您现在的位置是:首页 > 网络趣梗网络趣梗

windows漏洞扫描工具有哪些(漏洞扫描工具包括)

2022-08-30 12:31:26网络趣梗0人已围观

简介  windows漏洞扫描工具有哪些(漏洞扫描工具包括),新营销网红网本栏目通过数据整理汇集了windows漏洞扫描工具有哪些(漏洞扫描工具包括)相关信息,下面一起看看

  windows漏洞扫描工具有哪些(漏洞扫描工具包括),新营销网红网本栏目通过数据整理汇集了windows漏洞扫描工具有哪些(漏洞扫描工具包括)相关信息,下面一起看看。

  关于匹普-审计匹普-审计是一款功能强大的安全漏洞扫描工具,该工具主要针对大蟒环境,可以帮助广大研究人员扫描和测试大蟒包中的已知安全漏洞106 .匹普-审计使用了PythonPackagingAdvisory数据库PyPIJSONAPI作为漏洞报告源。

  功能介绍1、支持对本地环境和依赖组件(要求风格文件)进行安全审计;

   2、支持多种漏洞服务(派皮、OSV);

   3、支持以CycloneDX XML或数据格式发送SBOM;

   4、提供人类和机器均可读的输出格式(柱状、JSON);

   5、无缝接入/重用本地点缓存;

  工具安装匹普-审计基于大蟒开发,且要求本地环境为Python 3.7或更新版本。安装并配置好大蟒环境之后,就可以使用下列命令并通过点来安装匹普-审计了:

   python -m pip安装匹普-审计第三方包匹普-审计的正常运行需要使用到多个第三方包,具体组件包名称和版本如下图所示:

  除此之外,我们还可以通过城市来安装匹普-审计:

  康达安装-康达锻造匹普-审计

  工具使用我们可以直接将匹普-审计以独立程序运行,或通过" python -m "运行:

   pip-audit-help python-m pip _ audit-help用法: pip-audit[-h][-V][-l][-r要求] [-f格式] [-s服务][-d][-S][-desc[{开,关,自动}]][-CACHE-DIR CACHE _ DIR][-progress-spinner {开,关}] [ -超时超时][ -路径路径][-V][-fix][-require-hashs]审核计算机编程语言环境中与已知漏洞的依赖关系此选项可以多次使用(默认值:无)-f格式,-格式格式在(选择:列,json,cyclonedx-json,cyclonedx-xml)(默认值:列)中发出审核结果的格式构成名词复数服务,-漏洞服务服务用于审核依赖项的漏洞服务(选择: osv,pypi)(默认值: pypi)-d,-不使用`-修复:进行模拟运行收集所有依赖项,但不执行审核使用"-修复" :执行审核步骤,但不执行任何修复(默认值:False)-S,- strict如果对任何依赖关系的依赖关系收集失败,则使整个审核失败(default : False)-desc[{开,关,自动}]包括每个漏洞的描述;对于“json”格式,“自动”默认为打开.此标志对" cyclonedx-json "或" cyclonedx-xml "格式没有影响(默认:自动)-CACHE-dir CACHE _ dir用作代码简单的超文本传送协议缓存的目录;默认情况下使用“pip”HTTP缓存(默认为:无)-进度-微调器{开,关}显示一个进度微调器(默认为: on) -超时超时设置套接字时间

  out (default: 15)--path PATHS restrict to the specified installation path forauditing packages; this option can be used multipletimes (default: [])-v, --verbose give more output; this setting overrides the`PIP_AUDIT_LOGLEVEL` variable and is equivalent tosetting it to `debug` (default: False)--fix automatically upgrade dependencies with knownvulnerabilities (default: False)--require-hashes require a hash to check each requirement against, forrepeatable audits; this option is implied when anypackage in a requirements file has a `--hash` option.(default: False)退出代码

  任务完成后, pip-audit将会退出运行,并返回一个代码以显示其状态,其中:

