Ejemplo n.º 1
0
        exit(1)

    # Show banner.
    show_banner(utility)

    # Create instances.
    cloud_checker = CloudChecker(utility)
    version_checker = VersionChecker(utility)
    version_checker_ml = VersionCheckerML(utility)
    comment_checker = CommentChecker(utility)
    error_checker = ErrorChecker(utility)
    page_checker = PageChecker(utility)
    google_hack = GoogleCustomSearch(utility)
    content_explorer = ContentExplorer(utility)
    spider = SpiderControl(utility)
    report = CreateReport(utility)
    cve_explorer = CveExplorerNVD(utility)
    censys = Censys(utility)

    # Get target information from "host.txt".
    protocol_list, fqdn_list, port_list, path_list = get_target_info(
        full_path, utility)

    # Start investigation.
    for idx in range(len(fqdn_list)):
        # Check parameters.
        msg = 'investigation : {}, {}, {}, {}'.format(protocol_list[idx],
                                                      fqdn_list[idx],
                                                      port_list[idx],
                                                      path_list[idx])
        utility.write_log(20, 'Start ' + msg)
Ejemplo n.º 2
0
    if opt_develop:
        creator = Creator(utility)
        creator.extract_file_structure(opt_develop_category,
                                       opt_develop_vendor, opt_develop_package)
        print(os.path.basename(__file__) + ' finish!!')
        utility.write_log(20, '[Out] GyoiThon [{}].'.format(file_name))
        sys.exit(0)

    # Explore relevant FQDN with the target FQDN.
    if opt_invent:
        inventory_list_path = os.path.join(full_path, 'inventory_list.txt')
        if os.path.exists(inventory_list_path):
            inventory = Inventory(utility)
            spider = SpiderControl(utility)
            google_hack = GoogleCustomSearch(utility)
            report = CreateReport(utility)

            with codecs.open(inventory_list_path, 'r', 'utf-8') as fin:
                targets = fin.readlines()
                for target in targets:
                    items = target.replace('\r', '').replace('\n',
                                                             '').split('\t')
                    if len(items) != 2:
                        utility.print_message(
                            FAIL,
                            'Invalid inventory target : {}'.format(target))
                        continue

                    # Check target URL.
                    port_num = ''
                    invent_url = ''
Ejemplo n.º 3
0
        sys.exit(0)

    # Explore relevant FQDN with the target FQDN.
    report_path = None
    invent_report_header = None
    inventory = None
    if opt_invent:
        # Create path.
        org_list_path = os.path.join(full_path, 'organization_list.csv')
        domain_list_path = os.path.join(full_path, 'domain_list.csv')

        # Create instances.
        inventory = Inventory(utility)
        google_hack = GoogleCustomSearch(utility)
        cv = ComputerVision(utility)
        report = CreateReport(utility)

        # Define report header for continuous health check.
        invent_report_header = report.header_invent
        if opt_invent_screen_shot:
            invent_report_header.extend(report.header_ss)

        # Explore domains and subdomains from domain list.
        if opt_invent_domain_list is not None and os.path.exists(
                domain_list_path):
            # Get import path of domain list.
            # Search domain.
            domain_info_dict_tmp = inventory.domain_explore(
                import_list=domain_list_path)

            # Search sub-domain.
Ejemplo n.º 4
0
        utility.write_log(20, '[Out] GyoiThon [{}].'.format(file_name))
        exit(1)

    # Show banner.
    show_banner(utility)

    # Create instances.
    cloud_checker = CloudChecker(utility)
    version_checker = VersionChecker(utility)
    comment_checker = CommentChecker(utility)
    error_checker = ErrorChecker(utility)
    page_checker = PageChecker(utility)
    google_hack = GoogleCustomSearch(utility)
    content_explorer = ContentExplorer(utility)
    spider = SpiderControl(utility)
    report = CreateReport(utility)
    cve_explorer = CveExplorerNVD(utility)

    # Get target information from "host.txt".
    protocol_list, fqdn_list, port_list, path_list = get_target_info(
        full_path, utility)

    # Start investigation.
    for idx in range(len(fqdn_list)):
        # Check parameters.
        msg = 'investigation : {}, {}, {}, {}'.format(protocol_list[idx],
                                                      fqdn_list[idx],
                                                      port_list[idx],
                                                      path_list[idx])
        utility.write_log(20, 'Start ' + msg)
        if utility.check_arg_value(protocol_list[idx], fqdn_list[idx],