README 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262
  1. ===================================================================
  2. _|_| _|
  3. _| _| _| _|_| _|_|_|
  4. _| _| _|_| _| _|
  5. _| _| _| _| _|
  6. _|_| _| _|_|_|
  7. Orb: footprinting tool - by psy
  8. ----------
  9. + Web: https://orb.03c8.net
  10. ===============
  11. Project:
  12. ===============
  13. Orb - is a massive footprinting tool.
  14. It will use passive/active -automated- methods to provides you real information about
  15. a target. You only need to set a 'concept' to start to gather information.
  16. Orb uses this methods:
  17. + Passive:
  18. - crawlering on search engines for public information (deep web included)
  19. - searching for registered domains
  20. - extracting whois info (owners, dates)
  21. - discovering subdomains
  22. - searching for machines running services
  23. - searching for DNS records (A, NS, MX, TXT)
  24. - extracting CVE and CVS records (vulnerabilities)
  25. + Active:
  26. - scanning for open ports (tcp/udp)(1-65535)
  27. - fingerprinting banners (states, vendors, OS, versions, CPE)
  28. After this tasks... Orb will provide you some fancy reports.
  29. ===============
  30. Installing:
  31. ===============
  32. Orb runs on many platforms. It requires Python (2.x.y) and the following libraries:
  33. python-whois - Python module for retrieving WHOIS information - Python 2
  34. python-dnspython - DNS toolkit for Python
  35. python-nmap - Python interface to the Nmap port scanner
  36. On Debian-based systems (ex: Ubuntu), run:
  37. sudo apt-get install python-whois python-dnspython python-nmap
  38. Source libs:
  39. * Python: https://www.python.org/downloads/
  40. * Pypi-whois: https://pypi.python.org/pypi/whois
  41. * Pydnspython: https://pypi.python.org/pypi/dnspython
  42. * python-nmap: https://pypi.python.org/pypi/python-nmap
  43. ====================
  44. Examples:
  45. ====================
  46. You can use:
  47. ./orb --update
  48. ./orb --check-tor
  49. ./orb --gui (for Web interface)
  50. Or:
  51. ./orb --spell 'target'
  52. Ex (massive):
  53. ./orb --spell='target' --ext='.com,.net,.org' --sa
  54. ====================
  55. Methods:
  56. ====================
  57. - You can select a set of options organized by footprinting method.
  58. For this release:
  59. + Passive:
  60. - Search for public records
  61. - Search for financial records
  62. - Search for deep web records
  63. - Search for social records
  64. - Search for news records
  65. - Extract whois information
  66. - Discover subdomains (using non intrusive methods)
  67. - Not scan ports on machines
  68. - Not scan DNS records
  69. - Not scan NS records
  70. - Not scan MX records
  71. - Not banner grabbing
  72. *Ex: ./orb --spell 'target' --passive
  73. + Active:
  74. - Opposite to 'Passive' method.
  75. *Ex: ./orb --spell='target' --active
  76. ====================
  77. Search engines:
  78. ====================
  79. - You can set different search engines to gather public records from the Internet.
  80. For this release (by default: Yahoo):
  81. + Supported:
  82. - Yahoo (yahoo.com) [28/03/2018]
  83. - Bing (bing.com) [28/03/2018]
  84. - Torch! (deep web) [28/03/2018]
  85. *Ex: ./orb --spell='target' --se='yahoo'
  86. - Also you can set the location for search engine to retrieve more accurate information
  87. about your target.
  88. For example, if is located in Spain you can try to use 'yahoo.es' servers:
  89. *Ex: ./orb --spell='target' --se='yahoo' --se-ext='es' (france=fr, italy=it, etc...)
  90. - You can search massively using all search engines with:
  91. *Ex: ./orb --spell='target' --sa
  92. These options can be combined:
  93. *Ex: ./orb --spell='target' --sa --se-ext='nl'
  94. ====================
  95. Public records:
  96. ====================
  97. - Orb will search on the WWW for interesting public records.
