⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 userconf.py

📁 Ubuntu packages of security software。 相当不错的源码
💻 PY
📖 第 1 页 / 共 2 页
字号:
#!/usr/bin/env python# -*- coding: utf-8 -*-# Copyright (C) 2005 Insecure.Com LLC.## Author: Adriano Monteiro Marques <py.adriano@gmail.com>## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License as published by# the Free Software Foundation; either version 2 of the License, or# (at your option) any later version.## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USAimport osimport os.pathfrom zenmapCore.BasePaths import base_pathsfrom zenmapCore.UmitLogging import logconf_content = '''[diff]colored_diff = True[output_highlight]enable_highlight = True[diff_colors]unchanged = [65213, 65535, 38862]added = [29490, 42662, 54079]not_present = [58079, 19076, 12703]modified = [63881, 42182, 13193]'''target_list_content = ''' '''recent_scans_content = ''' '''scan_profile_content = '''[Quick Scan]description = hint = options = Disable reverse DNS resolution,Aggressive,Verbosecommand = nmap -T Aggressive -v -n %sannotation = [Intense Scan]description = hint = options = Version detection,Operating system detection,Aggressive, Verbosecommand = nmap -T Aggressive -A -v %sannotation = [Regular Scan]description = hint = options = Verbosecommand = nmap -v %sannotation = [Quick and verbose scan]description = hint = options = Watch packets,Verbose,Debug,Aggressive,Disable reverse DNS resolutioncommand = nmap -d -T Aggressive --packet_trace -v -n %sannotation = [Operating System Detection]description = hint = options = Operating system detection,Verbosecommand = nmap -O -v %sannotation = [Quick Services version detection]description = hint = options = Version detection,Aggressive,Verbosecommand = nmap -T Aggressive -sV -v %sannotation = [Quick Full version Detection Scan]description = hint = options = Aggressive,Version detection,Operating system detection,Disable reverse DNS resolution,Verbosecommand = nmap -T Aggressive -sV -n -O -v %sannotation = [Quick Operating System detection]description = hint = options = Operating system detection,Aggressive,Verbosecommand = nmap -T Aggressive -O -v %sannotation =  '''profile_editor_content = '''<?xml version="1.0"?><interface>  <groups>    <group name="Scan"/>    <group name="Ping"/>    <group name="Target"/>    <group name="Source"/>    <group name="Other"/>    <group name="Advanced"/>  </groups>  <Scan label="Scan options">    <option_list label="TCP scan: ">      <option name="None"/>      <option name="ACK scan"/>      <option name="FIN scan"/>      <option name="Null Scan"/>      <option name="TCP SYN Scan"/>      <option name="TCP connect Scan"/>      <option name="Window Scan"/>      <option name="Xmas Tree"/>    </option_list>        <option_list label="Special scans: ">      <option name="None"/>      <option name="IP protocol Scan"/>      <option name="List Scan"/>      <option name="Ping scanning"/>    </option_list>        <option_list label="Timing: ">      <option name="None"/>      <option name="Paranoid"/>      <option name="Sneaky"/>      <option name="Polite"/>      <option name="Normal"/>      <option name="Aggressive"/>      <option name="Insane"/>    </option_list>        <option_check label="FTP bounce attack" option="FTP bounce attack" arg_type="str"/>    <option_check label="Idle Scan (Zombie)" option="Idle Scan" arg_type="str"/>    <option_check label="Services version detection" option="Version detection"/>    <option_check label="Operating system detection" option="Operating system detection"/>    <option_check label="Disable reverse DNS resolution" option="Disable reverse DNS resolution"/>    <option_check label="IPv6 support" option="IPv6 support"/>    <option_check label="Maximum Retries" option="Max Retries" arg_type="int"/>  </Scan>  <Ping label="Ping options">    <option_check label="Don't ping before scanning" option="Ping after Scan"/>    <option_check label="ICMP ping" option="ICMP ping"/>    <option_check label="ICMP timestamp request" option="ICMP timestamp"/>    <option_check label="ICMP netmask request" option="ICMP netmask"/>    <option_check label="Default ping type" option="Default ping"/>    <option_check label="ACK ping" option="TCP ACK" arg_type="str"/>    <option_check label="SYN ping" option="TCP SYN" arg_type="str"/>    <option_check label="UDP probes" option="UDP Probe" arg_type="str"/>  </Ping>  <Target label="Target options">    <option_check label="Excluded hosts/networks" option="Excluded hosts/networks" arg_type="str"/>    <option_check label="Excluded hosts/networks from file" option="Excluded hosts/networks from file" arg_type="path"/>    <option_check label="Read hosts to be scanned from file" option="Read hosts from file" arg_type="path"/>    <option_check label="Scan random hosts" option="Scan random hosts" arg_type="int"/>    <option_check label="Ports to scan" option="Ports to scan" arg_type="str"/>    <option_check label="Only scan ports listed on services" option="Scan services ports"/>  </Target>  <Source label="Source options">    <option_check label="Use decoys to hide identity" option="Use decoys" arg_type="str"/>    <option_check label="Set source IP address" option="Set source IP" arg_type="str"/>    <option_check label="Set source port" option="Set source port" arg_type="str"/>    <option_check label="Set network interface" option="Set network interface" arg_type="str"/>  </Source>  <Other label="Other options">    <option_check label="Extra options definied by user" option="Extra" arg_type="str"/>    <option_check label="Set IPv4 time to live (ttl)" option="Set IPv4 ttl" arg_type="str"/>    <option_check label="Fragment IP packets" option="Fragment IP Packets"/>    <option_check label="Verbosity level" option="Verbose" arg_type="level"/>    <option_check label="Debugging level" option="Debug" arg_type="level"/>    <option_check label="Watch packets" option="Watch packets"/>    <option_check label="Disable randomizing