souleyez 2.43.26__py3-none-any.whl → 2.43.34__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- souleyez/__init__.py +1 -2
- souleyez/ai/__init__.py +21 -15
- souleyez/ai/action_mapper.py +249 -150
- souleyez/ai/chain_advisor.py +116 -100
- souleyez/ai/claude_provider.py +29 -28
- souleyez/ai/context_builder.py +80 -62
- souleyez/ai/executor.py +158 -117
- souleyez/ai/feedback_handler.py +136 -121
- souleyez/ai/llm_factory.py +27 -20
- souleyez/ai/llm_provider.py +4 -2
- souleyez/ai/ollama_provider.py +6 -9
- souleyez/ai/ollama_service.py +44 -37
- souleyez/ai/path_scorer.py +91 -76
- souleyez/ai/recommender.py +176 -144
- souleyez/ai/report_context.py +74 -73
- souleyez/ai/report_service.py +84 -66
- souleyez/ai/result_parser.py +222 -229
- souleyez/ai/safety.py +67 -44
- souleyez/auth/__init__.py +23 -22
- souleyez/auth/audit.py +36 -26
- souleyez/auth/engagement_access.py +65 -48
- souleyez/auth/permissions.py +14 -3
- souleyez/auth/session_manager.py +54 -37
- souleyez/auth/user_manager.py +109 -64
- souleyez/commands/audit.py +40 -43
- souleyez/commands/auth.py +35 -15
- souleyez/commands/deliverables.py +55 -50
- souleyez/commands/engagement.py +47 -28
- souleyez/commands/license.py +32 -23
- souleyez/commands/screenshots.py +36 -32
- souleyez/commands/user.py +82 -36
- souleyez/config.py +52 -44
- souleyez/core/credential_tester.py +87 -81
- souleyez/core/cve_mappings.py +179 -192
- souleyez/core/cve_matcher.py +162 -148
- souleyez/core/msf_auto_mapper.py +100 -83
- souleyez/core/msf_chain_engine.py +294 -256
- souleyez/core/msf_database.py +153 -70
- souleyez/core/msf_integration.py +679 -673
- souleyez/core/msf_rpc_client.py +40 -42
- souleyez/core/msf_rpc_manager.py +77 -79
- souleyez/core/msf_sync_manager.py +241 -181
- souleyez/core/network_utils.py +22 -15
- souleyez/core/parser_handler.py +34 -25
- souleyez/core/pending_chains.py +114 -63
- souleyez/core/templates.py +158 -107
- souleyez/core/tool_chaining.py +9526 -2879
- souleyez/core/version_utils.py +79 -94
- souleyez/core/vuln_correlation.py +136 -89
- souleyez/core/web_utils.py +33 -32
- souleyez/data/wordlists/ad_users.txt +378 -0
- souleyez/data/wordlists/api_endpoints_large.txt +769 -0
- souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
- souleyez/data/wordlists/lfi_payloads.txt +82 -0
- souleyez/data/wordlists/passwords_brute.txt +1548 -0
- souleyez/data/wordlists/passwords_crack.txt +2479 -0
- souleyez/data/wordlists/passwords_spray.txt +386 -0
- souleyez/data/wordlists/subdomains_large.txt +5057 -0
- souleyez/data/wordlists/usernames_common.txt +694 -0
- souleyez/data/wordlists/web_dirs_large.txt +4769 -0
- souleyez/detection/__init__.py +1 -1
- souleyez/detection/attack_signatures.py +12 -17
- souleyez/detection/mitre_mappings.py +61 -55
- souleyez/detection/validator.py +97 -86
- souleyez/devtools.py +23 -10
- souleyez/docs/README.md +4 -4
- souleyez/docs/api-reference/cli-commands.md +2 -2
- souleyez/docs/developer-guide/adding-new-tools.md +562 -0
- souleyez/docs/user-guide/auto-chaining.md +30 -8
- souleyez/docs/user-guide/getting-started.md +1 -1
- souleyez/docs/user-guide/installation.md +26 -3
- souleyez/docs/user-guide/metasploit-integration.md +2 -2
- souleyez/docs/user-guide/rbac.md +1 -1
- souleyez/docs/user-guide/scope-management.md +1 -1
- souleyez/docs/user-guide/siem-integration.md +1 -1
- souleyez/docs/user-guide/tools-reference.md +1 -8
- souleyez/docs/user-guide/worker-management.md +1 -1
- souleyez/engine/background.py +1239 -535
- souleyez/engine/base.py +4 -1
- souleyez/engine/job_status.py +17 -49
- souleyez/engine/log_sanitizer.py +103 -77
- souleyez/engine/manager.py +38 -7
- souleyez/engine/result_handler.py +2200 -1550
- souleyez/engine/worker_manager.py +50 -41
- souleyez/export/evidence_bundle.py +72 -62
- souleyez/feature_flags/features.py +16 -20
- souleyez/feature_flags.py +5 -9
- souleyez/handlers/__init__.py +11 -0
- souleyez/handlers/base.py +188 -0
- souleyez/handlers/bash_handler.py +277 -0
- souleyez/handlers/bloodhound_handler.py +243 -0
- souleyez/handlers/certipy_handler.py +311 -0
- souleyez/handlers/crackmapexec_handler.py +486 -0
- souleyez/handlers/dnsrecon_handler.py +344 -0
- souleyez/handlers/enum4linux_handler.py +400 -0
- souleyez/handlers/evil_winrm_handler.py +493 -0
- souleyez/handlers/ffuf_handler.py +815 -0
- souleyez/handlers/gobuster_handler.py +1114 -0
- souleyez/handlers/gpp_extract_handler.py +334 -0
- souleyez/handlers/hashcat_handler.py +444 -0
- souleyez/handlers/hydra_handler.py +563 -0
- souleyez/handlers/impacket_getuserspns_handler.py +343 -0
- souleyez/handlers/impacket_psexec_handler.py +222 -0
- souleyez/handlers/impacket_secretsdump_handler.py +426 -0
- souleyez/handlers/john_handler.py +286 -0
- souleyez/handlers/katana_handler.py +425 -0
- souleyez/handlers/kerbrute_handler.py +298 -0
- souleyez/handlers/ldapsearch_handler.py +636 -0
- souleyez/handlers/lfi_extract_handler.py +464 -0
- souleyez/handlers/msf_auxiliary_handler.py +408 -0
- souleyez/handlers/msf_exploit_handler.py +380 -0
- souleyez/handlers/nikto_handler.py +413 -0
- souleyez/handlers/nmap_handler.py +821 -0
- souleyez/handlers/nuclei_handler.py +359 -0
- souleyez/handlers/nxc_handler.py +371 -0
- souleyez/handlers/rdp_sec_check_handler.py +353 -0
- souleyez/handlers/registry.py +292 -0
- souleyez/handlers/responder_handler.py +232 -0
- souleyez/handlers/service_explorer_handler.py +434 -0
- souleyez/handlers/smbclient_handler.py +344 -0
- souleyez/handlers/smbmap_handler.py +510 -0
- souleyez/handlers/smbpasswd_handler.py +296 -0
- souleyez/handlers/sqlmap_handler.py +1116 -0
- souleyez/handlers/theharvester_handler.py +601 -0
- souleyez/handlers/web_login_test_handler.py +327 -0
