一款全自动白帽漏洞扫描器
2023-11-21 08:32:30 Author: 菜鸟学信安(查看原文) 阅读量:6 收藏

DarkAngel是一款全自动的白帽漏洞扫描程序,可以监控黑客和bugcrowd资产,生成漏洞报告,漏洞URL截屏,发送消息通知。

目前支持的功能:

  • 黑客资产监控;

  • 虫群资产监控;

  • 添加用户定义的资产;

  • 子域名扫描;

  • 网站爬虫

  • 网站指纹识别;

  • 漏洞扫描;

  • 漏洞网址自动截图;

  • 自动生成漏洞报告;

  • 企业微信通知扫描结果;

  • 前端显示扫描结果;

0x01 自动生成漏洞报告

自动生成漏洞报告 - MarkDown 格式 - 存储地址/根/DarkAngel/vulscan/结果/报告

支持自行添加漏洞报告模板。目前,漏洞报告模板已添加如下。漏洞名称可以配置为核心模板的文件名。

自定义漏洞报告模板格式。

0x02 扫描邮件通知

电报通知。获取参数后,在 /root/markup/vconfig/config 中配置参数.ini开启企业 TG 通知

TG 通知 - 扫描过程

获取参数后,在 /root/markup/vconfig/config.ini 中配置参数,开启企业微信通知

微信通知 - 漏洞结果

微信通知 - 扫描流程

整体项目架构为 ES+Kibana+scanner,因此安装需要三部分。

ES image:

Pull ES imagedocker pull bywalkss/darkangel:es7.9.3
Deploy ES imagedocker run -e ES_JAVA_OPTS="-Xms1024m -Xms1024m" -e "discovery.type=single-node" -d -p 9200:9200 -p 9300:9300 --name elasticsearch elasticsearch:7.9.3
view logdocker logs -f elasticsearch
If there is a problem, execute the commandsysctl -w vm.max_map_count=262144
Restart Dockerdocker restart elasticsearch

Kibana image:

Pull Kibana imagedocker pull bywalkss/darkangel:kibana7.9.3
Deploy Kibana image (modify the es ip)docker run --name kibana -e ELASTICSEARCH_ URL= http://es-ip:9200 -p 5601:5601 -d docker.io/bywalkss/darkangel:kibana7.9.3
view logdocker logs -f kibana
If there is a problem, execute the commandsysctl -w vm.max_map_count=262144
Restart Dockerdocker start kibana

Scanner image:

Pull Scanner Imagedocker pull bywalkss/darkangel:v0.0.5
Deployment Scannerdocker run -it -d -v /root/DarkAngel:/root/DarkAngel --name darkangel bywalkss/darkangel:v0.0.5
Enter the scanner dockerdocker exec -it docker_id /bin/bash
Enter the root directorycd root
Download source codegit clone https://github.com/Bywalks/DarkAngel.git
Add execution permissionschmod 777 /root/DarkAngel/vulscan/tools/*chmod 777 /root/DarkAngel/vulscan/tools/whatweb/*
You can use it after into the DarkAngel directory

0x02 工具使用

usage: darkangel.py [-h] [--add-new-domain]                    [--scan-domain-by-time SCAN_DOMAIN_BY_TIME SCAN_DOMAIN_BY_TIME]                    [--scan-new-domain]                    [--add-domain-and-scan ADD_DOMAIN_AND_SCAN [ADD_DOMAIN_AND_SCAN ...]]                    [--offer-bounty {yes,no}] [--nuclei-file-scan]                    [--nuclei-file-scan-by-new-temp NUCLEI_FILE_SCAN_BY_NEW_TEMP]                    [--nuclei-file-scan-by-new-add-temp NUCLEI_FILE_SCAN_BY_NEW_ADD_TEMP]                    [--nuclei-file-scan-by-temp-name NUCLEI_FILE_SCAN_BY_TEMP_NAME]                    [--nuclei-file-polling-scan]
DarkAngel is a white hat scanner. Every user makes the Internet more secure.
--------------------------------------------------------------------------------
optional arguments: -h, --help show this help message and exit --add-new-domain add new domain from h1 and bc --scan-domain-by-time SCAN_DOMAIN_BY_TIME SCAN_DOMAIN_BY_TIME scan h1 and bc domain by launched time --scan-new-domain add and scan new domain from h1 and bc --add-domain-and-scan ADD_DOMAIN_AND_SCAN [ADD_DOMAIN_AND_SCAN ...] add and scan new domain self added --offer-bounty {yes,no} set add domain is bounty or no bounty --nuclei-file-scan scan new domain from h1 and bc --nuclei-file-scan-by-new-temp NUCLEI_FILE_SCAN_BY_NEW_TEMP use new template scan five file by nuclei --nuclei-file-scan-by-new-add-temp NUCLEI_FILE_SCAN_BY_NEW_ADD_TEMP add new template scan five file by nuclei --nuclei-file-scan-by-temp-name NUCLEI_FILE_SCAN_BY_TEMP_NAME use template scan five file by nuclei --nuclei-file-polling-scan five file polling scan by nuclei

--add-new-domain

$ python3 darkangel.py --add-new-domain

监听hackerone和bugcrowd的新域名

以时间间隔为条件,对 es 库中的 pdomain 进行漏洞扫描。该模块的开发目的是批量扫描库中的pdomain,缓解一次阻塞整个程序的问题。

监控黑客和虫群域名并扫描它们(首次使用时,将添加所有黑客和虫群域名。当资产过多且扫描时间较长时做好准备)

0x02 工具获取

下载地址1:

链接:https://pan.quark.cn/s/e18cc6e34dfc

下载地址2:
https://github.com/Bywalks/DarkAngel

文章转自 乌雲安全


文章来源: http://mp.weixin.qq.com/s?__biz=MzU2NzY5MzI5Ng==&mid=2247498891&idx=1&sn=45d87bde5fa2ed2737de14b3f362668f&chksm=fc9be614cbec6f02ee8a4e2e8d1af95b547702d41738d2bfda5495217c71178840a917555115&scene=0&xtrack=1#rd
如有侵权请联系:admin#unsafe.sh