Skip to content

Commit 802f593

Browse files
author
ekultek
committed
intel AMT bypass is now suppressed from the help menu, full batch functionality added, intel AMT will be completely removed by version 1.3
1 parent c740eb6 commit 802f593

File tree

1 file changed

+19
-10
lines changed

1 file changed

+19
-10
lines changed

zeus.py

+19-10
Original file line numberDiff line numberDiff line change
@@ -76,8 +76,7 @@
7676
attacks.add_option("-p", "--port-scan", dest="runPortScan", action="store_true",
7777
help="Run a Nmap port scan on the discovered URL's")
7878
attacks.add_option("-i", "--intel-check", dest="intelCheck", action="store_true",
79-
help="Check if a URL's host is exploitable via Intel ME AMT (CVE-2017-5689) "
80-
"scans will be deprecated by version 1.2")
79+
help=optparse.SUPPRESS_HELP) # TODO:/ completely remove
8180
attacks.add_option("-a", "--admin-panel", dest="adminPanelFinder", action="store_true",
8281
help="Search for the websites admin panel")
8382
attacks.add_option("-x", "--xss-scan", dest="runXssScan", action="store_true",
@@ -101,7 +100,7 @@
101100
attacks.add_option("--tamper", dest="tamperXssPayloads", metavar="TAMPER-SCRIPT",
102101
help="Send the XSS payloads through tampering before sending to the target")
103102
attacks.add_option("--run-ip-address", dest="runAgainstIpAddress", action="store_true",
104-
help="Run the Intel ME AMT exploit against the found host IP address instead of the hostname")
103+
help=optparse.SUPPRESS_HELP) # TODO:/ completely remove
105104
attacks.add_option("--thread", dest="threadPanels", action="store_true",
106105
help=optparse.SUPPRESS_HELP)
107106
attacks.add_option("--auto", dest="autoStartSqlmap", action="store_true",
@@ -290,13 +289,15 @@ def __run_attacks_main():
290289
run_attacks(
291290
url.strip(),
292291
sqlmap=opt.runSqliScan, nmap=opt.runPortScan,
293-
intel=opt.intelCheck, xss=opt.runXssScan,
292+
intel=opt.intelCheck, # TODO:/ completely remove
293+
xss=opt.runXssScan,
294294
whois=opt.performWhoisLookup, admin=opt.adminPanelFinder,
295295
clickjacking=opt.performClickjackingScan,
296296
verbose=opt.runInVerbose, batch=opt.runInBatch,
297297
auto_start=opt.autoStartSqlmap, xforward=opt.forwardedForRandomIP,
298298
sqlmap_args=opt.sqlmapArguments, nmap_args=opt.nmapArguments,
299-
run_ip=opt.runAgainstIpAddress, show_all=opt.showAllConnections,
299+
run_ip=opt.runAgainstIpAddress, # TODO:/ completely remove
300+
show_all=opt.showAllConnections,
300301
do_threading=opt.threadPanels, tamper_script=opt.tamperXssPayloads,
301302
timeout=opt.controlTimeout, proxy=proxy_to_use, agent=agent_to_use
302303
)
@@ -322,7 +323,7 @@ def __run_attacks_main():
322323
search.parse_search_results(
323324
opt.dorkToUse, search_engine, verbose=opt.runInVerbose, proxy=proxy_to_use,
324325
agent=agent_to_use, pull_all=opt.noExclude, parse_webcache=opt.parseWebcache,
325-
forward_for=opt.forwardedForRandomIP, tor=opt.useTor
326+
forward_for=opt.forwardedForRandomIP, tor=opt.useTor, batch=opt.runInBatch
326327
)
327328
except InvalidProxyType:
328329
supported_proxy_types = ["socks5", "socks4", "https", "http"]
@@ -383,7 +384,7 @@ def __run_attacks_main():
383384
search.parse_search_results(
384385
dork, search_engine, verbose=opt.runInVerbose, proxy=proxy_to_use,
385386
agent=agent_to_use, pull_all=opt.noExclude, parse_webcache=opt.parseWebcache,
386-
tor=opt.useTor
387+
tor=opt.useTor, batch=opt.runInBatch
387388
)
388389
except Exception as e:
389390
logger.exception(set_color(
@@ -408,7 +409,7 @@ def __run_attacks_main():
408409
search.parse_search_results(
409410
random_dork, search_engine, verbose=opt.runInVerbose,
410411
proxy=proxy_to_use, agent=agent_to_use, pull_all=opt.noExclude, parse_webcache=opt.parseWebcache,
411-
tor=opt.useTor
412+
tor=opt.useTor, batch=opt.runInBatch
412413
)
413414
__run_attacks_main()
414415

@@ -435,10 +436,18 @@ def __run_attacks_main():
435436
)
436437
else:
437438
if URL_QUERY_REGEX.match(opt.spiderWebSite):
438-
is_sure = prompt(
439+
question_msg = (
439440
"it is recommended to not use a URL that has a GET(query) parameter in it, "
440-
"would you like to continue", "yN"
441+
"would you like to continue"
441442
)
443+
if not opt.runInBatch:
444+
is_sure = prompt(
445+
question_msg, opts="yN"
446+
)
447+
else:
448+
is_sure = prompt(
449+
question_msg, opts="yN", default="y"
450+
)
442451
if is_sure.lower().startswith("y"):
443452
pass
444453
else:

0 commit comments

Comments
 (0)