dorkbot v0.0.3 releases: Command-line tool to scan Google search results for vulnerabilities

dorkbot

Scan Google search results for vulnerabilities.

dorkbot is a modular command-line tool for performing vulnerability scans against a set of web pages returned by Google search queries in a given Google Custom Search Engine. It is broken up into two sets of modules:

  • Indexers – modules that issue a search query and return the results as targets
  • Scanners – modules that perform a vulnerability scan against each target

Targets are stored in a local database file upon being indexed. Once scanned, any vulnerabilities found by the chosen scanner are written to a standard JSON report file. Indexing and scanning processes can be run separately or combined in a single command.

Download

git clone https://github.com/utiso/dorkbot.git

Use

usage: dorkbot.py [-h] [-c CONFIG] [-b BLACKLIST] [-d DATABASE] [-f]
                  [-i INDEXER] [--label LABEL] [-l] [-n TARGET_COUNT]
                  [-o INDEXER_OPTIONS] [-p SCANNER_OPTIONS] [-s SCANNER]
                  [-v VULNDIR]

optional arguments:
  -h, --help            show this help message and exit
  -c CONFIG, --config CONFIG
                        Configuration file
  -b BLACKLIST, --blacklist BLACKLIST
                        File containing (regex) patterns to blacklist from
                        scans
  -d DATABASE, --database DATABASE
                        SQLite3 database file
  -f, --flush           Flush table of fingerprints of previously-scanned
                        items
  -i INDEXER, --indexer INDEXER
                        Indexer module to use
  --label LABEL         Label to add to vulnerability report
  -l, --list            List targets in database
  -n TARGET_COUNT, --target-count TARGET_COUNT
                        Number of targets to scan
  -o INDEXER_OPTIONS, --indexer-options INDEXER_OPTIONS
                        Indexer-specific options (opt1=val1,opt2=val2,..)
  -p SCANNER_OPTIONS, --scanner-options SCANNER_OPTIONS
                        Scanner-specific options (opt1=val1,opt2=val2,..)
  -s SCANNER, --scanner SCANNER
                        Scanner module to use
  -v VULNDIR, --vulndir VULNDIR
                        Directory to store vulnerability output reports

 

 

Tools

As needed, dorkbot will search for tools in the following order:

  • Directory specified via relevant module option
  • Located in dorkbot’s tools directory, with the subdirectory named after the tool
  • Available in the user’s PATH (e.g. installed system-wide)

Quickstart

Create a Google Custom Search Engine and note the search engine ID, e.g. 012345678901234567891:abc12defg3h. Download either Arachni or Wapiti, unpack it into the tools directory, and rename the subdirectory to arachni or wapiti as appropriate.

$ sudo apt install python-dateutil phantomjs
$ ./dorkbot.py -i google -o engine=012345678901234567891:abc12defg3h,query="filetype:php inurl:id"
$ ./dorkbot.py -s arachni
OR
$ ./dorkbot.py -s wapiti

 

Indexer Modules

google

Search for targets in a Google Custom Search Engine (CSE) via custom search element.

Requirements: PhantomJS

Options:

  • engine – CSE id
  • query – search query
  • phantomjs_dir – phantomjs base directory containing bin/phantomjs (default: tools/phantomjs/)
  • domain – limit searches to specified domain

google_api

Search for targets in a Google Custom Search Engine (CSE) via JSON API.

Requirements: none

Options:

  • key – API key
  • engine – CSE id
  • query – search query
  • domain – limit searches to a specified domain

cc_py

Search for targets within commoncrawl.org results via cc.py.

Requirements: cc.py

Options:

  • domain – pull all results for given domain or subdomain
  • cc_py_dir – cc.py base directory containing the file cc.py (default: tools/cc.py/)
  • year – limit results to data sets from a given year (17 or 18, defaults to all)

bing_api

Search for targets via Bing Web Search API.

Requirements: none

Options:

  • key – API key
  • query – search query

stdin

Read targets from standard input, one per line.

Requirements: none

Options: none

Scanner Modules

arachni

Scan targets with Arachni command-line scanner.

Requirements: Arachni

Options:

  • arachni_dir – arachni base directory containing bin/arachni and bin/arachni_reporter (default: tools/arachni/)
  • report_dir – directory to save arachni scan binary and JSON scan report output (default: reports/)
  • checks – space-delimited list of vulnerability checks to perform (default: “active/* -csrf -unvalidated_redirect -source_code_disclosure -response_splitting -no_sql_injection_differential”)

wapiti

Scan targets with Wapiti command-line scanner.

Requirements: Wapiti

Options:

  • wapiti_dir – wapiti base directory containing bin/wapiti (default: tools/wapiti/)
  • report_dir – directory to save wapiti JSON scan report (default: reports/)

Copyright © 2017, The University of Texas at Austin. All rights reserved.

Source: https://github.com/utiso/

Share