• Stars
    star
    131
  • Rank 266,872 (Top 6 %)
  • Language
    Python
  • Created almost 4 years ago
  • Updated over 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Weaponizing Live CT logs for automated monitoring of assets

CertEagle - Asset monitoring utility using real time CT log feeds

certeagle

Detailed Description about this can be found here :

Read Blog here : https://medium.com/@Asm0d3us/weaponizing-live-ct-logs-for-automated-monitoring-of-assets-39c6973177c7

Introduction

In Bugbounties “If you are not first , then you are last” there is no such thing as silver or a bronze medal , Recon plays a very crucial part and if you can detect/Identify a newly added asset earlier than others then the chances of you Finding/Reporting a security flaw on that asset and getting rewarded for the same are higher than others.

Personally I am monitoring CT logs for domains/subdomains for quite a long time now and it gave me a lot of successful results , The inspiration behind this was “Sublert : By yassineaboukir” which checks crt.sh for subdomains and can be executed periodically , However I am using somewhat different approach and instead of looking into crt.sh periodically, I am extracting domains from Live CT log feeds , So chances of me finding a new asset earlier is higher as compared to others.

Workflow

  • Monitoring Real Time CT log feed and extracting the domain names from that feed
  • Matching the extracted subdomains/domains against the domains/Keywords to be matched
  • Sending a Slack notification if a domain name matches

Requirements :

  • A VPS (UNIX up and running)
  • Python 3x (Tested with Python 3.6.9)
  • Slack Workspace (optional)

Setup

I am assuming that you have already done with your setup of slack workspace .

Now Create a channel named “subdomain-monitor” and set up a incoming webhook

Enabling Slack Notifications :

Edit config.yaml file and paste your slack webhook URL there , It should look something like this config

Keywords and domains to match :

You can specify keywords and domains to match in domains.yaml file , You can specify names

For Matching subdomains :

domains.yaml Note : Notice that preceding dot [ . ]

Lets take “.facebook.com” as example , domains extracted from Real time CT logs will be matched against the word “.facebook.com” , if matched they will be logged in our output file (found-domains.log) . The thing to note here is , It will give some false positives like “test.facebook.com.test.com” , “example.facebook.company” but we can filter out them later on by using use regex magic

For Matching domains/subdomains with specific keywords :

Lets assume that you want to monitor and log domains/subdomains that are having word “hackerone” in them , then our domains.yaml file will look something like this domains.yaml Now all the extracted domains/subdomains that are having word “hackerone” in them will be matched and logged (and a slack notification will be sent to you for the same)

Okay we are done with our initial setup , Lets install the required dependencies and run our tool

$ pip3 install -r requirements.txt

$ python3 certeagle.py

Matched domains will look like this :

Slack Notifications will look like this :

enter image description here

Output files :

The program will keep on running all the matched domains will be saved under output directory in found-domains.log file

Strict Warning : Do not monitor assets of any organisation without prior consent

Inspiration

Sublert

Phishing Catcher

Contact

Shoot my DM : @0xAsm0d3us

Want to support my work?

If you think my work has added some value to your existing knowledge, then you can Buy me a Coffee here (and who doesn't loves a good cup of coffee?')

name

More Repositories

1

Awesome-Bugbounty-Writeups

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Python
4,342
star
2

ParamSpider

Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
Python
2,151
star
3

FavFreak

Making Favicon.ico based Recon Great again !
Python
1,062
star
4

OpenRedireX

A fuzzer for detecting open redirect vulnerabilities
Python
606
star
5

Vulnerabilities-Unmasked

This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!
354
star
6

Gorecon

Gorecon is a All in one Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool that every pentester/bughunter might wanna consider into their arsenal
Go
265
star
7

rayder

A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows
Go
260
star
8

headerpwn

A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers
Go
237
star
9

ArchiveFuzz

Hunt down the secrets from the WebArchives for Fun and Profit
Python
161
star
10

DNSleuth

DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making
Python
99
star
11

Solidity-Gas-Optimization-Tips

Solidity Gas Optimization Tips
87
star
12

Passivehunter

Subdomain discovery using the power of 'The Rapid7 Project Sonar datasets'
Python
86
star
13

heaptruffle

Mine URLs from Browser's Heap Snapshot for fun and profit
JavaScript
62
star
14

awesome-bughunting-oneliners

A list of Awesome Bughunting oneliners , collected from the various sources
Python
61
star
15

Drishti

A fast HTTP Response status checker implemented in Python3
Python
57
star
16

rayder-workflows

Repo for hosting rayder workflows
54
star
17

Everything-About-DNS

DNS Explained : This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrounds.
51
star
18

revit

A command-line utility for performing reverse DNS lookups
Go
43
star
19

realm

A utility for recursively traversing SSL/TLS certificates for collecting DNS names
Go
43
star
20

ip2cloud

Check IP addresses against known cloud provider IP address ranges
Python
40
star
21

revwhoix

A simple utility to perform reverse WHOIS lookups using whoisxml API
Python
37
star
22

dnsaudit

A command-line utility for auditing DNS configuration using Zonemaster API
Go
26
star
23

Quaithe

Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.
Python
25
star
24

autoreport

autoreport generates bug report templates for security researchers
Python
22
star
25

getresolvers

A simple utility to fetch freshly updated DNS resolvers
Python
16
star
26

getsan

A utility to fetch and display dns names from the SSL/TLS cert data
Go
13
star
27

ip2asn

A utility to quickly map IP addresses to their respective ASN
Python
13
star
28

PHP-Web-CTF-Challenges

PHP Web CTF Challenges.
PHP
10
star
29

Watson

Watson is a utility for note management and search from your terminal
Python
7
star
30

CLI-Project-Generator

A simple module for generating CLI project in python
Python
4
star
31

devanshbatham.github.io

SCSS
4
star
32

OS-ASSIGMENT

Here is my Solution for the assigned question (for OS CA2)
C
2
star
33

devanshbatham

2
star
34

CTF-Arsenal

My CTF stuff
Python
2
star
35

Cyberhack-Village-2.0

This Repo contains solution for challenges that I have created as a part of Cyberhack Village 2.0
Python
2
star
36

Codewars-Solutions-Python

This Repository contains my solutions of codewars problems, solutions might not be the most efficient but yes they did work
Python
1
star