- souleyez/handlers/whois_handler.py +277 -0
- souleyez/handlers/wpscan_handler.py +554 -0
- souleyez/history.py +32 -16
- souleyez/importers/msf_importer.py +106 -75
- souleyez/importers/smart_importer.py +208 -147
- souleyez/integrations/siem/__init__.py +10 -10
- souleyez/integrations/siem/base.py +17 -18
- souleyez/integrations/siem/elastic.py +108 -122
- souleyez/integrations/siem/factory.py +207 -80
- souleyez/integrations/siem/googlesecops.py +146 -154
- souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
- souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
- souleyez/integrations/siem/sentinel.py +107 -109
- souleyez/integrations/siem/splunk.py +246 -212
- souleyez/integrations/siem/wazuh.py +65 -71
- souleyez/integrations/wazuh/__init__.py +5 -5
- souleyez/integrations/wazuh/client.py +70 -93
- souleyez/integrations/wazuh/config.py +85 -57
- souleyez/integrations/wazuh/host_mapper.py +28 -36
- souleyez/integrations/wazuh/sync.py +78 -68
- souleyez/intelligence/__init__.py +4 -5
- souleyez/intelligence/correlation_analyzer.py +309 -295
- souleyez/intelligence/exploit_knowledge.py +661 -623
- souleyez/intelligence/exploit_suggestions.py +159 -139
- souleyez/intelligence/gap_analyzer.py +132 -97
- souleyez/intelligence/gap_detector.py +251 -214
- souleyez/intelligence/sensitive_tables.py +266 -129
- souleyez/intelligence/service_parser.py +137 -123
- souleyez/intelligence/surface_analyzer.py +407 -268
- souleyez/intelligence/target_parser.py +159 -162
- souleyez/licensing/__init__.py +6 -6
- souleyez/licensing/validator.py +17 -19
- souleyez/log_config.py +79 -54
- souleyez/main.py +1505 -687
- souleyez/migrations/fix_job_counter.py +16 -14
- souleyez/parsers/bloodhound_parser.py +41 -39
- souleyez/parsers/crackmapexec_parser.py +178 -111
- souleyez/parsers/dalfox_parser.py +72 -77
- souleyez/parsers/dnsrecon_parser.py +103 -91
- souleyez/parsers/enum4linux_parser.py +183 -153
- souleyez/parsers/ffuf_parser.py +29 -25
- souleyez/parsers/gobuster_parser.py +301 -41
- souleyez/parsers/hashcat_parser.py +324 -79
- souleyez/parsers/http_fingerprint_parser.py +350 -103
- souleyez/parsers/hydra_parser.py +131 -111
- souleyez/parsers/impacket_parser.py +231 -178
- souleyez/parsers/john_parser.py +98 -86
- souleyez/parsers/katana_parser.py +316 -0
- souleyez/parsers/msf_parser.py +943 -498
- souleyez/parsers/nikto_parser.py +346 -65
- souleyez/parsers/nmap_parser.py +262 -174
- souleyez/parsers/nuclei_parser.py +40 -44
- souleyez/parsers/responder_parser.py +26 -26
- souleyez/parsers/searchsploit_parser.py +74 -74
- souleyez/parsers/service_explorer_parser.py +279 -0
- souleyez/parsers/smbmap_parser.py +180 -124
- souleyez/parsers/sqlmap_parser.py +434 -308
- souleyez/parsers/theharvester_parser.py +75 -57
- souleyez/parsers/whois_parser.py +135 -94
- souleyez/parsers/wpscan_parser.py +278 -190
- souleyez/plugins/afp.py +44 -36
- souleyez/plugins/afp_brute.py +114 -46
- souleyez/plugins/ard.py +48 -37
- souleyez/plugins/bloodhound.py +95 -61
- souleyez/plugins/certipy.py +303 -0
- souleyez/plugins/crackmapexec.py +186 -85
- souleyez/plugins/dalfox.py +120 -59
- souleyez/plugins/dns_hijack.py +146 -41
- souleyez/plugins/dnsrecon.py +97 -61
- souleyez/plugins/enum4linux.py +91 -66
- souleyez/plugins/evil_winrm.py +291 -0
- souleyez/plugins/ffuf.py +166 -90
- souleyez/plugins/firmware_extract.py +133 -29
- souleyez/plugins/gobuster.py +387 -190
- souleyez/plugins/gpp_extract.py +393 -0
- souleyez/plugins/hashcat.py +100 -73
- souleyez/plugins/http_fingerprint.py +854 -267
- souleyez/plugins/hydra.py +566 -200
- souleyez/plugins/impacket_getnpusers.py +117 -69
- souleyez/plugins/impacket_psexec.py +84 -64
- souleyez/plugins/impacket_secretsdump.py +103 -69
- souleyez/plugins/impacket_smbclient.py +89 -75
- souleyez/plugins/john.py +86 -69
- souleyez/plugins/katana.py +313 -0
- souleyez/plugins/kerbrute.py +237 -0
- souleyez/plugins/lfi_extract.py +541 -0
- souleyez/plugins/macos_ssh.py +117 -48
- souleyez/plugins/mdns.py +35 -30
- souleyez/plugins/msf_auxiliary.py +253 -130
- souleyez/plugins/msf_exploit.py +239 -161
- souleyez/plugins/nikto.py +134 -78
- souleyez/plugins/nmap.py +275 -91
- souleyez/plugins/nuclei.py +180 -89
- souleyez/plugins/nxc.py +285 -0
- souleyez/plugins/plugin_base.py +35 -36
- souleyez/plugins/plugin_template.py +13 -5
- souleyez/plugins/rdp_sec_check.py +130 -0
- souleyez/plugins/responder.py +112 -71
- souleyez/plugins/router_http_brute.py +76 -65
- souleyez/plugins/router_ssh_brute.py +118 -41
- souleyez/plugins/router_telnet_brute.py +124 -42
- souleyez/plugins/routersploit.py +91 -59
- souleyez/plugins/routersploit_exploit.py +77 -55
- souleyez/plugins/searchsploit.py +91 -77
- souleyez/plugins/service_explorer.py +1160 -0
- souleyez/plugins/smbmap.py +122 -72
- souleyez/plugins/smbpasswd.py +215 -0
- souleyez/plugins/sqlmap.py +301 -113
- souleyez/plugins/theharvester.py +127 -75
- souleyez/plugins/tr069.py +79 -57
- souleyez/plugins/upnp.py +65 -47
- souleyez/plugins/upnp_abuse.py +73 -55
- souleyez/plugins/vnc_access.py +129 -42
- souleyez/plugins/vnc_brute.py +109 -38
- souleyez/plugins/web_login_test.py +417 -0
- souleyez/plugins/whois.py +77 -58
- souleyez/plugins/wpscan.py +173 -69
- souleyez/reporting/__init__.py +2 -1
- souleyez/reporting/attack_chain.py +411 -346
- souleyez/reporting/charts.py +436 -501
- souleyez/reporting/compliance_mappings.py +334 -201
- souleyez/reporting/detection_report.py +126 -125
- souleyez/reporting/formatters.py +828 -591
- souleyez/reporting/generator.py +386 -302
- souleyez/reporting/metrics.py +72 -75
- souleyez/scanner.py +35 -29
- souleyez/security/__init__.py +37 -11
- souleyez/security/scope_validator.py +175 -106
- souleyez/security/validation.py +223 -149
