解析 db_nmap metasploit 的终端输出

问题描述

我有这两个字符串,例如在 python 中:

s = 'VULNERABLE: Apache byterange filter DoS State: VULNERABLE IDs: BID:49303 CVE:CVE-2011-3192 The Apache web server is vulnerable to a denial of service attack when numerous overlapping byte ranges are requested. disclosure date: 2011-08-19 References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192 https://www.securityfocus.com/bid/49303 https://seclists.org/fulldisclosure/2011/Aug/175 https://www.tenable.com/plugins/nessus/55976'

我想把它解析成这样的字典形式,例如:

d = {
'VULNERABLE': Apache byterange filter DoS,'State': VULNERABLE,'VULNERABLE IDs': {
'BID': '49303','CVE': 'CVE-2011-3192'
},'Description': 'The Apache web server is vulnerable to a denial of service attack when numerous overlapping byte ranges are requested','disclosure date': '2011-08-19','References': ['https://www.securityfocus.com/bid/49303','https://seclists.org/fulldisclosure/2011/Aug/175','https://www.tenable.com/plugins/nessus/55976']
}

这是 db_nmapMetasploit 漏洞脚本扫描程序的一些输出 有没有一种简单的方法可以在 python 中做到这一点?

解决方法

暂无找到可以解决该程序问题的有效方法,小编努力寻找整理中!

如果你已经找到好的解决方法,欢迎将解决方案带上本链接一起发送给小编。

小编邮箱:dio#foxmail.com (将#修改为@)