123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119 |
- #!/usr/bin/env python3
- # -*- coding: utf-8 -*-"
- """
- This file is part of the UFONet project, https://ufonet.03c8.net
- Copyright (c) 2013/2020 | psy <epsylon@riseup.net>
- You should have received a copy of the GNU General Public License along
- with UFONet; if not, write to the Free Software Foundation, Inc., 51
- Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
- """
- import sys, time, random
- from urllib.parse import urlparse as urlparse
- try:
- from scapy.all import *
- except:
- print("\nError importing: scapy lib. \n\n To install it on Debian based systems:\n\n $ 'sudo apt-get install python3-scapy'\n")
- sys.exit(2)
- # UFONet port scanner (UFOSCAN) class
- def randInt():
- x = random.randint(1,65535) # TCP ports
- return x
-
- def scan(self, ip, port, openp, closed):
- src_port = RandShort()
- seq = randInt()
- window = randInt()
- p = IP(dst=ip)/TCP(sport=src_port, dport=port, seq=seq, window=window, flags='S')
- resp = sr1(p, timeout=2)
- if str(type(resp)) == "<type 'NoneType'>":
- closed = closed + 1
- elif resp.haslayer(TCP):
- if resp.getlayer(TCP).flags == 0x12:
- send_rst = sr(IP(dst=ip)/TCP(sport=src_port, dport=port, flags='AR'), timeout=1)
- openp.append(port) # open port found!
- print("\n" + "="*54)
- print("[Info] [AI] [UFOSCAN] OPEN port found! [ " + str(port) + " ]")
- print("="*54 + "\n")
- elif resp.getlayer(TCP).flags == 0x14:
- closed = closed + 1
- return openp, closed
- def is_up(ip):
- p = IP(dst=ip)/ICMP()
- resp = sr1(p, timeout=10)
- if resp == None:
- return False
- elif resp.haslayer(ICMP):
- return True
- class UFOSCAN(object):
- def scanning(self, target, portX, portY):
- print("[Info] [AI] [UFOSCAN] Emitting X-Ray into range: [ "+str(portX)+"-"+str(portY)+" ]\n")
- print("="*74, "\n")
- if target.startswith('http://'):
- target = target.replace('http://','')
- elif target.startswith('https://'):
- target = target.replace('https://','')
- else:
- print("[Error] [AI] [UFOSCAN] Target url not valid ("+target+")! -> It should starts with 'http(s)://'\n")
- return
- try:
- ip = socket.gethostbyname(target)
- except:
- try:
- import dns.resolver
- r = dns.resolver.Resolver()
- r.nameservers = ['8.8.8.8', '8.8.4.4'] # google DNS resolvers
- url = urlparse(target)
- a = r.query(url.netloc, "A") # A record
- for rd in a:
- ip = str(rd)
- except:
- ip = target
- if ip == "127.0.0.1" or ip == "localhost":
- print("[Info] [AI] [UFOSCAN] Sending message '1/0 %====D 2 Ur ;-0' to 'localhost' -> [OK!]\n")
- return
- start_time = time.time()
- try:
- ports = list(range(int(portX), int(portY+1)))
- except:
- portX = 1
- portY = 1024 # 1024
- print("[Info] [AI] [UFOSCAN] Not any range of ports selected. Using by default: [ 1-1024 ]\n")
- ports = list(range(int(portX), int(portY+1)))
- portX = str(portX)
- portY = str(portY+1)
- if is_up(ip):
- openp = []
- closed = 0
- print("\n" + "="*50)
- print("[Info] [AI] [UFOSCAN] Host %s is UP!" % ip)
- print("="*50)
- print("\n"+"-"*22)
- for port in ports:
- try:
- openp, closed = scan(self, ip, port, openp, closed)
- except:
- pass
- duration = time.time()-start_time
- print("="*70)
- print("[Info] [AI] [UFOSCAN] Scan completed in: [ %s ]" % duration)
- print("="*70)
- if closed == len(ports):
- print("\n[Info] [AI] [UFOSCAN] [ %s/%d ] CLOSED ports. -> [Exiting!]\n" % (closed, len(ports)-1))
- else:
- print("\n[Info] [AI] [UFOSCAN] [ %s/%d ] OPEN ports FOUND!\n" % (len(openp), len(ports)-1))
- print("[+] TARGET: [ " + str(ip) + " ]\n")
- for o in openp:
- print(" [-] OPEN PORT: [ " + str(o) + " ]")
- print("")
- else:
- duration = time.time()-start_time
- print("-"*22)
- print("="*50, "\n")
- print("[Info] [AI] [UFOSCAN] Host %s is DOWN!" % ip)
- print("\n[Info] [AI] [UFOSCAN] Scan completed in: [ %s ]" % duration + "\n")
|