- souleyez/security.py +22 -6
- souleyez/storage/credentials.py +247 -186
- souleyez/storage/crypto.py +296 -129
- souleyez/storage/database.py +73 -50
- souleyez/storage/db.py +58 -36
- souleyez/storage/deliverable_evidence.py +177 -128
- souleyez/storage/deliverable_exporter.py +282 -246
- souleyez/storage/deliverable_templates.py +134 -116
- souleyez/storage/deliverables.py +135 -130
- souleyez/storage/engagements.py +109 -56
- souleyez/storage/evidence.py +181 -152
- souleyez/storage/execution_log.py +31 -17
- souleyez/storage/exploit_attempts.py +93 -57
- souleyez/storage/exploits.py +67 -36
- souleyez/storage/findings.py +48 -61
- souleyez/storage/hosts.py +176 -144
- souleyez/storage/migrate_to_engagements.py +43 -19
- souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
- souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
- souleyez/storage/migrations/_003_add_execution_log.py +14 -8
- souleyez/storage/migrations/_005_screenshots.py +13 -5
- souleyez/storage/migrations/_006_deliverables.py +13 -5
- souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
- souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
- souleyez/storage/migrations/_010_evidence_linking.py +17 -10
- souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
- souleyez/storage/migrations/_012_team_collaboration.py +34 -21
- souleyez/storage/migrations/_013_add_host_tags.py +12 -6
- souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
- souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
- souleyez/storage/migrations/_016_add_domain_field.py +10 -4
- souleyez/storage/migrations/_017_msf_sessions.py +16 -8
- souleyez/storage/migrations/_018_add_osint_target.py +10 -6
- souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
- souleyez/storage/migrations/_020_add_rbac.py +36 -15
- souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
- souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
- souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
- souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
- souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
- souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
- souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
- souleyez/storage/migrations/__init__.py +26 -26
- souleyez/storage/migrations/migration_manager.py +19 -19
- souleyez/storage/msf_sessions.py +100 -65
- souleyez/storage/osint.py +17 -24
- souleyez/storage/recommendation_engine.py +269 -235
- souleyez/storage/screenshots.py +33 -32
- souleyez/storage/smb_shares.py +136 -92
- souleyez/storage/sqlmap_data.py +183 -128
- souleyez/storage/team_collaboration.py +135 -141
- souleyez/storage/timeline_tracker.py +122 -94
- souleyez/storage/wazuh_vulns.py +64 -66
- souleyez/storage/web_paths.py +33 -37
- souleyez/testing/credential_tester.py +221 -205
- souleyez/ui/__init__.py +1 -1
- souleyez/ui/ai_quotes.py +12 -12
- souleyez/ui/attack_surface.py +2439 -1516
- souleyez/ui/chain_rules_view.py +914 -382
- souleyez/ui/correlation_view.py +312 -230
- souleyez/ui/dashboard.py +2382 -1130
- souleyez/ui/deliverables_view.py +148 -62
- souleyez/ui/design_system.py +13 -13
- souleyez/ui/errors.py +49 -49
- souleyez/ui/evidence_linking_view.py +284 -179
- souleyez/ui/evidence_vault.py +393 -285
- souleyez/ui/exploit_suggestions_view.py +555 -349
- souleyez/ui/export_view.py +100 -66
- souleyez/ui/gap_analysis_view.py +315 -171
- souleyez/ui/help_system.py +105 -97
- souleyez/ui/intelligence_view.py +436 -293
- souleyez/ui/interactive.py +23434 -10286
- souleyez/ui/interactive_selector.py +75 -68
- souleyez/ui/log_formatter.py +47 -39
- souleyez/ui/menu_components.py +22 -13
- souleyez/ui/msf_auxiliary_menu.py +184 -133
- souleyez/ui/pending_chains_view.py +336 -172
- souleyez/ui/progress_indicators.py +5 -3
- souleyez/ui/recommendations_view.py +195 -137
- souleyez/ui/rule_builder.py +343 -225
- souleyez/ui/setup_wizard.py +678 -284
- souleyez/ui/shortcuts.py +217 -165
- souleyez/ui/splunk_gap_analysis_view.py +452 -270
- souleyez/ui/splunk_vulns_view.py +139 -86
- souleyez/ui/team_dashboard.py +498 -335
- souleyez/ui/template_selector.py +196 -105
- souleyez/ui/terminal.py +6 -6
- souleyez/ui/timeline_view.py +198 -127
- souleyez/ui/tool_setup.py +264 -164
- souleyez/ui/tutorial.py +202 -72
- souleyez/ui/tutorial_state.py +40 -40
- souleyez/ui/wazuh_vulns_view.py +235 -141
- souleyez/ui/wordlist_browser.py +260 -107
- souleyez/ui.py +464 -312
- souleyez/utils/tool_checker.py +427 -367
- souleyez/utils.py +33 -29
- souleyez/wordlists.py +134 -167
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/METADATA +1 -1
- souleyez-2.43.34.dist-info/RECORD +443 -0
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/WHEEL +1 -1
- souleyez-2.43.26.dist-info/RECORD +0 -379
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/entry_points.txt +0 -0
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/licenses/LICENSE +0 -0
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,353 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
"""
|
|
3
|
+
Handler for rdp-sec-check RDP security scanner.
|
|
4
|
+
"""
|
|
5
|
+
import logging
|
|
6
|
+
import os
|
|
7
|
+
import re
|
|
8
|
+
from typing import Any, Dict, Optional
|
|
9
|
+
|
|
10
|
+
import click
|
|
11
|
+
|
|
12
|
+
from souleyez.handlers.base import BaseToolHandler
|
|
13
|
+
|
|
14
|
+
logger = logging.getLogger(__name__)
|
|
15
|
+
|
|
16
|
+
STATUS_DONE = "done"
|
|
17
|
+
STATUS_ERROR = "error"
|
|
18
|
+
STATUS_WARNING = "warning"
|
|
19
|
+
STATUS_NO_RESULTS = "no_results"
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
class RdpSecCheckHandler(BaseToolHandler):
|
|
23
|
+
"""Handler for rdp-sec-check RDP security scanner."""
