-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathREADME_zh.md
211 lines (150 loc) · 6.19 KB
/
README_zh.md
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
# vulfocus-java
[](https://github.com/fofapro/vulfocus-java/releases) [](https://github.com/fofapro/vulfocus-java/stargazers) [](https://github.com/fofapro/vulfocus-java/blob/master/LICENSE)
[English document](https://github.com/fofapro/vulfocus-java/blob/master/README.md)
## Vulfocus API
[`Vulfocus API`](https://fofapro.github.io/vulfocus/#/VULFOCUSAPI) 是 [`Vulfocus`](http://vulfocus.io/) 为开发提供的 `RESUFul API`接口,允许开发者在自己的项目中集成 [`Vulfocus`](http://vulfocus.io)。
## Vulfocus SDK
基于 [`Vulfocus API`](https://fofapro.github.io/vulfocus/#/VULFOCUSAPI) 编写的 `Java` 版 `SDK`,方便`Java`开发者快速将 [`Vulfocus`](http://vulfocus.io/) 集成到自己的项目中。
## 添加依赖
### Apache Maven
```
<dependency>
<groupId>com.r4v3zn.vulfocus</groupId>
<artifactId>vulfocus-java</artifactId>
<version>0.0.2</version>
</dependency>
```
### Gradle Groovy DSL
```
implementation 'com.r4v3zn.vulfocus:vulfocus-java:0.0.2'
```
### Gradle Kotlin DSL
```
implementation("com.r4v3zn.vulfocus:vulfocus-java:0.0.2")
```
### Scala SBT
```
libraryDependencies += "com.r4v3zn.vulfocus" % "vulfocus-java" % "0.0.2"
```
### Apache Ivy
```
<dependency org="com.r4v3zn.vulfocus" name="vulfocus-java" rev="0.0.2" />
```
### Groovy Grape
```
@Grapes(
@Grab(group='com.r4v3zn.vulfocus', module='vulfocus-java', version='0.0.2')
)
```
### Leiningen
```
[com.r4v3zn.vulfocus/vulfocus-java "0.0.2"]
```
### Apache Buildr
```
'com.r4v3zn.vulfocus:vulfocus-java:jar:0.0.2'
```
### Maven Central Badge
```
[](https://search.maven.org/search?q=g:%22com.r4v3zn.vulfocus%22%20AND%20a:%22vulfocus-java%22)
```
### PURL
```
pkg:maven/com.r4v3zn.vulfocus/vulfocus-java@0.0.2
```
### Bazel
```
maven_jar(
name = "vulfocus-java",
artifact = "com.r4v3zn.vulfocus:vulfocus-java:0.0.2",
sha1 = "32e595e8cd0f7879fd0246d82f747b789cc21af0",
)
```
## USE
|字段名称|描述|
| ---- | ---- |
|`addr`|[`Vulfocus`](http://vulfocus.io/) 地址|
|`username`|用户登陆 [`Vulfocus`](http://vulfocus.io/) 使用的用户名|
|`licence`|前往 [`个人中心`](http://vulfocus.fofa.so/#/profile/index) 查看 `API Key`|
### 获取镜像
#### Code
```java
public static void main(String[] args) throws Exception {
String username = "";
String license = "";
VulfocusClinet vulfocusClinet = new VulfocusClinet(username, license);
List<ImageEntity> imageEntityList = vulfocusClinet.imageList();
System.out.println(imageEntityList);
}
```
#### Response
```
[ImageEntity{imageName='vulfocus/webmin-cve_2020_35606:latest', imageVulName='Webmin 命令执行漏洞 (CVE-2020-35606)', imageDesc='Webmin是Webmin社区的一套基于Web的用于类Unix操作系统中的系统管理工具。
Webmin 1.962版本及之前版本存在安全漏洞,该漏洞允许执行任意命令。任何被授权使用Package Updates模块的用户都可以使用根权限通过包含和的向量执行任意命令。
账户密码:root:password'}]
```
### 启动
#### Code
```java
public static void main(String[] args) throws Exception {
String username = "";
String license = "";
VulfocusClinet vulfocusClinet = new VulfocusClinet(username, license);
List<ImageEntity> imageEntityList = vulfocusClinet.imageList();
ImageEntity imageEntity = imageEntityList.get(0);
System.out.println(imageEntity);
System.out.println(vulfocusClinet.start(imageEntity.getImageName()));
}
```
#### Response
```
ImageEntity{imageName='vulfocus/webmin-cve_2020_35606:latest', imageVulName='Webmin 命令执行漏洞 (CVE-2020-35606)', imageDesc='Webmin是Webmin社区的一套基于Web的用于类Unix操作系统中的系统管理工具。
Webmin 1.962版本及之前版本存在安全漏洞,该漏洞允许执行任意命令。任何被授权使用Package Updates模块的用户都可以使用根权限通过包含和的向量执行任意命令。
账户密码:root:password'}
HostEntity{host='118.193.36.37:54240', port='{"10000": "54240"}'}
```
### 停止
#### Code
```java
public static void main(String[] args) throws Exception {
String username = "";
String license = "";
VulfocusClinet vulfocusClinet = new VulfocusClinet(username, license);
List<ImageEntity> imageEntityList = vulfocusClinet.imageList();
ImageEntity imageEntity = imageEntityList.get(0);
System.out.println(imageEntity);
System.out.println(vulfocusClinet.stop(imageEntity.getImageName()));
}
```
#### Response
```
ImageEntity{imageName='vulfocus/webmin-cve_2020_35606:latest', imageVulName='Webmin 命令执行漏洞 (CVE-2020-35606)', imageDesc='Webmin是Webmin社区的一套基于Web的用于类Unix操作系统中的系统管理工具。
Webmin 1.962版本及之前版本存在安全漏洞,该漏洞允许执行任意命令。任何被授权使用Package Updates模块的用户都可以使用根权限通过包含和的向量执行任意命令。
账户密码:root:password'}
停止成功
```
### 删除
#### Code
```java
public static void main(String[] args) throws Exception {
String username = "";
String license = "";
VulfocusClinet vulfocusClinet = new VulfocusClinet(username, license);
List<ImageEntity> imageEntityList = vulfocusClinet.imageList();
ImageEntity imageEntity = imageEntityList.get(0);
System.out.println(imageEntity);
System.out.println(vulfocusClinet.delete(imageEntity.getImageName()));
}
```
#### Response
```
ImageEntity{imageName='vulfocus/webmin-cve_2020_35606:latest', imageVulName='Webmin 命令执行漏洞 (CVE-2020-35606)', imageDesc='Webmin是Webmin社区的一套基于Web的用于类Unix操作系统中的系统管理工具。
Webmin 1.962版本及之前版本存在安全漏洞,该漏洞允许执行任意命令。任何被授权使用Package Updates模块的用户都可以使用根权限通过包含和的向量执行任意命令。
账户密码:root:password'}
删除成功
```
## 更新日志
2021-11-26
```
Release
```