  0:未检测到已知漏洞;

  1:检测到了一个或多个已知漏洞;

  工具使用样例

  审计当前Python环境中的依赖:

  $ pip-auditNo known vulnerabilities found

  审计给定requirements文件的依赖:

  $ pip-audit -r ./requirements.txtNo known vulnerabilities found

  审计一个requirements文件,并排除系统包:

  $ pip-audit -r ./requirements.txt -lNo known vulnerabilities found

  审计依赖中发现的安全漏洞:

  $ pip-auditFound 2 known vulnerabilities in 1 packageName Version ID Fix Versions---- ------- -------------- ------------Flask 0.5 PYSEC-2019-179 1.0Flask 0.5 PYSEC-2018-66 0.12.3

  审计依赖(包含描述):

  $ pip-audit --descFound 2 known vulnerabilities in 1 packageName Version ID Fix Versions Description---- ------- -------------- ------------ --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Flask 0.5 PYSEC-2019-179 1.0 The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1. NOTE: this may overlap CVE-2018-1000656.Flask 0.5 PYSEC-2018-66 0.12.3 The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. NOTE: this may overlap CVE-2019-1010083.

  审计JSON格式依赖:

  $ pip-audit -f json

   jqFound 2 known vulnerabilities in 1 package[{"name": "flask","version": "0.5","vulns": [{"id": "PYSEC-2019-179","fix_versions": ["1.0"],"description": "The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1. NOTE: this may overlap CVE-2018-1000656."},{"id": "PYSEC-2018-66","fix_versions": ["0.12.3"],"description": "The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. NOTE: this may overlap CVE-2019-1010083."}]},{"name": "jinja2","version": "3.0.2","vulns": []},{"name": "pip","version": "21.3.1","vulns": []},{"name": "setuptools","version": "57.4.0","vulns": []},{"name": "werkzeug","version": "2.0.2","vulns": []},{"name": "markupsafe","version": "2.0.1","vulns": []}]

  【一 所有资源关注我,私信回复“资料”获取 一】1、网络安全学习路线2、电子书籍(白帽子)3、安全大厂内部视频4、100份src文档5、常见安全面试题6、ctf大赛经典题目解析7、全套工具包8、应急响应笔记

  审计并尝试自动审计存在漏洞的依赖:

  $ pip-audit --fixFound 2 known vulnerabilities in 1 package and fixed 2 vulnerabilities in 1 packageName Version ID Fix Versions Applied Fix----- ------- -------------- ------------ ----------------------------------------flask 0.5 PYSEC-2019-179 1.0 Successfully upgraded flask (0.5 = 1.0)flask 0.5 PYSEC-2018-66 0.12.3 Successfully upgraded flask (0.5 = 1.0)许可证协议

  本项目的开发与发布遵循 Apache 2.0开源许可证协议。

   相关文章

  什么时候万圣节(万圣节是什么时候?)

  剪切的快捷键是什么(电脑常用的快捷键汇总)

  嫦娥奔月文言文(《嫦娥奔月》原文与译文)

  小投资加盟(一万元就能做的投资小项目)

  弥留之际的意思(弥留之际(解析))

  鲅鱼水饺的做法(这样调制的鲅鱼馅,鲜香不腥!)

  蚂蚱几条腿(四条腿的蚂蚱)

  环保项目有哪些(30万元适合投资的五个绿色环保项目)

  麦芽糖是什么(烘焙原料小贴士——“麦芽糖”)

  一汤匙(一汤匙、一茶匙是多少吗?)

  清蒸鲽鱼的做法(清蒸鲽鱼的家常做法)

  宋太祖怕史官(宋太祖居然会怕一个小小史官?)

  更多windows漏洞扫描工具有哪些(漏洞扫描工具包括)相关信息请关注本文章,本文仅仅做为展示!

Tags: 网络趣事  

很赞哦! ()

随机图文

留言与评论 (共有 条评论)
验证码:

本栏推荐