解析 db_nmap metasploit 的终端输出

问题描述

我有这两个字符串,例如在 python 中:

s = 'VULNERABLE: Apache byterange filter DoS State: VULNERABLE IDs: BID:49303 CVE:CVE-2011-3192 The Apache web server is vulnerable to a denial of service attack when numerous overlapping byte ranges are requested. Disclosure date: 2011-08-19 References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192 https://www.securityfocus.com/bid/49303 https://seclists.org/fulldisclosure/2011/Aug/175 https://www.tenable.com/plugins/nessus/55976'

我想把它解析成这样的字典形式,例如:

d = {
'VULNERABLE': Apache byterange filter DoS,'State': VULNERABLE,'VULNERABLE IDs': {
'BID': '49303','CVE': 'CVE-2011-3192'
},'Description': 'The Apache web server is vulnerable to a denial of service attack when numerous overlapping byte ranges are requested','Disclosure date': '2011-08-19','References': ['https://www.securityfocus.com/bid/49303','https://seclists.org/fulldisclosure/2011/Aug/175','https://www.tenable.com/plugins/nessus/55976']
}

这是 db_nmapmetasploit 漏洞脚本扫描程序的一些输出 有没有一种简单的方法可以在 python 中做到这一点?

解决方法

暂无找到可以解决该程序问题的有效方法,小编努力寻找整理中!

如果你已经找到好的解决方法,欢迎将解决方案带上本链接一起发送给小编。

小编邮箱:dio#foxmail.com (将#修改为@)

相关问答

错误1:Request method ‘DELETE‘ not supported 错误还原:...
错误1:启动docker镜像时报错:Error response from daemon:...
错误1:private field ‘xxx‘ is never assigned 按Alt...
报错如下,通过源不能下载,最后警告pip需升级版本 Requirem...