From 9f1560f258768709ff1d4ea352cbfd5fae2c7ad0 Mon Sep 17 00:00:00 2001 From: "1N3@CrowdShield" <1N3@hushmail.com> Date: Tue, 3 Jul 2018 20:25:09 -0700 Subject: [PATCH] Sn1per by 1N3@CrowdShield --- CHANGELOG.md | 1 + sniper | 14 +++++++------- 2 files changed, 8 insertions(+), 7 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 5d34645b..63720014 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,4 +1,5 @@ ## CHANGELOG: +* v5.1 - Fixed minor bugs with CloudHunter and SubOver tools not working * v5.0 - Added Sn1per Pro reporting interface (see https://xerosecurity.com for more details) * v5.0 - Added GPON Router RCE auto exploit * v5.0 - Added Cloudapp.net Azure subdomain takeover check diff --git a/sniper b/sniper index 969d3032..87f63c17 100755 --- a/sniper +++ b/sniper @@ -1028,7 +1028,7 @@ if [ "$MODE" = "stealth" ]; then echo -e "${OKGREEN}====================================================================================${RESET}" dig $TARGET CNAME | egrep -i "wordpress|instapage|heroku|github|bitbucket|squarespace|fastly|feed|fresh|ghost|helpscout|helpjuice|instapage|pingdom|surveygizmo|teamwork|tictail|shopify|desk|teamwork|unbounce|helpjuice|helpscout|pingdom|tictail|campaign|monitor|cargocollective|statuspage|tumblr|amazon|hubspot|cloudfront|modulus|unbounce|uservoice|wpengine|cloudapp" | tee $LOOT_DIR/nmap/takeovers-$TARGET.txt 2>/dev/null for a in `cat $LOOT_DIR/domains/domains-$TARGET-full.txt`; do dig $a CNAME | egrep -i "wordpress|instapage|heroku|github|bitbucket|squarespace|fastly|feed|fresh|ghost|helpscout|helpjuice|instapage|pingdom|surveygizmo|teamwork|tictail|shopify|desk|teamwork|unbounce|helpjuice|helpscout|pingdom|tictail|campaign|monitor|cargocollective|statuspage|tumblr|amazon|hubspot|cloudfront|modulus|unbounce|uservoice|wpengine|cloudapp" | tee $LOOT_DIR/nmap/takeovers-$a.txt 2>/dev/null; done; - cd $PLUGINS_DIR/SubOver/ && go subover.go -l $LOOT_DIR/domains/domains-$TARGET-full.txt | tee $LOOT_DIR/nmap/takeovers-$TARGET-subover.txt 2>/dev/null + #cd $PLUGINS_DIR/SubOver/ && go subover.go -l $LOOT_DIR/domains/domains-$TARGET-full.txt | tee $LOOT_DIR/nmap/takeovers-$TARGET-subover.txt 2>/dev/null cd $INSTALL_DIR echo -e "${OKGREEN}====================================================================================${RESET}" echo -e "$OKRED STARTING PUBLIC S3 BUCKET SCAN $RESET" @@ -1469,13 +1469,13 @@ if [ "$RECON" = "1" ]; then echo -e "${OKGREEN}====================================================================================${RESET}" dig $TARGET CNAME | egrep -i "wordpress|instapage|heroku|github|bitbucket|squarespace|fastly|feed|fresh|ghost|helpscout|helpjuice|instapage|pingdom|surveygizmo|teamwork|tictail|shopify|desk|teamwork|unbounce|helpjuice|helpscout|pingdom|tictail|campaign|monitor|cargocollective|statuspage|tumblr|amazon|hubspot|cloudfront|modulus|unbounce|uservoice|wpengine|cloudapp" | tee $LOOT_DIR/nmap/takeovers-$TARGET.txt 2>/dev/null for a in `cat $LOOT_DIR/domains/domains-$TARGET-full.txt`; do dig $a CNAME | egrep -i 'wordpress|instapage|heroku|github|bitbucket|squarespace|fastly|feed|fresh|ghost|helpscout|helpjuice|instapage|pingdom|surveygizmo|teamwork|tictail|shopify|desk|teamwork|unbounce|helpjuice|helpscout|pingdom|tictail|campaign|monitor|cargocollective|statuspage|tumblr|amazon|hubspot|cloudfront|modulus|unbounce|uservoice|wpengine|cloudapp' | tee $LOOT_DIR/nmap/takeovers-$a.txt 2>/dev/null; done; - cd $PLUGINS_DIR/SubOver/ && go subover.go -l $LOOT_DIR/domains/domains-$TARGET-full.txt | tee $LOOT_DIR/nmap/takeovers-$TARGET-subover.txt 2>/dev/null + #cd $PLUGINS_DIR/SubOver/ && go subover.go -l $LOOT_DIR/domains/domains-$TARGET-full.txt | tee $LOOT_DIR/nmap/takeovers-$TARGET-subover.txt 2>/dev/null cd $INSTALL_DIR - echo -e "${OKGREEN}====================================================================================${RESET}" - echo -e "$OKRED CHECKING FOR S3 PUBLIC BUCKETS $RESET" - echo -e "${OKGREEN}====================================================================================${RESET}" - cloudhunter -d $a | tee $LOOT_DIR/nmap/takeovers-$TARGET-aws.txt 2>/dev/null - cloudhunter -w $LOOT_DIR/domains/domains-$TARGET-full.txt | tee $LOOT_DIR/nmap/takeovers-$TARGET-aws-all.txt 2>/dev/null + #echo -e "${OKGREEN}====================================================================================${RESET}" + #echo -e "$OKRED CHECKING FOR S3 PUBLIC BUCKETS $RESET" + #echo -e "${OKGREEN}====================================================================================${RESET}" + #cloudhunter -d $a | tee $LOOT_DIR/nmap/takeovers-$TARGET-aws.txt 2>/dev/null + #cloudhunter -w $LOOT_DIR/domains/domains-$TARGET-full.txt | tee $LOOT_DIR/nmap/takeovers-$TARGET-aws-all.txt 2>/dev/null echo -e "${OKGREEN}====================================================================================${RESET}" echo -e "$OKRED CHECKING EMAIL SECURITY $RESET" echo -e "${OKGREEN}====================================================================================${RESET}"