : Brute-force POP * pop_login : Brute-force POP
* `pop_passd` : Brute-force poppassd (not POP3) * pop_passd : Brute-force poppassd (not POP3)
* `imap_login` : Brute-force IMAP * imap_login : Brute-force IMAP
* `ldap_login` : Brute-force LDAP * ldap_login : Brute-force LDAP
* `smb_login` : Brute-force SMB * smb_login : Brute-force SMB
* `smb_lookupsid` : Brute-force SMB SID-lookup * smb_lookupsid : Brute-force SMB SID-lookup
* `rlogin_login` : Brute-force rlogin * rlogin_login : Brute-force rlogin
* `vmauthd_login` : Brute-force VMware Authentication Daemon * vmauthd_login : Brute-force VMware Authentication Daemon
* `mssql_login` : Brute-force MSSQL * mssql_login : Brute-force MSSQL
* `oracle_login` : Brute-force Oracle * oracle_login : Brute-force Oracle
* `mysql_login` : Brute-force MySQL * mysql_login : Brute-force MySQL
* `mysql_query` : Brute-force MySQL queries * mysql_query : Brute-force MySQL queries
* `rdp_login` : Brute-force RDP (NLA) * rdp_login : Brute-force RDP (NLA)
* `pgsql_login` : Brute-force PostgreSQL * pgsql_login : Brute-force PostgreSQL
* `vnc_login` : Brute-force VNC * vnc_login : Brute-force VNC
* `dns_forward` : Brute-force DNS * dns_forward : Brute-force DNS
* `dns_reverse` : Brute-force DNS (reverse lookup subnets) * dns_reverse : Brute-force DNS (reverse lookup subnets)
* `ike_enum` : Enumerate IKE transforms * ike_enum : Enumerate IKE transforms
* `snmp_login` : Brute-force SNMPv1/2 and SNMPv3 * snmp_login : Brute-force SNMPv1/2 and SNMPv3
* `unzip_pass` : Brute-force the password of encrypted ZIP files * unzip_pass : Brute-force the password of encrypted ZIP files
* `keystore_pass` : Brute-force the password of Java keystore files * keystore_pass : Brute-force the password of Java keystore files
* `umbraco_crack` : Crack Umbraco HMAC-SHA1 password hashes * umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes
``` ```
The name "Patator" comes from https://www.youtube.com/watch?v=kU2yPJJdpag The name "Patator" comes from https://www.youtube.com/watch?v=kU2yPJJdpag

View File

@ -789,8 +789,10 @@ def process_logs(queue, indicatorsfmt, argv, log_dir):
f.write('<results>\n') f.write('<results>\n')
else: # remove "</results>...</root>" else: # remove "</results>...</root>"
with open(results_xml, 'r+') as f: with open(results_xml, 'r+b') as f:
f.seek(f.read().find('</results>')) offset = f.read().find('</results>')
if offset != -1:
f.seek(offset)
f.truncate(f.tell()) f.truncate(f.tell())
handler_log = logging.FileHandler(runtime_log) handler_log = logging.FileHandler(runtime_log)