snitch – Information Gathering Tool Via Dorks
June 17, 2017 | 292 views 0
Keep on Guard!
Snitch is an information gathering tool which automates the process for a specified domain. Using built-in dork categories, this tool helps gather specified information domains which can be found using web search engines. It can be quite useful in early phases of penetration tests (commonly called the Information Gathering phase).
snitch - Information Gathering Tool Via Dorks
snitch can identify general information, potentially sensitive extensions, documents & messages, files and directories and web applications.
There are other tools which perform similar functions or parts of what snitch does:
– DMitry – Deepmagic Information Gathering Tool
– wig – CMS Identification & Information Gathering Tool
– theHarvester – Gather E-mail Accounts, Subdomains, Hosts, Employee Names
Usage
devil@hell:~/snitch$ python snitch.py
_ __ __
_________ (_) /______/ /_
/ ___/ __ \/ / __/ ___/ __ \
(__ ) / / / / /_/ /__/ / / /
/____/_/ /_/_/\__/\___/_/ /_/ ~0.3
Usage: snitch.py [options]
Options:
-h, --help show this help message and exit
-U [url], --url=[url]
domain(s) or domain extension(s) separated by comma*
-D [type], --dork=[type]
dork type(s) separated by comma*
-C [dork], --custom=[dork]
custom dork*
-O [file], --output=[file]
output file
-S [ip:port], --socks=[ip:port]
socks5 proxy
-I [seconds], --interval=[seconds]
interval between requests, 2s by default
-P [pages], --pages=[pages]
pages to retrieve, 10 by default
-v turn on verbosity
Dork types:
info Information leak & Potential web bugs
ext Sensitive extensions
docs Documents & Messages
files Files & Directories
soft Web software
all All
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
devil@hell:~/snitch$ python snitch.py
_ __ __
_________ (_) /______/ /_
/ ___/ __ \/ / __/ ___/ __ \
(__ ) / / / / /_/ /__/ / / /
/____/_/ /_/_/\__/\___/_/ /_/ ~0.3
Usage: snitch.py [options]
Options:
-h, --help show this help message and exit
-U [url], --url=[url]
domain(s) or domain extension(s) separated by comma*
-D [type], --dork=[type]
dork type(s) separated by comma*
-C [dork], --custom=[dork]
custom dork*
-O [file], --output=[file]
output file
-S [ip:port], --socks=[ip:port]
socks5 proxy
-I [seconds], --interval=[seconds]
interval between requests, 2s by default
-P [pages], --pages=[pages]
pages to retrieve, 10 by default
-v turn on verbosity
Dork types:
info Information leak & Potential web bugs
ext Sensitive extensions
docs Documents & Messages
files Files & Directories
soft Web software
all All
You can download snitch here:
snitch-master.zip
Or you can read more here.
Tags: dorks, dorks tool, info gathering, info gathering tool, information gathering, information gathering tool, pen-testing, penetration-testing, Python, snitch
Posted in: Hacking Tools, Privacy, Web Hacking | Add a Comment
Fake News As A Service (FNaaS?) – $400k To Rig An Election
June 15, 2017 | 470 views 0
This is pretty interesting, the prices for Fake News as a Service have come out after some research by Trend Micro, imagine that you can create a fake celebrity with 300,000 followers for only $2,600.
Fake News As A Service (FNaaS?) - $400k To Rig An Election
Now we all know this Fake News thing has been going on for a while, and of course, if it’s happening, some capitalist genius is going to monetize it and offer it as a professional service.
Fake news has come to be associated with political intrigue but the same propaganda techniques are also abused by cybercriminals, according to a study by Trend Micro.
The techniques and methods used to spread fake news and manipulate public opinion have a wide range of objectives and even a price list.
Cybercriminals produce, market and monetise fake news in underground markets. The scope of a campaign and intended target affect pricing. For example, campaigns aimed to spark street protests are priced at $200,000 while discrediting a journalist would cost $55,000 and creating a fake celebrity (with 300,000 followers) costs a more modest $2,600.
A year-long campaign to influence election outcomes is available for just $400,000, the study says. Whether such listings are in themselves an attempt at disinformation is certainly debatable. US intel agencies, Western politicians and security firms are nigh-on unanimous that attempts to influence the US presidential election last year were the work of the Kremlin. For example, UK defence secretary Sir Michael Fallon recently said the Kremlin is “weaponising misinformation” as part of a sustained campaign that goes beyond alleged meddling in the presidential election.
You can read the full 77 page report by Trend here: The Fake News Machine [PDF]
It’s insightful to see the types of services that are available, and how they are categorised. Now I’ve known about social media manipulation for many years (fake likes, followers, YouTube views and so on) but to see this kind of Fake News at scale, as a service is something new to me.
Fake news services typically involve the creation of fake social media profiles and groups; developing the fake content itself; driving likes and retweets for dissemination; and building legitimate-looking news sites. All these steps are designed to set up and sustain false narratives.
For an additional fee, multiple news sites can be purchased which cross reference each other to add more authenticity to the fake news campaign, the report reveals.
Chinese, Russian, Middle Eastern and English underground marketplaces offer fake news services of one type or another. Regional differences exist.
For example, in China, fake advertorials can be purchased for as little as ¥100 (£11), while in Russia 35,000 rubles (£483) will buy your video two minutes on the YouTube homepage.
The report also details an example of the dissemination of fake news, including the cynical abuse of the recent Manchester bombing attack. Mexican journalists were falsely listed in galleries as bombing victims in what’s thought to be an attack by a drug cartel. These fake victim pics were subsequently promoted through social media.
Unfortunately there’s no technical solution to thwart this, it’s purely about education. If people don’t fact check, cross check and verify sources before disseminating them this whole Fake News situation is just going to get worse and worse.
I feel like it had a serious impact on both Brexit and the Trump election, and it’s likely to stay very relevant in any large scale World events as so many people now base their opinions on what they see online.
Source: The Register
Tags: alternative news, buy fake news, discredit journalist, fake celebrity, fake news, fake news as a service, fake news service, fix election, fnaas
Posted in: Legal Issues, Social Engineering | Add a Comment
credmap – The Credential Mapper
June 13, 2017 | 1,388 views 2
Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the password has been reused on any of these.
credmap - The Credential Mapper
It is not uncommon for people who are not experts in security to reuse credentials on different websites; even security savvy people occasionally reuse credentials.
Credmap takes a username and/or e-mail, and a password as input and it attempts to login on a variety of known websites to verify if these credentials have been reused on any of them.
Usage
Usage: credmap.py --email EMAIL | --user USER | --load LIST [options]
Options:
-h/--help show this help message and exit
-v/--verbose display extra output information
-u/--username=USER.. set the username to test with
-p/--password=PASS.. set the password to test with
-e/--email=EMAIL set an email to test with
-l/--load=LOAD_FILE load list of credentials in format USER:PASSWORD
-f/--format=CRED_F.. format to use when reading from file (e.g. u|e:p)
-x/--exclude=EXCLUDE exclude sites from testing
-o/--only=ONLY test only listed sites
-s/--safe-urls only test sites that use HTTPS.
-i/--ignore-proxy ignore system default HTTP proxy
--proxy=PROXY set proxy (e.g. "socks5://192.168.1.2:9050")
--list list available sites to test with
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Usage: credmap.py --email EMAIL | --user USER | --load LIST [options]
Options:
-h/--help show this help message and exit
-v/--verbose display extra output information
-u/--username=USER.. set the username to test with
-p/--password=PASS.. set the password to test with
-e/--email=EMAIL set an email to test with
-l/--load=LOAD_FILE load list of credentials in format USER:PASSWORD
-f/--format=CRED_F.. format to use when reading from file (e.g. u|e:p)
-x/--exclude=EXCLUDE exclude sites from testing
-o/--only=ONLY test only listed sites
-s/--safe-urls only test sites that use HTTPS.
-i/--ignore-proxy ignore system default HTTP proxy
--proxy=PROXY set proxy (e.g. "socks5://192.168.1.2:9050")
--list list available sites to test with
Examples
./credmap.py --username janedoe --email janedoe@email.com
./credmap.py -u johndoe -e johndoe@email.com --exclude "github.com, live.com"
./credmap.py -u johndoe -p abc123 -vvv --only "linkedin.com, facebook.com"
./credmap.py -e janedoe@example.com --verbose --proxy "https://127.0.0.1:8080"
./credmap.py --load creds.txt --format "e.u.p"
./credmap.py -l creds.txt -f "u|e:p"
./credmap.py -l creds.txt
./credmap.py --list
1
2
3
4
5
6
7
8
./credmap.py --username janedoe --email janedoe@email.com
./credmap.py -u johndoe -e johndoe@email.com --exclude "github.com, live.com"
./credmap.py -u johndoe -p abc123 -vvv --only "linkedin.com, facebook.com"
./credmap.py -e janedoe@example.com --verbose --proxy "https://127.0.0.1:8080"
./credmap.py --load creds.txt --format "e.u.p"
./credmap.py -l creds.txt -f "u|e:p"
./credmap.py -l creds.txt
./credmap.py --list
You can download credmap here:
0 comments :