|
|
24
|
+
|
|
25
|
+
tool_name = "rdp-sec-check"
|
|
26
|
+
display_name = "RDP Security Check"
|
|
27
|
+
|
|
28
|
+
has_error_handler = True
|
|
29
|
+
has_warning_handler = True
|
|
30
|
+
has_no_results_handler = True
|
|
31
|
+
has_done_handler = True
|
|
32
|
+
|
|
33
|
+
# Protocol support patterns
|
|
34
|
+
PROTOCOL_RDP_PATTERN = r"supports PROTOCOL_RDP:\s*(TRUE|FALSE)"
|
|
35
|
+
PROTOCOL_SSL_PATTERN = r"supports PROTOCOL_SSL:\s*(TRUE|FALSE)"
|
|
36
|
+
PROTOCOL_HYBRID_PATTERN = r"supports PROTOCOL_HYBRID:\s*(TRUE|FALSE)"
|
|
37
|
+
|
|
38
|
+
# Encryption patterns
|
|
39
|
+
ENCRYPTION_LEVEL_PATTERN = r"encryption level:\s*(\S+)"
|
|
40
|
+
|
|
41
|
+
# Security issue patterns
|
|
42
|
+
ISSUE_PATTERN = r"has issue\s+(\S+)"
|
|
43
|
+
|
|
44
|
+
# NLA patterns
|
|
45
|
+
NLA_PATTERN = r"(NLA|Network Level Authentication).*?(required|not required|supported|not supported)"
|
|
46
|
+
|
|
47
|
+
# Error patterns
|
|
48
|
+
ERROR_PATTERNS = [
|
|
49
|
+
(r"connection refused", "Connection refused"),
|
|
50
|
+
(r"connection timed out", "Connection timed out"),
|
|
51
|
+
(r"no route to host", "No route to host"),
|
|
52
|
+
(r"unable to connect", "Unable to connect"),
|
|
53
|
+
(r"failed to run command", "Tool not installed"),
|
|
54
|
+
]
|
|
55
|
+
|
|
56
|
+
def parse_job(
|
|
57
|
+
self,
|
|
58
|
+
engagement_id: int,
|
|
59
|
+
log_path: str,
|
|
60
|
+
job: Dict[str, Any],
|
|
61
|
+
host_manager: Optional[Any] = None,
|
|
62
|
+
findings_manager: Optional[Any] = None,
|
|
63
|
+
credentials_manager: Optional[Any] = None,
|
|
64
|
+
) -> Dict[str, Any]:
|
|
65
|
+
"""Parse rdp-sec-check results."""
|
|
66
|
+
try:
|
|
67
|
+
target = job.get("target", "")
|
|
68
|
+
|
|
69
|
+
if not log_path or not os.path.exists(log_path):
|
|
70
|
+
return {
|
|
71
|
+
"tool": "rdp-sec-check",
|
|
72
|
+
"status": STATUS_ERROR,
|
|
73
|
+
"error": "Log file not found",
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
77
|
+
log_content = f.read()
|
|
78
|
+
|
|
79
|
+
# Check for errors first
|
|
80
|
+
for pattern, error_msg in self.ERROR_PATTERNS:
|
|
81
|
+
if re.search(pattern, log_content, re.IGNORECASE):
|
|
82
|
+
return {
|
|
83
|
+
"tool": "rdp-sec-check",
|
|
84
|
+
"status": STATUS_ERROR,
|
|
85
|
+
"target": target,
|
|
86
|
+
"error": error_msg,
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
# Parse protocol support
|
|
90
|
+
protocols = {}
|
|
91
|
+
rdp_match = re.search(self.PROTOCOL_RDP_PATTERN, log_content, re.IGNORECASE)
|
|
92
|
+
if rdp_match:
|
|
93
|
+
protocols["rdp"] = rdp_match.group(1).upper() == "TRUE"
|
|
94
|
+
|
|
95
|
+
ssl_match = re.search(self.PROTOCOL_SSL_PATTERN, log_content, re.IGNORECASE)
|
|
96
|
+
if ssl_match:
|
|
97
|
+
protocols["tls"] = ssl_match.group(1).upper() == "TRUE"
|
|
98
|
+
|
|
99
|
+
hybrid_match = re.search(
|
|
100
|
+
self.PROTOCOL_HYBRID_PATTERN, log_content, re.IGNORECASE
|
|
101
|
+
)
|
|
102
|
+
if hybrid_match:
|
|
103
|
+
protocols["credssp"] = hybrid_match.group(1).upper() == "TRUE"
|
|
104
|
+
|
|
105
|
+
# Parse encryption level
|
|
106
|
+
encryption_level = None
|
|
107
|
+
enc_match = re.search(
|
|
108
|
+
self.ENCRYPTION_LEVEL_PATTERN, log_content, re.IGNORECASE
|
|
109
|
+
)
|
|
110
|
+
if enc_match:
|
|
111
|
+
encryption_level = enc_match.group(1)
|
|
112
|
+
|
|
113
|
+
# Parse security issues
|
|
114
|
+
issues = re.findall(self.ISSUE_PATTERN, log_content, re.IGNORECASE)
|
|
115
|
+
|
|
116
|
+
# Check NLA status
|
|
117
|
+
nla_required = None
|
|
118
|
+
nla_match = re.search(self.NLA_PATTERN, log_content, re.IGNORECASE)
|
|
119
|
+
if nla_match:
|
|
120
|
+
nla_status = nla_match.group(2).lower()
|
|
121
|
+
nla_required = "required" in nla_status or "supported" in nla_status
|
|
122
|
+
|
|
123
|
+
# Determine security findings
|
|
124
|
+
findings = []
|
|
125
|
+
|
|
126
|
+
# Check for NLA issues
|
|
127
|
+
if "NLA_SUPPORTED_BUT_NOT_MANDATED" in log_content:
|
|
128
|
+
findings.append(
|
|
129
|
+
{
|
|
130
|
+
"type": "misconfiguration",
|
|
131
|
+
"severity": "medium",
|
|
132
|
+
"title": "NLA Supported But Not Mandated",
|
|
133
|
+
"description": "NLA is supported but not required - allows downgrade attacks and pre-auth DoS",
|
|
134
|
+
}
|
|
135
|
+
)
|
|
136
|
+
elif nla_required is False:
|
|
137
|
+
findings.append(
|
|
138
|
+
{
|
|
139
|
+
"type": "misconfiguration",
|
|
140
|
+
"severity": "high",
|
|
141
|
+
"title": "NLA Not Required",
|
|
142
|
+
"description": "Network Level Authentication is not required, enabling MITM attacks",
|
|
143
|
+
}
|
|
144
|
+
)
|
|
145
|
+
|
|
146
|
+
# RDP without TLS
|
|
147
|
+
if protocols.get("rdp") and not protocols.get("tls"):
|
|
148
|
+
findings.append(
|
|
149
|
+
{
|
|
150
|
+
"type": "misconfiguration",
|
|
151
|
+
"severity": "medium",
|
|
152
