1、无线路由器; 2、监控摄像头; 3、HMI或人机界面; 4、智能电源控制系统; 5、建筑访问控制系统; 6、温度控制系统; 7、工业自动化系统; 8、家庭自动化系统; 9、水资源处理系统; 10、...
git clone https://github.com/umair9747/Genzai.git
go build
基础使用
./genzai http://1.1.1.1/
./genzai http://1.1.1.1/ http://8.8.8.8/
./genzai targets.txt
输出数据
./genzai http://1.1.1.1 -save myfile.json
./genzai http://1.1.1.1 -save
{
"Response": {
"Results": [
{
"Target": "",
"IoTidentified": "",
"category": "",
"Issues": [
{
"IssueTitle": "",
"URL": "",
"AdditionalContext": ""
}
]
}
],
"Targets": []
}
}
./genzai http://1.1.1.1/
:::::::: :::::::::: :::: ::: ::::::::: ::: :::::::::::
:+: :+: :+: :+:+: :+: :+: :+: :+: :+:
+:+ +:+ :+:+:+ +:+ +:+ +:+ +:+ +:+
:#: +#++:++# +#+ +:+ +#+ +#+ +#++:++#++: +#+
+#+ +#+# +#+ +#+ +#+#+# +#+ +#+ +#+ +#+
#+# #+# #+# #+# #+#+# #+# #+# #+# #+#
######## ########## ### #### ######### ### ### ###########
The IoT Security Toolkit by Umair Nehri (0x9747)
2024/03/30 23:19:47 Genzai is starting...
2024/03/30 23:19:47 Loading Genzai Signatures DB...
2024/03/30 23:19:47 Loading Vendor Passwords DB...
2024/03/30 23:19:47 Loading Vendor Vulnerabilities DB...
2024/03/30 23:19:47 Starting the scan for http://1.1.1.1/
2024/03/30 23:19:49 IoT Dashboard Discovered: TP-Link Wireless Router
2024/03/30 23:19:49 Trying for default vendor-specific [ TP-Link Wireless Router ] passwords...
2024/03/30 23:19:51 http://1.1.1.1/ [ TP-Link Wireless Router ] is vulnerable with default password - TP-Link Router Default Password - admin:admin
2024/03/30 23:19:51 Scanning for any known vulnerabilities from the DB related to TP-Link Wireless Router
2024/03/30 23:19:57 http://1.1.1.1/ [ TP-Link Wireless Router ] is vulnerable - TP-LINK Wireless N Router WR841N Potentially Vulnerable to Buffer Overflow - CVE-2020-8423
2024/03/30 23:20:45 No file name detected to log the output. Skipping to printing it!
{
"Results": [
{
"Target": "http://1.1.1.1/",
"IoTidentified": "TP-Link Wireless Router",
"category": "Router",
"Issues": [
{
"IssueTitle": "TP-Link Router Default Password - admin:admin",
"URL": "http://1.1.1.1/userRpm/LoginRpm.htm?Save=Save",
"AdditionalContext": "The resulting body had matching strings from the DB."
},
{
"IssueTitle": "TP-LINK Wireless N Router WR841N Potentially Vulnerable to Buffer Overflow - CVE-2020-8423",
"URL": "http://1.1.1.1/",
"AdditionalContext": "The resulting headers matched with those in the DB."
}
]
}
],
"Targets": [
"http://1.1.1.1/"
]
}
原文始发于微信公众号(FreeBuf):Genzai:一款针对物联网安全的多功能实用性工具套件
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论