forked from hanc00l/wooyun_public
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
9 changed files
with
26 additions
and
16 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,3 +4,5 @@ flask/static/drops/运维安全-2547.html | |
*.html | ||
|
||
*.jpg | ||
|
||
*.pyc |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -14,7 +14,6 @@ | |
+ pymongo (pip install pymongo) | ||
|
||
### 2.爬虫 | ||
+ **在爬取内容时,请先启动mongodb数据库:mongod &** | ||
|
||
+ 乌云公开漏洞和知识库的爬虫分别位于目录scrapy/wooyun和scrapy/wooyun_drops | ||
|
||
|
@@ -35,36 +34,46 @@ | |
### 3.搜索 | ||
+ 漏洞搜索使用了Flask作为web server,bootstrap作为前端 | ||
|
||
+ **在搜索时,请确定已启动了mongodb数据库:mongod &** | ||
|
||
+ 启动web server :在flask目录下运行python app.py,默认端口是5000 | ||
|
||
+ 搜索:在浏览器通过http://localhost:5000进行搜索漏洞,多个关键字可以用空格分开。 | ||
|
||
### 4.为mongodb数据库创建索引(可选,以下为命令行操作) | ||
### 4.为mongodb数据库创建索引(如果不创建索引,可能导致返回结果报错,以下为命令行状态) | ||
mongo | ||
use wooyun | ||
db.wooyun_list.ensureIndex({"datetime":1}) | ||
db.wooyun_drops.ensureIndex({"datetime":1}) | ||
|
||
### 5.虚拟机 | ||
|
||
+ 虚拟机1:在2016年6月底爬的wooyun全部漏洞库和知识库内容,总共30G,网盘地址为: [http://pan.baidu.com/s/1o7IEaAQ](http://pan.baidu.com/s/1o7IEaAQ) 提取密码:d4cq | ||
+ 虚拟机1:在2016年6月底爬的wooyun全部漏洞库和知识库内容,总共30G(压缩后约11G),网盘地址为: [http://pan.baidu.com/s/1o7IEaAQ](http://pan.baidu.com/s/1o7IEaAQ) 提取密码:d4cq | ||
|
||
使用方法: | ||
1、压缩包解压后是一个vmware虚拟机的镜像,可以由vmware直接打开运行; | ||
2、由于在制作压缩包时虚拟机为“挂起”状态,当前虚拟机的IP地址可能和宿主机的IP地址段不一致,请将虚拟机重启后重新获取IP地址,虚拟机用户密码为hancool/qwe123; | ||
3、进入wooyun_public目录,先用git更新一下到最新的代码git pull; | ||
4、进入wooyun_public/flask目录,运行./app.py; | ||
5、打开浏览器,输入http://ip:5000,ip为虚拟机的网卡地址(使用ifconfig eth0查看) | ||
|
||
+ 虚拟机2:已打包了一个安装了所有组件和程序的虚拟机(不包含具体内容),网盘地址为:[http://pan.baidu.com/s/1sj67KDZ](http://pan.baidu.com/s/1sj67KDZ) 密码:bafi | ||
+ 虚拟机2:已打包了一个安装了所有组件和程序的虚拟机(不包含具体内容,约980M),网盘地址为:[http://pan.baidu.com/s/1sj67KDZ](http://pan.baidu.com/s/1sj67KDZ) 密码:bafi | ||
|
||
+ 虚拟机使用方法: | ||
使用方法: | ||
1、使用vmware或virtualbox导入虚拟机 | ||
2、登录用户名hancool,密码qwe123 | ||
3、进入wooyun_public目录,先用git更新一下到最新的代码git pull | ||
4、分别进入wooyun_public目录下的wooyun和wooyun_drops,运行爬虫爬取数据(爬取全部数据并且本地离线缓存):scrapy crawl wooyun -a page_max=0 -a local_store=true -a update=true | ||
5、进入wooyun_publich目录下的flask,运行./app.py,启动web服务 | ||
6、打开浏览器,输入http://ip:5000,ip为虚拟机的网卡地址(如果是vmware,则使用ifconfig eth0查看,如果是virtualbox为192.168.56.130) | ||
6、打开浏览器,输入http://ip:5000,ip为虚拟机的网卡地址(使用ifconfig eth0查看) | ||
|
||
|
||
### 6.其它 | ||
|
||
+ 本程序只用于技术研究和个人使用,程序组件均为开源程序,漏洞和知识库来源于乌云公开漏洞,版权归wooyun.org | ||
+ 本程序只用于技术研究和个人使用,程序组件均为开源程序,漏洞和知识库来源于乌云公开漏洞,版权归wooyun.org。 | ||
|
||
+ 期待雨过天晴、重开wooyun! | ||
|
||
+ [email protected] | ||
|
||
+ [email protected] 2015.9 |
Empty file.
Empty file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters