Skip to content

A blue team tool for watching over domains using bug hunting methodology!

License

Notifications You must be signed in to change notification settings

techspence/observer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

observer

A blue team tool for watching over domains using bug hunting methodology!

Passive recon --> active recon --> fingerprinting/tracking/monitoring

  • The idea of this tool is to try to:
    • a) find things that vulnerability scanners miss or don't check for
    • b) find things that require more manual checking but can be scripted or automated to some extent
    • c) track, monitor and alert on changes, deviations and other potentially interesting things

Note: This tool has some functionality but is still a work in progress :O)

Requirements

  • Amass
  • Massdns
  • OpenSSL
  • Slack

Current & ToDo Features

Passive Recon

  • Potential new subdomains
  • Potential new IPs
  • Google dorking
  • Pastebin
  • Github searching
  • theHarvester email scraping
  • Interesting content
  • Technology used

Active Recon

  • Verify subdomains
  • Certificate expiration check
  • New certificates issued
  • Open ports
  • Services and versions
  • Technology used
  • Login form https only
  • Nikto

Changes to track/monitor/alert on

  • New/Removed/Modified subdomains
  • Certificate expired/expiring soon
  • New certificates issued
  • New ports available
  • New services or versions
  • New findings on google, pastebin, etc.

High Level Workflow

  • Subdomain Enumeration > New Subdomain Alerting > Subdomain DNS Validation > Certificate Monitoring
  • Each script calls the next

Step 1. Enumerate possible domains with Amass

/opt/Amass/amass enum -silent -d spenceralessi.com -o amass_domains.txt

Step 2. Feed the output of Step 1. to Step 2. to validate subdomains with massdns

/opt/massdns/bin/massdns -r /opt/massdns/lists/resolvers.txt -t A -o S -w massdns_domains.txt amass_domains.txt > /dev/null 2>&1

Then Export just subdomains

cat massdns_domains.txt | awk '{print $1}' | sed 's/.$//' | sort -u > valid_domains.txt

Step 3. Feed Step 2a. to certificate monitoring

Inspiration

About

A blue team tool for watching over domains using bug hunting methodology!

Topics

Resources

License

Stars

Watchers

Forks

Languages