|
+
"title": "RDP Without TLS",
|
|
153
|
+
"description": "RDP is supported without TLS encryption",
|
|
154
|
+
}
|
|
155
|
+
)
|
|
156
|
+
|
|
157
|
+
# Weak encryption
|
|
158
|
+
if encryption_level and encryption_level.upper() in [
|
|
159
|
+
"NONE",
|
|
160
|
+
"LOW",
|
|
161
|
+
"CLIENT_COMPATIBLE",
|
|
162
|
+
]:
|
|
163
|
+
findings.append(
|
|
164
|
+
{
|
|
165
|
+
"type": "misconfiguration",
|
|
166
|
+
"severity": "medium",
|
|
167
|
+
"title": f"Weak RDP Encryption: {encryption_level}",
|
|
168
|
+
"description": f"RDP encryption level is set to {encryption_level}",
|
|
169
|
+
}
|
|
170
|
+
)
|
|
171
|
+
|
|
172
|
+
# Check for SSL required (good config)
|
|
173
|
+
ssl_required = "SSL_REQUIRED_BY_SERVER" in log_content
|
|
174
|
+
|
|
175
|
+
# Store findings
|
|
176
|
+
if findings and findings_manager and host_manager:
|
|
177
|
+
host = host_manager.get_host_by_ip(engagement_id, target)
|
|
178
|
+
if host:
|
|
179
|
+
for finding in findings:
|
|
180
|
+
try:
|
|
181
|
+
findings_manager.add_finding(
|
|
182
|
+
engagement_id=engagement_id,
|
|
183
|
+
host_id=host["id"],
|
|
184
|
+
finding_type=finding["type"],
|
|
185
|
+
severity=finding["severity"],
|
|
186
|
+
title=finding["title"],
|
|
187
|
+
description=finding["description"],
|
|
188
|
+
tool="rdp-sec-check",
|
|
189
|
+
port=3389,
|
|
190
|
+
service="rdp",
|
|
191
|
+
)
|
|
192
|
+
except Exception as e:
|
|
193
|
+
logger.warning(f"Failed to store finding: {e}")
|
|
194
|
+
|
|
195
|
+
# Determine result
|
|
196
|
+
if protocols or encryption_level or issues or findings:
|
|
197
|
+
# Only warn on HIGH severity findings - medium/low are informational
|
|
198
|
+
has_high_severity = any(f.get("severity") == "high" for f in findings)
|
|
199
|
+
status = STATUS_WARNING if has_high_severity else STATUS_DONE
|
|
200
|
+
return {
|
|
201
|
+
"tool": "rdp-sec-check",
|
|
202
|
+
"status": status,
|
|
203
|
+
"target": target,
|
|
204
|
+
"protocols": protocols,
|
|
205
|
+
"encryption_level": encryption_level,
|
|
206
|
+
"nla_required": nla_required,
|
|
207
|
+
"ssl_required": "SSL_REQUIRED_BY_SERVER" in log_content,
|
|
208
|
+
"issues": issues,
|
|
209
|
+
"findings": findings,
|
|
210
|
+
"findings_added": len(findings),
|
|
211
|
+
}
|
|
212
|
+
|
|
213
|
+
return {
|
|
214
|
+
"tool": "rdp-sec-check",
|
|
215
|
+
"status": STATUS_NO_RESULTS,
|
|
216
|
+
"target": target,
|
|
217
|
+
}
|
|
218
|
+
|
|
219
|
+
except Exception as e:
|
|
220
|
+
logger.error(f"Error parsing rdp-sec-check job: {e}")
|
|
221
|
+
return {"tool": "rdp-sec-check", "status": STATUS_ERROR, "error": str(e)}
|
|
222
|
+
|
|
223
|
+
def display_done(
|
|
224
|
+
self,
|
|
225
|
+
job: Dict[str, Any],
|
|
226
|
+
log_path: str,
|
|
227
|
+
show_all: bool = False,
|
|
228
|
+
show_passwords: bool = False,
|
|
229
|
+
) -> None:
|
|
230
|
+
"""Display successful rdp-sec-check results."""
|
|
231
|
+
click.echo()
|
|
232
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
233
|
+
click.echo(click.style("RDP SECURITY CHECK COMPLETE", fg="green", bold=True))
|
|
234
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
235
|
+
click.echo()
|
|
236
|
+
|
|
237
|
+
parse_result = job.get("parse_result", {})
|
|
238
|
+
|
|
239
|
+
# Protocol support
|
|
240
|
+
protocols = parse_result.get("protocols", {})
|
|
241
|
+
if protocols:
|
|
242
|
+
click.echo(click.style(" PROTOCOL SUPPORT", bold=True, fg="cyan"))
|
|
243
|
+
for proto, supported in protocols.items():
|
|
244
|
+
status = (
|
|
245
|
+
click.style("YES", fg="green")
|
|
246
|
+
if supported
|
|
247
|
+
else click.style("NO", fg="red")
|
|
248
|
+
)
|
|
249
|
+
click.echo(f" {proto.upper()}: {status}")
|
|
250
|
+
click.echo()
|
|
251
|
+
|
|
252
|
+
# Encryption
|
|
253
|
+
enc_level = parse_result.get("encryption_level")
|
|
254
|
+
if enc_level:
|
|
255
|
+
color = "green" if enc_level.upper() in ["HIGH", "FIPS"] else "yellow"
|
|
256
|
+
click.echo(click.style(" ENCRYPTION", bold=True, fg="cyan"))
|
|
257
|
+
click.echo(f" Level: {click.style(enc_level, fg=color)}")
|
|
258
|
+
click.echo()
|
|
259
|
+
|
|
260
|
+
# NLA Status
|
|
261
|
+
nla = parse_result.get("nla_required")
|
|
262
|
+
if nla is not None:
|
|
263
|
+
color = "green" if nla else "red"
|
|
264
|
+
status = "Required" if nla else "NOT Required"
|
|
265
|
+
click.echo(
|
|
266
|
+
click.style(" NETWORK LEVEL AUTHENTICATION", bold=True, fg="cyan")
|
|
267
|
+
)
|
|
268
|
+
click.echo(f" Status: {click.style(status, fg=color, bold=not nla)}")
|
|
269
|
+
click.echo()
|
|
270
|
+
|
|
271
|
+
click.echo()
|
|
272
|
+
|
|
273
|
+
def display_error(
|
|
274
|
+
self,
|
|
275
|
+
job: Dict[str, Any],
|
|
276
|
+
log_path: str,
|
|
277
|
+
show_all: bool = False,
|
|
278
|
+
) -> None:
|
|
279
|
+
"""Display rdp-sec-check error."""
|
|
280
|
+
click.echo()
|
|
281
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
282
|
+
click.echo(click.style("RDP SECURITY CHECK FAILED", fg="red", bold=True))
|
|
283
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
284
|
+
click.echo()
|
|
285
|
+
|
|
286
|
+
error = job.get("parse_result", {}).get("error") or job.get("error")
|
|
287
|
+
if error:
|
|
288
|
+
click.echo(f" Error: {error}")
|
|
289
|
+
else:
|
|
290
|
+
click.echo(" Check log for details")
|
|
291
|
+
|
|
292
|
+
# Installation hint
|
|
293
|
+
click.echo()
|
|
294
|
+
click.echo(click.style(" Installation:", dim=True))
|
|
295
|
+
click.echo(" Kali: sudo apt install rdp-sec-check")
|
|
296
|
+
click.echo()
|
|
297
|
+
|
|
298
|
+
def display_warning(
|
|
299
|
+
self,
|
|
300
|
+
job: Dict[str, Any],
|
|
301
|
+
log_path: str,
|
|
302
|
+
show_all: bool = False,
|
|
303
|
+
) -> None:
|
|
304
|
+
"""Display rdp-sec-check warning (security issues found)."""
|
|
305
|
+
click.echo()
|
|
306
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
307
|
+
click.echo(click.style("RDP SECURITY ISSUES FOUND", fg="yellow", bold=True))
|
|
308
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
309
|
+
click.echo()
|
|
310
|
+
|
|
311
|
+
parse_result = job.get("parse_result", {})
|
|
312
|
+
|
|
313
|
+
# Show findings
|
|
314
|
+
findings = parse_result.get("findings", [])
|
|
315
|
+
if findings:
|
|
316
|
+
click.echo(click.style(" SECURITY FINDINGS", bold=True, fg="red"))
|
|
317
|
+
for finding in findings:
|
|
318
|
+
severity = finding.get("severity", "info").upper()
|
|
319
|
+
sev_color = (
|
|
320
|
+
"red"
|
|
321
|
+
if severity == "HIGH"
|
|
322
|
+
else "yellow" if severity == "MEDIUM" else "white"
|
|
323
|
+
)
|
|
324
|
+
click.echo(
|
|
325
|
+
f" [{click.style(severity, fg=sev_color)}] {finding.get('title')}"
|
|
326
|
+
)
|
|
327
|
+
click.echo(f" {finding.get('description')}")
|
|
328
|
+
click.echo()
|
|
329
|
+
|
|
330
|
+
# Also show protocol info
|
|
331
|
+
self.display_done(job, log_path, show_all, False)
|
|
332
|
+
|
|
333
|
+
def display_no_results(
|
|
334
|
+
self,
|
|
335
|
+
job: Dict[str, Any],
|
|
336
|
+
log_path: str,
|
|
337
|
+
show_all: bool = False,
|
|
338
|
+
) -> None:
|
|
339
|
+
"""Display rdp-sec-check no results."""
|
|
340
|
+
click.echo()
|
|
341
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
342
|
+
click.echo(
|
|
343
|
+
click.style("RDP SECURITY CHECK - NO RESULTS", fg="yellow", bold=True)
|
|
344
|
+
)
|
|
345
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
346
|
+
click.echo()
|
|
347
|
+
click.echo(" Could not retrieve RDP security information.")
|
|
348
|
+
click.echo()
|
|
349
|
+
click.echo(click.style(" Possible causes:", dim=True))
|
|
350
|
+
click.echo(" - RDP service not responding")
|
|
351
|
+
click.echo(" - Port blocked by firewall")
|
|
352
|
+
click.echo(" - Non-standard RDP configuration")
|
|
353
|
+
click.echo()
|
|
@@ -0,0 +1,292 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
"""
|
|
3
|
+
Tool handler registry with auto-discovery.
|
|
4
|
+
|
|
5
|
+
Provides a central registry for tool handlers that:
|
|
6
|
+
- Auto-discovers handlers via __subclasses__()
|
|
7
|
+
- Provides capability queries (has_warning_handler, etc.)
|
|
8
|
+
- Returns None for unmigrated tools (fallback to legacy code)
|
|
9
|
+
"""
|
|
10
|
+
import logging
|
|
11
|
+
from typing import Dict, List, Optional
|
|
12
|
+
|
|
13
|
+
from souleyez.handlers.base import BaseToolHandler
|
|
14
|
+
|
|
15
|
+
logger = logging.getLogger(__name__)
|
|
16
|
+
|
|
17
|
+
# Singleton registry instance
|
|
18
|
+
_registry: Optional["ToolHandlerRegistry"] = None
|
|
19
|
+
|
|
20
|
+
|
|
21
|
+
class ToolHandlerRegistry:
|
|
22
|
+
"""
|
|
23
|
+
Registry for tool handlers.
|
|
24
|
+
|
|
25
|
+
Handlers are discovered automatically when their modules are imported.
|
|
26
|
+
The registry uses __subclasses__() to find all BaseToolHandler subclasses.
|
|
27
|
+
"""
|
|
28
|
+
|
|
29
|
+
def __init__(self):
|
|
30
|
+
self._handlers: Dict[str, BaseToolHandler] = {}
|
|
31
|
+
self._discovered = False
|
|
32
|
+
|
|
33
|
+
def _discover_handlers(self) -> None:
|
|
34
|
+
"""
|
|
35
|
+
Auto-discover all BaseToolHandler subclasses.
|
|
36
|
+
|
|
37
|
+
This imports handler modules to trigger class definition,
|
|
38
|
+
then finds all subclasses of BaseToolHandler.
|
|
39
|
+
"""
|
|
40
|
+
if self._discovered:
|
|
41
|
+
return
|
|
42
|
+
|
|
43
|
+
# Import handler modules here to trigger class registration
|
|
44
|
+
# As we add handlers, add imports here:
|
|
45
|
+
try:
|
|
46
|
+
from souleyez.handlers import msf_exploit_handler # noqa: F401
|
|
47
|
+
except ImportError as e:
|
|
48
|
+
logger.warning(f"Failed to import msf_exploit_handler: {e}")
|
|
49
|
+
try:
|
|
50
|
+
from souleyez.handlers import msf_auxiliary_handler # noqa: F401
|
|
51
|
+
except ImportError as e:
|
|
52
|
+
logger.warning(f"Failed to import msf_auxiliary_handler: {e}")
|
|
53
|
+
try:
|
|
54
|
+
from souleyez.handlers import hydra_handler # noqa: F401
|
|
55
|
+
except ImportError as e:
|
|
56
|
+
logger.warning(f"Failed to import hydra_handler: {e}")
|
|
57
|
+
try:
|
|
58
|
+
from souleyez.handlers import gobuster_handler # noqa: F401
|
|
59
|
+
except ImportError as e:
|
|
60
|
+
logger.warning(f"Failed to import gobuster_handler: {e}")
|
|
61
|
+
try:
|
|
62
|
+
from souleyez.handlers import ffuf_handler # noqa: F401
|
|
63
|
+
except ImportError as e:
|
|
64
|
+
logger.warning(f"Failed to import ffuf_handler: {e}")
|
|
65
|
+
try:
|
|
66
|
+
from souleyez.handlers import nmap_handler # noqa: F401
|
|
67
|
+
except ImportError as e:
|
|
68
|
+
logger.warning(f"Failed to import nmap_handler: {e}")
|
|
69
|
+
try:
|
|
70
|
+
from souleyez.handlers import nuclei_handler # noqa: F401
|
|
71
|
+
except ImportError as e:
|
|
72
|
+
logger.warning(f"Failed to import nuclei_handler: {e}")
|
|
73
|
+
try:
|
|
74
|
+
from souleyez.handlers import theharvester_handler # noqa: F401
|
|
75
|
+
except ImportError as e:
|
|
76
|
+
logger.warning(f"Failed to import theharvester_handler: {e}")
|
|
77
|
+
try:
|
|
78
|
+
from souleyez.handlers import nikto_handler # noqa: F401
|
|
79
|
+
except ImportError as e:
|
|
80
|
+
logger.warning(f"Failed to import nikto_handler: {e}")
|
|
81
|
+
try:
|
|
82
|
+
from souleyez.handlers import wpscan_handler # noqa: F401
|
|
83
|
+
except ImportError as e:
|
|
84
|
+
logger.warning(f"Failed to import wpscan_handler: {e}")
|
|
85
|
+
try:
|
|
86
|
+
from souleyez.handlers import dnsrecon_handler # noqa: F401
|
|
87
|
+
except ImportError as e:
|
|
88
|
+
logger.warning(f"Failed to import dnsrecon_handler: {e}")
|
|
89
|
+
try:
|
|
90
|
+
from souleyez.handlers import sqlmap_handler # noqa: F401
|
|
91
|
+
except ImportError as e:
|
|
92
|
+
logger.warning(f"Failed to import sqlmap_handler: {e}")
|
|
93
|
+
try:
|
|
94
|
+
from souleyez.handlers import smbmap_handler # noqa: F401
|
|
95
|
+
except ImportError as e:
|
|
96
|
+
logger.warning(f"Failed to import smbmap_handler: {e}")
|
|
97
|
+
try:
|
|
98
|
+
from souleyez.handlers import gpp_extract_handler # noqa: F401
|
|
99
|
+
except ImportError as e:
|
|
100
|
+
logger.warning(f"Failed to import gpp_extract_handler: {e}")
|
|
101
|
+
try:
|
|
102
|
+
from souleyez.handlers import enum4linux_handler # noqa: F401
|
|
103
|
+
except ImportError as e:
|
|
104
|
+
logger.warning(f"Failed to import enum4linux_handler: {e}")
|
|
105
|
+
try:
|
|
106
|
+
from souleyez.handlers import crackmapexec_handler # noqa: F401
|
|
107
|
+
except ImportError as e:
|
|
108
|
+
logger.warning(f"Failed to import crackmapexec_handler: {e}")
|
|
109
|
+
try:
|
|
110
|
+
from souleyez.handlers import john_handler # noqa: F401
|
|
111
|
+
except ImportError as e:
|
|
112
|
+
logger.warning(f"Failed to import john_handler: {e}")
|
|
113
|
+
try:
|
|
114
|
+
from souleyez.handlers import hashcat_handler # noqa: F401
|
|
115
|
+
except ImportError as e:
|
|
116
|
+
logger.warning(f"Failed to import hashcat_handler: {e}")
|
|
117
|
+
try:
|
|
118
|
+
from souleyez.handlers import responder_handler # noqa: F401
|
|
119
|
+
except ImportError as e:
|
|
120
|
+
logger.warning(f"Failed to import responder_handler: {e}")
|
|
121
|
+
try:
|
|
122
|
+
from souleyez.handlers import whois_handler # noqa: F401
|
|
123
|
+
except ImportError as e:
|
|
124
|
+
logger.warning(f"Failed to import whois_handler: {e}")
|
|
125
|
+
try:
|
|
126
|
+
from souleyez.handlers import impacket_secretsdump_handler # noqa: F401
|
|
127
|
+
except ImportError as e:
|
|
128
|
+
logger.warning(f"Failed to import impacket_secretsdump_handler: {e}")
|
|
129
|
+
try:
|
|
130
|
+
from souleyez.handlers import impacket_psexec_handler # noqa: F401
|
|
131
|
+
except ImportError as e:
|
|
132
|
+
logger.warning(f"Failed to import impacket_psexec_handler: {e}")
|
|
133
|
+
try:
|
|
134
|
+
from souleyez.handlers import impacket_getuserspns_handler # noqa: F401
|
|
135
|
+
except ImportError as e:
|
|
136
|
+
logger.warning(f"Failed to import impacket_getuserspns_handler: {e}")
|
|
137
|
+
try:
|
|
138
|
+
from souleyez.handlers import katana_handler # noqa: F401
|
|
139
|
+
except ImportError as e:
|
|
140
|
+
logger.warning(f"Failed to import katana_handler: {e}")
|
|
141
|
+
try:
|
|
142
|
+
from souleyez.handlers import lfi_extract_handler # noqa: F401
|
|
143
|
+
except ImportError as e:
|
|
144
|
+
logger.warning(f"Failed to import lfi_extract_handler: {e}")
|
|
145
|
+
try:
|
|
146
|
+
from souleyez.handlers import evil_winrm_handler # noqa: F401
|
|
147
|
+
except ImportError as e:
|
|
148
|
+
logger.warning(f"Failed to import evil_winrm_handler: {e}")
|
|
149
|
+
try:
|
|
150
|
+
from souleyez.handlers import ldapsearch_handler # noqa: F401
|
|
151
|
+
except ImportError as e:
|
|
152
|
+
logger.warning(f"Failed to import ldapsearch_handler: {e}")
|
|
153
|
+
try:
|
|
154
|
+
from souleyez.handlers import service_explorer_handler # noqa: F401
|
|
155
|
+
except ImportError as e:
|
|
156
|
+
logger.warning(f"Failed to import service_explorer_handler: {e}")
