0xVIC / RubyOSINT

Ruby based script to perform application scanning of a URL, looking for specific pages to target.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

RubyOSINT v1.2

Description

This is a simple ruby based tool used for OSINT/PenTesting an application. The first version has static URL entries that are commonly attacked (PHPMyAdmin, VPN, Email, Citrix, etc.) And, to be technical its more enumeration or active recon.. moving right along..

###Supported Targets

  • OWA (2003-2010)
  • Citrix
  • Cisco VPN
  • Magneto ECommerce Software
  • PHPMyadmin
  • TomCat
  • Juniper VPNs
  • Sonicwall VPN
  • Various admin portal checks
  • Sharepoint
  • SonicWall Virtual Assistant (added 6/27/2014)

Usage

ruby OSINT.rb --url http(s)://xxx.xxx.xxx.xxx --uri /lists/list.txt

TODO

  • Clean up the code (in progress)
  • Add target input via file
  • Add scan output to file
  • Add analysis of app headers to identify version of SharePoint and OWA.
  • Ability to add in ports. Ex- 8080, 8443.
  • add threading

Known Issues

Credits

License

This code is licensed under the GPLv3. Full text of this can be found in LICENSE.txt

Changelog

  • Added Color to the Command Line
  • Added only reporting for 200 status (302 may be enabled by uncommenting it(be prepare for a lot of output).
  • fixed the SSL invalid certs breaking to tool (alanjones)
  • pulled the target URLs from the main .rb code and added to list.txt (alanjones)
  • added ability to call options from CLI. (alanjones)
  • added new support to list.txt. (Sonicwall, Magneto, various admin portals)
  • Split out URL checks into individual text documents to make more modular, and environment specific as needed.

About

Ruby based script to perform application scanning of a URL, looking for specific pages to target.

License:GNU General Public License v3.0


Languages

Language:Ruby 100.0%