SpiderFoot is an open source intelligence (OSINT) automation tool. Its goal is to automate the process of gathering intelligence about a given target.
Purpose
There are three main areas where SpiderFoot can be useful:
- If you are a pen-tester, SpiderFoot will automate the reconnaisance stage of the test, giving you a rich set of data to help you pin-point areas of focus for the test.
- Understand what your network/organisation is openly exposing to the outside world. Such information in the wrong hands could be a significant risk.
- SpiderFoot can also be used to gather threat intelligence about suspected malicious IPs you might be seeing in your logs or have obtained via threat intelligence data feeds.
Features
- Utilises a shedload of data sources; over 40 so far and counting, including SHODAN, RIPE, Whois, PasteBin, Google, SANS and more.
- Designed for maximum data extraction; every piece of data is passed on to modules that may be interested, so that they can extract valuable information. No piece of discovered data is saved from analysis.
- Runs on Linux and Windows. And fully open-source so you can fork it on GitHub and do whatever you want with it.
- Visualisations. Built-in JavaScript-based visualisations or export to GEXF/CSV for use in other tools, like Gephi for instance.
- Web-based UI. No cumbersome CLI or Java to mess with. Easy to use, easy to navigate. Take a look through the gallery for screenshots.
- Highly configurable. Almost every module is configurable so you can define the level of intrusiveness and functionality.
- Modular. Each major piece of functionality is a module, written in Python. Feel free to write your own and submit them to be incorporated!
- SQLite back-end. All scan results are stored in a local SQLite database, so you can play with your data to your heart’s content.
- Simultaneous scans. Each footprint scan runs as its own thread, so you can perform footprinting of many different targets simultaneously.
- So much more.. check out the documentation for more information.
Data Sources
This is an ever-growing list of data sources SpiderFoot uses to gather intelligence about your target. A few require API keys but they are freely available.
| Source | Location | Notes |
|---|---|---|
| abuse.ch | http://www.abuse.ch | Various malware trackers. |
| AdBlock | https://easylist-downloads.adblockplus.org/easylist.txt | AdBlock pattern matches |
| AlienVault | https://reputation.alienvault.com | AlienVault’s IP reputation database. |
| Autoshun.org | http://www.autoshun.org | Blacklists. |
| AVG Site Safety Report | http://www.avgthreatlabas.com | Site safety checker. |
| Bing | http://www.bing.com | Scraping but future version to also use API. |
| Blocklist.de | http://lists.blocklist.de | Blacklists. |
| Checkusernames.com | http://www.checkusernames.com | Look up username availability on popular sites. |
| DNS | Your configured DNS server. | Defaults to your local DNS but can be configured to whatever IP address you supply SpiderFoot. |
| DomainTools | http://www.domaintools.com | |
| DroneBL | http://www.dronebl.org | |
| DuckDuckGo | http://www.duckduckgo.com | |
| http://www.facebook.com | Scraping but future version to also use API. | |
| FreeGeoIP | http://freegeoip.net | |
| Github | http://www.github.com | |
| http://www.google.com | Scraping but future version to also use API. | |
| Google+ | http://plus.google.com | Scraping but future version to also use API. |
| Google Safe Browsing | http://www.google.com/safebrowsing | Site safety checker. |
| IPCat | https://raw.githubusercontent.com/client9/ipcat/master/datacenters.csv | IP Categorisation. |
| http://www.linkedin.com | Scraping but future version to also use API. | |
| malc0de.com | http://malc0de.com | Blacklists. |
| malwaredomainlist.com | http://www.malwaredomainlist.com | Blacklists. |
| malwaredomains.com | http://www.malwaredomains.com | Blacklists. |
| McAfee SiteAdvisor | http://www.siteadvisor.com | Site safety checker. |
| NameDroppers | http://www.namedroppers.org | |
| Notepad.cc | http://www.notepad.cc | |
| Nothink.org | http://www.nothink.org | Blacklists. |
| Onion.City | http://onion.city | Search engine for the dark web. |
| OpenBL | http://www.openbl.org | Blacklists. |
| PasteBin | http://www.pastebin.com | Achieved through Google scraping. |
| Pastie | http://www.pastie.org | |
| PGP Servers | http://pgp.mit.edu/pks/ | PGP public keys. |
| PhishTank | http://www.phishtank.org | Identified phishing sites. |
| Project Honeypot | http://www.projecthoneypot.org | Blacklists. API key needed. |
| PunkSPIDER | http://www.punkspider.org | |
| RIPE/ARIN | http://stat.ripe.net/ | |
| Robtex | http://www.robtex.com | |
| SANS ISC | http://isc.sans.edu | Internet Storm Center IP reputation database. |
| SHODAN | http://www.shodanhq.com | API key needed. |
| SORBS | http://www.sorbs.net | Blacklists. |
| SpamHaus | http://www.spamhaus.org | Blacklists. |
| ThreatExpert | http://www.threatexpert.com | Blacklists. |
| TOR Node List | http://torstatus.blutmagie.de | |
| TotalHash.com | http://www.totalhash.com | Domains/IPs used by malware. |
| UCEPROTECT | http://www.uceprotect.net | Blacklists. |
| VirusTotal | http://www.virustotal.com | Domains/IPs used by malware. API key needed. |
| WayBack Machine | http://www.archive.org | |
| Whois | Various | Whois servers for different TLDs. |
| XSSposed | http://www.xssposed.org | |
| Yahoo | http://www.yahoo.com | Scraping but future version to also use API. |
| Zone-H | http://www.zone-h.org | Easy to get black-listed. Log onto the site in a browser from the IP you’re scanning from first and enter the CAPTCHA, then it should be fine. |

No comments:
Post a Comment