|
|
157
|
+
try:
|
|
158
|
+
from souleyez.handlers import kerbrute_handler # noqa: F401
|
|
159
|
+
except ImportError as e:
|
|
160
|
+
logger.warning(f"Failed to import kerbrute_handler: {e}")
|
|
161
|
+
try:
|
|
162
|
+
from souleyez.handlers import rdp_sec_check_handler # noqa: F401
|
|
163
|
+
except ImportError as e:
|
|
164
|
+
logger.warning(f"Failed to import rdp_sec_check_handler: {e}")
|
|
165
|
+
try:
|
|
166
|
+
from souleyez.handlers import nxc_handler # noqa: F401
|
|
167
|
+
except ImportError as e:
|
|
168
|
+
logger.warning(f"Failed to import nxc_handler: {e}")
|
|
169
|
+
try:
|
|
170
|
+
from souleyez.handlers import certipy_handler # noqa: F401
|
|
171
|
+
except ImportError as e:
|
|
172
|
+
logger.warning(f"Failed to import certipy_handler: {e}")
|
|
173
|
+
try:
|
|
174
|
+
from souleyez.handlers import bloodhound_handler # noqa: F401
|
|
175
|
+
except ImportError as e:
|
|
176
|
+
logger.warning(f"Failed to import bloodhound_handler: {e}")
|
|
177
|
+
try:
|
|
178
|
+
from souleyez.handlers import smbclient_handler # noqa: F401
|
|
179
|
+
except ImportError as e:
|
|
180
|
+
logger.warning(f"Failed to import smbclient_handler: {e}")
|
|
181
|
+
try:
|
|
182
|
+
from souleyez.handlers import smbpasswd_handler # noqa: F401
|
|
183
|
+
except ImportError as e:
|
|
184
|
+
logger.warning(f"Failed to import smbpasswd_handler: {e}")
|
|
185
|
+
try:
|
|
186
|
+
from souleyez.handlers import bash_handler # noqa: F401
|
|
187
|
+
except ImportError as e:
|
|
188
|
+
logger.warning(f"Failed to import bash_handler: {e}")
|
|
189
|
+
try:
|
|
190
|
+
from souleyez.handlers import web_login_test_handler # noqa: F401
|
|
191
|
+
except ImportError as e:
|
|
192
|
+
logger.warning(f"Failed to import web_login_test_handler: {e}")
|
|
193
|
+
|
|
194
|
+
# Find all subclasses of BaseToolHandler
|
|
195
|
+
for handler_class in BaseToolHandler.__subclasses__():
|
|
196
|
+
try:
|
|
197
|
+
# Skip the base class itself
|
|
198
|
+
if handler_class.tool_name == "base":
|
|
199
|
+
continue
|
|
200
|
+
|
|
201
|
+
instance = handler_class()
|
|
202
|
+
tool_key = instance.tool_name.lower()
|
|
203
|
+
|
|
204
|
+
if tool_key in self._handlers:
|
|
205
|
+
logger.warning(
|
|
206
|
+
f"Duplicate handler for tool '{tool_key}': "
|
|
207
|
+
f"{handler_class.__name__} (using first registered)"
|
|
208
|
+
)
|
|
209
|
+
continue
|
|
210
|
+
|
|
211
|
+
self._handlers[tool_key] = instance
|
|
212
|
+
logger.debug(
|
|
213
|
+
f"Registered handler: {tool_key} -> {handler_class.__name__}"
|
|
214
|
+
)
|
|
215
|
+
|
|
216
|
+
except Exception as e:
|
|
217
|
+
logger.warning(
|
|
218
|
+
f"Failed to register handler {handler_class.__name__}: {e}"
|
|
219
|
+
)
|
|
220
|
+
|
|
221
|
+
self._discovered = True
|
|
222
|
+
logger.debug(
|
|
223
|
+
f"Handler discovery complete. Registered: {list(self._handlers.keys())}"
|
|
224
|
+
)
|
|
225
|
+
|
|
226
|
+
def get_handler(self, tool_name: str) -> Optional[BaseToolHandler]:
|
|
227
|
+
"""
|
|
228
|
+
Get handler for a tool.
|
|
229
|
+
|
|
230
|
+
Args:
|
|
231
|
+
tool_name: The tool identifier (case-insensitive)
|
|
232
|
+
|
|
233
|
+
Returns:
|
|
234
|
+
The handler instance, or None if no handler registered
|
|
235
|
+
"""
|
|
236
|
+
self._discover_handlers()
|
|
237
|
+
return self._handlers.get(tool_name.lower())
|
|
238
|
+
|
|
239
|
+
def has_handler(self, tool_name: str) -> bool:
|
|
240
|
+
"""Check if a handler exists for this tool."""
|
|
241
|
+
return self.get_handler(tool_name) is not None
|
|
242
|
+
|
|
243
|
+
def has_warning_handler(self, tool_name: str) -> bool:
|
|
244
|
+
"""Check if tool has a warning handler (replaces manual list)."""
|
|
245
|
+
handler = self.get_handler(tool_name)
|
|
246
|
+
return handler is not None and handler.has_warning_handler
|
|
247
|
+
|
|
248
|
+
def has_error_handler(self, tool_name: str) -> bool:
|
|
249
|
+
"""Check if tool has an error handler (replaces manual list)."""
|
|
250
|
+
handler = self.get_handler(tool_name)
|
|
251
|
+
return handler is not None and handler.has_error_handler
|
|
252
|
+
|
|
253
|
+
def has_no_results_handler(self, tool_name: str) -> bool:
|
|
254
|
+
"""Check if tool has a no_results handler (replaces manual list)."""
|
|
255
|
+
handler = self.get_handler(tool_name)
|
|
256
|
+
return handler is not None and handler.has_no_results_handler
|
|
257
|
+
|
|
258
|
+
def has_done_handler(self, tool_name: str) -> bool:
|
|
259
|
+
"""Check if tool has a done handler."""
|
|
260
|
+
handler = self.get_handler(tool_name)
|
|
261
|
+
return handler is not None and handler.has_done_handler
|
|
262
|
+
|
|
263
|
+
def list_handlers(self) -> List[str]:
|
|
264
|
+
"""List all registered handler tool names."""
|
|
265
|
+
self._discover_handlers()
|
|
266
|
+
return list(self._handlers.keys())
|
|
267
|
+
|
|
268
|
+
def reset(self) -> None:
|
|
269
|
+
"""Reset registry (for testing)."""
|
|
270
|
+
self._handlers.clear()
|
|
271
|
+
self._discovered = False
|
|
272
|
+
|
|
273
|
+
|
|
274
|
+
def get_registry() -> ToolHandlerRegistry:
|
|
275
|
+
"""Get the singleton registry instance."""
|
|
276
|
+
global _registry
|
|
277
|
+
if _registry is None:
|
|
278
|
+
_registry = ToolHandlerRegistry()
|
|
279
|
+
return _registry
|
|
280
|
+
|
|
281
|
+
|
|
282
|
+
def get_handler(tool_name: str) -> Optional[BaseToolHandler]:
|
|
283
|
+
"""
|
|
284
|
+
Convenience function to get a handler.
|
|
285
|
+
|
|
286
|
+
Args:
|
|
287
|
+
tool_name: The tool identifier (case-insensitive)
|
|
288
|
+
|
|
289
|
+
Returns:
|
|
290
|
+
The handler instance, or None if no handler registered
|
|
291
|
+
"""
|
|
292
|
+
return get_registry().get_handler(tool_name)
|