scanned ports" option="Disable randomizing scanned ports"/>  </Other>  <Advanced label="Advanced options">    <option_check label="Time spent before giving up on an IP" option="Time before give up IP" arg_type="int"/>    <option_check label="Time spent before retransmitting or timing out" option="Time before retransmitting" arg_type="int"/>    <option_check label="Minimum timeout time per probe" option="Min timeout per probe" arg_type="int"/>    <option_check label="Specifies the initial probe timeout" option="Initial probe timeout" arg_type="int"/>    <option_check label="Maximum number of hosts in parallel" option="Max parallel hosts" arg_type="int"/>    <option_check label="Minimum number of hosts in parallel" option="Min parallel hosts" arg_type="int"/>    <option_check label="Maximum number of scans in parallel" option="Max parallel scans" arg_type="int"/>    <option_check label="Minimum number of scans in parallel" option="Min parallel scans" arg_type="int"/>    <option_check label="Maximum amount of time between probes" option="Max time between probes" arg_type="int"/>    <option_check label="Minimum amount of time between probes" option="Min time between probes" arg_type="int"/>  </Advanced></interface>'''options_content = '''<?xml version="1.0"?><nmap_options>  <option name="FTP bounce attack"          option="-b %s"          hint="Try to use a given FTP server as proxy"          arguments="Host in standard URL notation: username:password@server:port"          need_root="0"/>            <option name="Max Retries"          option="--max_retries %s"          hint="Limit the maximum number of retransmissions the port scan engine should do"          arguments="The number of retransmissions"          need_root="0"/>            <option name="ACK scan"          option="-sA"          hint="Try to discover firewall rulesets"          arguments=""          need_root="1"/>            <option name="FIN scan"          option="-sF"          hint="Stealth FIN scan mode"          arguments=""          need_root="1"/>            <option name="Idle Scan"          option="-sI %s"          hint="Use a zombie host to scan a given target"          arguments="Zombie host address in the format: host[:probeport]"          need_root="0"/>            <option name="Null Scan"          option="-sN"          hint="Stealth Null Scan"          arguments=""          need_root="1"/>            <option name="TCP SYN Scan"          option="-sS"          hint="Default TCP Scan for root user"          arguments=""          need_root="1"/>            <option name="TCP connect Scan"          option="-sT"          hint="Default TCP Scan for non-root users"          arguments=""          need_root="0"/>            <option name="Window Scan"          option="-sW"          hint="Window Scan"          arguments=""          need_root="1"/>            <option name="Xmas Tree"          option="-sX"          hint="Stealth Xmas Scan"          arguments=""          need_root="1"/>            <option name="IP protocol Scan"          option="-sO"          hint="Scan for IP protocols"          arguments=""          need_root="1"/>            <option name="IP protocol Scan with number"          option="-sO -p%"          hint="Scan for IP protocols"          arguments=""          need_root="1"/>            <option name="List Scan"          option="-sL"          hint=""          arguments=""          need_root="0"/>            <option name="Ping scanning"          option="-sP"          hint=""          arguments=""          need_root="0"/>            <option name="Paranoid"          option="-T Paranoid"          hint="Slowest scan (Avoid IDS detection)"          arguments=""          need_root="0"/>            <option name="Sneaky"          option="-T Sneaky"          hint="Slower scan"          arguments=""          need_root="0"/>            <option name="Polite"          option="-T Polite"          hint="Slow scan"          arguments=""          need_root="0"/>            <option name="Normal"          option="-T Normal"          hint="Default scan"          arguments=""          need_root="0"/>            <option name="Aggressive"          option="-T Aggressive"          hint="Fast scan"          arguments=""          need_root="0"/>            <option name="Insane"          option="-T Insane"          hint="Faster scan"          arguments=""          need_root="0"/>            <option name="Version detection"          option="-sV"          hint="Try to detect version of services on scanned hosts"          arguments=""          need_root="0"/>            <option name="Operating system detection"          option="-O"          hint="Try to detect running OS on scanned hosts"          arguments=""          need_root="1"/>            <option name="Disable reverse DNS resolution"          option="-n"          hint=""          arguments=""          need_root="1"/>            <option name="Ping after Scan"          option="-PN"          hint="Don't ping hosts before scanning"          arguments=""          need_root="0"/>            <option name="TCP ACK"          option="-PA%s"          hint="TCP ACK ping a host or network"          arguments="List of tageted ports"          need_root="0"/>            <option name="TCP SYN"          option="-PS%s"          hint="TCP SYN ping a host or network"          arguments="List of tageted ports"          need_root="1"/>            <option name="UDP Probe"          option="-PU%s"          hint="UDP probes to ping a host or network"          arguments="List of targeted ports"          need_root="0"/>            <option name="ICMP ping"          option="-PE"          hint="ICMP ping a host or network"          arguments=""          need_root="1"/>            <option name="ICMP timestamp"          option="-PP"          hint="ICMP timestamp request to ping host or network"          arguments=""          need_root="1"/>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -