uDork:一款功能強大的Google Hacking工具
uDork是一款功能強大的Google Hacking工具,uDork本質上來說,是一個采用Python編程語言開發的腳本工具,它可以使用高級Google搜索技術來獲取目標文件或目錄中的數據、搜索物聯網設備,或檢測目標Web應用程序的版本相關信息等等。
uDork并不會對任何服務器執行攻擊行為,它只會使用預定義的Dork或exploit-db.com提供的官方列表來進行搜索和查詢。
關于Google Hacking
Google Hacking的含義原指利用Google搜索引擎搜索信息來進行入侵的技術和行為,現指利用各種搜索引擎搜索信息來進行入侵的技術和行為。
Google Hacking是使用搜索引擎,比如谷歌來定位因特網上的安全隱患和易攻擊點。Web上一般有兩種容易發現的易受攻擊類型:軟件漏洞和錯誤配置。雖然一些有經驗的入侵者目標是瞄準了一些特殊的系統,同時嘗試發現會讓他們進入的漏洞,但是大部分的入侵者是從具體的軟件漏洞開始或者是從那些普通用戶錯誤配置開始,在這些配置中,他們已經知道怎樣侵入,并且初步的嘗試發現或掃描有該種漏洞的系統。谷歌對于第一種攻擊者來說用處很少,但是對于第二種攻擊者則發揮了重要作用。
當一個攻擊者知道他想侵入的漏洞的種類,但是沒有明確的目標時,他使用掃描器。掃描器是自動開始一個檢查系統的絕大部分地方的過程,以便發現安全缺陷的這樣一個程序。最早和電腦相關的掃描器,例如,是戰爭撥號器這個程序,它會撥一長串的電話號碼,并且記錄下和調制解調器相匹配的號碼。
工具安裝
當然了,Python環境是必須要提前搭建好的。在使用uDork之前,你還需要安裝好goop:
pip3 install goop
下載和安裝:
$ git clone https://github.com/m3n0sd0n4ld/uDork $ cd uDork
接下來,打開配置文件,并將下列代碼寫入:
cookie = 'YOUR FACEBOOK COOKIES HERE'
完成后,我們就可以直接在命令行終端中切換到項目目錄,并運行下列命令查看工具幫助信息了:
$ python3 uDork.py -h
注意事項
1、為了保證工具能夠正常運行,你必須使用自己的Facebook Cookie來配置uDork的cookie.py文件;
2、你必須在使用uDork的設備上保持Facebook的登錄狀態;
獲取和配置Cookie
1、登錄至facebook.com;
2、在瀏覽器中同時按下Ctrl+Shift+K(火狐瀏覽器)或Ctrl+Shift+J(Chrome瀏覽器),打開瀏覽器命令行終端;
3、在命令行中寫入document.cookie,并將”c_user = content”和”xs = content”寫入到cookie.py文件中的“cookie”變量中;
cookie = 'c_user=XXXXXX; xs=XXXXXX'
最后,別忘了保存文件。
工具使用
工具菜單:
$ python3 uDork.py -h _____ _ | __ \ | | _ _| | | | ___ _ __| | __ | | | | | | |/ _ \| '__| |/ / | |_| | |__| | (_) | | | < \__,_|_____/ \___/|_| |_|\_\ v.2020.03.13 by M3n0sD0n4ld - (@David_Uton) ---------------------------------------------------------------------------------------------------- usage: uDork.py [-h] [-d DOMAIN] [-e EXTENSION] [-t TEXT] [-s STRING] [-m MASSIVE] [-l LIST] [-f FILE] [-k DORK] [-p PAGES] [-o OUTPUT] optional arguments: -h, --help show this help message and exit -d DOMAIN, --domain DOMAIN Domain or IP address. -e EXTENSION, --extension EXTENSION Search files by extension. Use 'all' to find the list extension. -t TEXT, --text TEXT Find text in website content. -s STRING, --string STRING Locate text strings within the URL. -m MASSIVE, --massive MASSIVE Attack a site with a predefined list of dorks. Review list <-l / - list> -l LIST, --list LIST Shows the list of predefined dorks (Exploit-DB). -f FILE, --file FILE Use your own personalized list of dorks. -k DORK, --dork DORK Specifies the type of dork <filetype | intext | inurl> (Required for '<-f / - file'>). -p PAGES, --pages PAGES Number of pages to search in Google. (By default 5 pages). -o OUTPUT, --output OUTPUT Export results to a file.
搜索PDF文件樣例:
$ python3 uDork.py -d nasa.gov -e pdf _____ _ | __ \ | | _ _| | | | ___ _ __| | __ | | | | | | |/ _ \| '__| |/ / | |_| | |__| | (_) | | | < \__,_|_____/ \___/|_| |_|\_\ v.2020.03.13 by M3n0sD0n4ld - (@David_Uton) ---------------------------------------------------------------------------------------------------- [!] The results will appear below. This may take several minutes, please wait ... ---------------------------------------------------------------------------------------------------- Domain/IP: nasa.gov Find links with: pdf ---------------------------------------------------------------------------------------------------- https://www.sti.nasa.gov/thesvol2.pdf https://www.sti.nasa.gov/thesvol1.pdf https://www.nasa.gov/pdf/220260main_Workforce_Transition_Strategy_briefing.pdf https://oig.nasa.gov/docs/SAR0318.pdf https://oig.nasa.gov/docs/FinalWrittenStatement_03_13_2013.pdf https://oig.nasa.gov/docs/MC-2018.pdf https://www.nasa.gov/centers/dryden/pdf/88798main_srfcs.pdf https://www.nasa.gov/specials/apollo50th/pdf/A10_PressKit.pdf https://www.nasa.gov/specials/apollo50th/pdf/A14_PressKit.pdf https://www.nasa.gov/specials/apollo50th/pdf/A07_PressKit.pdf https://www.nasa.gov/specials/apollo50th/pdf/A15_PressKit.pdf https://www.nasa.gov/specials/apollo50th/pdf/A09_PressKit.pdf https://www.nasa.gov/specials/apollo50th/pdf/A08_PressKit.pdf https://www.nasa.gov/centers/dryden/pdf/88790main_Dryden.pdf https://oig.nasa.gov/docs/MC-2017.pdf ....
搜索單詞“password”的搜索路徑樣例:
$ python3 uDork.py -d nasa.gov -s password _____ _ | __ \ | | _ _| | | | ___ _ __| | __ | | | | | | |/ _ \| '__| |/ / | |_| | |__| | (_) | | | < \__,_|_____/ \___/|_| |_|\_\ v.2020.03.13 by M3n0sD0n4ld - (@David_Uton) ---------------------------------------------------------------------------------------------------- [!] The results will appear below. This may take several minutes, please wait ... ---------------------------------------------------------------------------------------------------- Domain/IP: nasa.gov Find links with: password ---------------------------------------------------------------------------------------------------- https://www.grc.nasa.gov/its-training/best-practices/password-tips/ https://www.grc.nasa.gov/its-training/best-practices/password-rules/ https://www.nas.nasa.gov/hecc/support/kb/password-creation-rules_270.html https://www.nas.nasa.gov/hecc/support/kb/index.php%3FView%3Dentry%26EntryID%3D270%26EntryTitle%3Dpassword-creation-rules%26mobile%3D0 https://open.nasa.gov/datanaut-accounts/password/reset/%3Fnext%3D/explore/datanauts/app/profile https://www.nas.nasa.gov/hecc/support/kb/i-cant-log-inmy-password-is-not-workingmy-account-is-locked_5.html https://www.nas.nasa.gov/hecc/support/kb/index.php%3FView%3Dentry%26EntryID%3D53%26EntryTitle%3Dtwo-step-connection-using-rsa-securid-passcode-and-nas-password%26mobile%3D0 https://www.nas.nasa.gov/hecc/support/kb/index.php%3FView%3Dentry%26EntryID%3D8%26EntryTitle%3Dwhat-are-the-requirements-for-creating-a-password%26mobile%3D0 https://oltaris.nasa.gov/password/new https://ghrc.nsstc.nasa.gov/data-publication/user/password https://answers.nssc.nasa.gov/app/answers/detail/a_id/6173/~/change-launchpad-%2528idmax%2529-password https://answers.nssc.nasa.gov/app/answers/list/search/1/kw/Password/search/1 https://answers.nssc.nasa.gov/app/answers/list/search/1/kw/CHANGE%2520NDC%2520PASSWORD/suggested/1 https://answers.nssc.nasa.gov/app/answers/detail/a_id/6174/~/reset-ndc-password .....
Dork列表:
$ python3 uDork.py -l list _____ _ | __ \ | | _ _| | | | ___ _ __| | __ | | | | | | |/ _ \| '__| |/ / | |_| | |__| | (_) | | | < \__,_|_____/ \___/|_| |_|\_\ v.2020.03.13 by M3n0sD0n4ld - (@David_Uton) ---------------------------------------------------------------------------------------------------- ======================== DORKS LISTING ======================== admin : Access panels of all kinds (administration, login, CMS, ...) directories : Sensitive directories (drupal, wordpress, phpmyadmin ...) usernames : Find files containing user names. passwords : Find files that contain passwords. webservers: Find web servers. vulnerable_files : Find vulnerable files. vulnerable_servers : Find vulnerable servers. error_messages : Show error messages. vulnerable_networks : Find software data on vulnerable networks. portal_logins : List portal logins. devices : Find connected devices (printers, webcams, thermostats, ...)
Dorks Massive使用樣例:
$ python3 uDork.py -d nasa.gov -m admin -p 3 -o report.txt _____ _ | __ \ | | _ _| | | | ___ _ __| | __ | | | | | | |/ _ \| '__| |/ / | |_| | |__| | (_) | | | < \__,_|_____/ \___/|_| |_|\_\ v.2020.03.13 by M3n0sD0n4ld - (@David_Uton) ---------------------------------------------------------------------------------------------------- [!] The results will appear below. This may take several minutes, please wait ... ---------------------------------------------------------------------------------------------------- Domain/IP: nasa.gov Find links with: ADMIN/ https://asd.gsfc.nasa.gov/blueshift/index.php/author/admin/ https://lists.hq.nasa.gov/mailman/admin https://lists.hq.nasa.gov/mailman/admin/LISTNAME https://rosetta.jpl.nasa.gov/blogs/admin https://dartslab.jpl.nasa.gov/qa/user/admin https://landsat.gsfc.nasa.gov/author/admin/page/8/ https://rosetta.jpl.nasa.gov/blogs/admin%3Fpage%3D1 https://www.nasa.gov/news/speeches/admin/mg_speech_collection_archive_4.html https://dartslab.jpl.nasa.gov/qa/user/admin/answers https://dartslab.jpl.nasa.gov/qa/user/admin/wall https://landsat.gsfc.nasa.gov/author/admin/page/14/ .... ---------------------------------------------------------------------------------------------------- Domain/IP: nasa.gov Find links with: AdminTools/ https://kscddms.ksc.nasa.gov/adminTools.html ---------------------------------------------------------------------------------------------------- Domain/IP: nasa.gov Find links with: Server.html https://image.msfc.nasa.gov/ChrisDocs/udfLib/Server.html https://www.nasa.gov/privacy/PIA-ODIN-server.html MORE RESULTS...