• Stars
    star
    132
  • Rank 274,205 (Top 6 %)
  • Language
    Python
  • Created over 4 years ago
  • Updated about 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Weaponizing Live CT logs for automated monitoring of assets

CertEagle - Asset monitoring utility using real time CT log feeds

certeagle

Detailed Description about this can be found here :

Read Blog here : https://medium.com/@Asm0d3us/weaponizing-live-ct-logs-for-automated-monitoring-of-assets-39c6973177c7

Introduction

In Bugbounties “If you are not first , then you are last” there is no such thing as silver or a bronze medal , Recon plays a very crucial part and if you can detect/Identify a newly added asset earlier than others then the chances of you Finding/Reporting a security flaw on that asset and getting rewarded for the same are higher than others.

Personally I am monitoring CT logs for domains/subdomains for quite a long time now and it gave me a lot of successful results , The inspiration behind this was “Sublert : By yassineaboukir” which checks crt.sh for subdomains and can be executed periodically , However I am using somewhat different approach and instead of looking into crt.sh periodically, I am extracting domains from Live CT log feeds , So chances of me finding a new asset earlier is higher as compared to others.

Workflow

  • Monitoring Real Time CT log feed and extracting the domain names from that feed
  • Matching the extracted subdomains/domains against the domains/Keywords to be matched
  • Sending a Slack notification if a domain name matches

Requirements :

  • A VPS (UNIX up and running)
  • Python 3x (Tested with Python 3.6.9)
  • Slack Workspace (optional)

Setup

I am assuming that you have already done with your setup of slack workspace .

Now Create a channel named “subdomain-monitor” and set up a incoming webhook

Enabling Slack Notifications :

Edit config.yaml file and paste your slack webhook URL there , It should look something like this config

Keywords and domains to match :

You can specify keywords and domains to match in domains.yaml file , You can specify names

For Matching subdomains :

domains.yaml Note : Notice that preceding dot [ . ]

Lets take “.facebook.com” as example , domains extracted from Real time CT logs will be matched against the word “.facebook.com” , if matched they will be logged in our output file (found-domains.log) . The thing to note here is , It will give some false positives like “test.facebook.com.test.com” , “example.facebook.company” but we can filter out them later on by using use regex magic

For Matching domains/subdomains with specific keywords :

Lets assume that you want to monitor and log domains/subdomains that are having word “hackerone” in them , then our domains.yaml file will look something like this domains.yaml Now all the extracted domains/subdomains that are having word “hackerone” in them will be matched and logged (and a slack notification will be sent to you for the same)

Okay we are done with our initial setup , Lets install the required dependencies and run our tool

$ pip3 install -r requirements.txt

$ python3 certeagle.py

Matched domains will look like this :

Slack Notifications will look like this :

enter image description here

Output files :

The program will keep on running all the matched domains will be saved under output directory in found-domains.log file

Strict Warning : Do not monitor assets of any organisation without prior consent

Inspiration

Sublert

Phishing Catcher

Contact

Shoot my DM : @0xAsm0d3us

Want to support my work?

If you think my work has added some value to your existing knowledge, then you can Buy me a Coffee here (and who doesn't loves a good cup of coffee?')

name

More Repositories

1

Awesome-Bugbounty-Writeups

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Python
4,655
star
2

ParamSpider

Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
Python
2,467
star
3

FavFreak

Making Favicon.ico based Recon Great again !
Python
1,113
star
4

OpenRedireX

A fuzzer for detecting open redirect vulnerabilities
Python
694
star
5

Vulnerabilities-Unmasked

This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!
364
star
6

headerpwn

A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers
Go
312
star
7

rayder

A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows
Go
272
star
8

Gorecon

Gorecon is a All in one Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool that every pentester/bughunter might wanna consider into their arsenal
Go
270
star
9

ArchiveFuzz

Hunt down the secrets from the WebArchives for Fun and Profit
Python
165
star
10

DNSleuth

DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making
Python
100
star
11

Solidity-Gas-Optimization-Tips

Solidity Gas Optimization Tips
86
star
12

Passivehunter

Subdomain discovery using the power of 'The Rapid7 Project Sonar datasets'
Python
86
star
13

awesome-bughunting-oneliners

A list of Awesome Bughunting oneliners , collected from the various sources
Python
65
star
14

heaptruffle

Mine URLs from Browser's Heap Snapshot for fun and profit
JavaScript
63
star
15

revit

A command-line utility for performing reverse DNS lookups
Go
57
star
16

Drishti

A fast HTTP Response status checker implemented in Python3
Python
57
star
17

rayder-workflows

Repo for hosting rayder workflows
55
star
18

Everything-About-DNS

DNS Explained : This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrounds.
53
star
19

realm

A utility for recursively traversing SSL/TLS certificates for collecting DNS names
Go
43
star
20

ip2cloud

Check IP addresses against known cloud provider IP address ranges
Python
43
star
21

revwhoix

A simple utility to perform reverse WHOIS lookups using whoisxml API
Python
38
star
22

Quaithe

Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.
Python
27
star
23

dnsaudit

A command-line utility for auditing DNS configuration using Zonemaster API
Go
27
star
24

autoreport

autoreport generates bug report templates for security researchers
Python
21
star
25

getresolvers

A simple utility to fetch freshly updated DNS resolvers
Python
17
star
26

ip2asn

A utility to quickly map IP addresses to their respective ASN
Python
14
star
27

getsan

A utility to fetch and display dns names from the SSL/TLS cert data
Go
12
star
28

Watson

Watson is a utility for note management and search from your terminal
Python
7
star
29

CLI-Project-Generator

A simple module for generating CLI project in python
Python
4
star
30

OS-ASSIGMENT

Here is my Solution for the assigned question (for OS CA2)
C
2
star
31

devanshbatham

2
star
32

CTF-Arsenal

My CTF stuff
Python
2
star
33

Cyberhack-Village-2.0

This Repo contains solution for challenges that I have created as a part of Cyberhack Village 2.0
Python
2
star