  98. But is important to set what is "interesting" for you. For that you can create a list of sources
  99. organized by some non variable categories: social and news.
  100. It is added to the tool an example folder for Spain to see how works:
  101. *Ex: ./orb --spell='target' --social-f='core/sources/spain/social.txt' --news-f='core/sources/spain/news.txt'
  102. You should try to build your own sources.
  103. By default it is using most ranked Alexa.com services short by category. So you will have a nice global scope from
  104. the beginning.
  105. ====================
  106. Domains:
  107. ====================
  108. - You can set which domain extensions do you want to use to perform footprinting tasks.
  109. By default, Orb will use IANA supported domains. But you can set your own manually:
  110. *Ex: ./orb --spell='target' --ext='.com,.net,.org'
  111. Or directly set a list from a file (examples provided):
  112. *Ex: ./orb --spell='target' --ext-f='core/sources/user-exts.txt'
  113. ====================
  114. Whois:
  115. ====================
  116. - Orb will search on 'Whois' records for registrant information.
  117. *Output example*:
  118. -----------------
  119. -Domain: microsoft.com
  120. -Registrant: MARKMONITOR INC.
  121. -Creation date: 1991-05-02 00:00:00
  122. -Expiration: 2021-05-03 00:00:00
  123. -Last update: 2014-10-09 00:00:00
  124. -----------------
  125. ====================
  126. Subdomains:
  127. ====================
  128. - Orb will try to discover info about subdomains.
  129. For this release it is using a passive method with search engines (not bruteforcing).
  130. ====================
  131. DNS:
  132. ====================
  133. - Orb will try to discover info about DNS records and machines running them.
  134. You can set which DNS resolvers (Google used by default) do you want to use for that tasks:
  135. *Ex: ./orb --spell='target' --resolver='8.8.8.8,8.8.8.4'
  136. ====================
  137. Port Scanning:
  138. ====================
  139. - Orb will use Nmap -python lib wrapper- to perform port scanning tasks.
  140. You can set protocol type to only TCP (UDP+TCP by default) with:
  141. *Ex: ./orb --spell='target' --scan-tcp
  142. Or select which ports do you want to try with:
  143. *Ex: ./orb --spell='target' --scan-ports='21-443'
  144. ** Port scanner will show you only 'Open' ports on machines.
  145. You can see also 'Filtered' ports with:
  146. *Ex: ./orb --spell='target' --scan-ports='21-443' --show-filtered
  147. ====================
  148. Banner Grabbing:
  149. ====================
  150. - Orb will try to extract interesting information about services running
  151. on machines discovered (ex: OS, vendor, version, cpe, cve, cvs):
  152. *Output example*:
  153. -----------------
  154. - IP: XXX.XXX.XXX.XXX
  155. * State : up
  156. - Protocol : tcp
  157. + Port: 80 ( open ) - IBM WebSEAL reverse http proxy | http-proxy
  158. + CVE-2014-0963 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0963
  159. -----
  160. Last updated: 3/27/2016 2:37:25 PM
  161. CVE Publication rate: 11.13
  162. The Reverse Proxy feature in IBM Global Security Kit (aka GSKit) in IBM Security Access Manager (ISAM) for Web 7.0 before 7.0.0-ISS-SAM-IF0006 and 8.0 before 8.0.0.3-ISS-WGA-IF0002 allows remote attackers to cause a denial of service (infinite loop) via crafted SSL messages.
  163. -----------------
  164. ====================
  165. Reporting:
  166. ====================
  167. - Orb will log all tasks and results organizing them by target on a folder: 'reports/'.
  168. You can launch the tool without any log adding:
  169. *Ex: ./orb --spell='target' --no-log
  170. - For verbose output you can use:
  171. *Ex: ./orb --spell='target' -v
  172. - Also you can generate a JSON report only with valid data gathered with:
  173. *Ex: ./orb --spell='target' --json='target.json'