https://github.com/techspence/observer
A blue team tool for watching over domains using bug hunting methodology!
https://github.com/techspence/observer
blueteam bughunting-methodology enumeration infosec osint recon
Last synced: about 1 month ago
JSON representation
A blue team tool for watching over domains using bug hunting methodology!
- Host: GitHub
- URL: https://github.com/techspence/observer
- Owner: techspence
- License: mit
- Created: 2020-09-02T22:47:58.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-10-07T12:17:29.000Z (over 4 years ago)
- Last Synced: 2025-04-13T00:05:07.721Z (about 1 month ago)
- Topics: blueteam, bughunting-methodology, enumeration, infosec, osint, recon
- Language: Shell
- Homepage:
- Size: 16.6 KB
- Stars: 6
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# observer
A blue team tool for watching over domains using bug hunting methodology!**Passive recon --> active recon --> fingerprinting/tracking/monitoring**
- The idea of this tool is to try to:
- a) find things that vulnerability scanners miss or don't check for
- b) find things that require more manual checking but can be scripted or automated to some extent
- c) track, monitor and alert on changes, deviations and other potentially interesting things**_Note: This tool has some functionality but is still a work in progress :O)_**
## Requirements
- Amass
- Massdns
- OpenSSL
- Slack## Current & ToDo Features
**Passive Recon**
- [x] Potential new subdomains
- [ ] Potential new IPs
- [ ] Google dorking
- [ ] Pastebin
- [ ] Github searching
- [ ] theHarvester email scraping
- [ ] Interesting content
- [ ] Technology used**Active Recon**
- [x] Verify subdomains
- [x] Certificate expiration check
- [ ] New certificates issued
- [ ] Open ports
- [ ] Services and versions
- [ ] Technology used
- [ ] Login form https only
- [ ] Nikto**Changes to track/monitor/alert on**
- [x] New/Removed/Modified subdomains
- [x] Certificate expired/expiring soon
- [ ] New certificates issued
- [ ] New ports available
- [ ] New services or versions
- [ ] New findings on google, pastebin, etc.## High Level Workflow
- Subdomain Enumeration > New Subdomain Alerting > Subdomain DNS Validation > Certificate Monitoring
- Each script calls the next**Step 1.** Enumerate possible domains with Amass
`/opt/Amass/amass enum -silent -d spenceralessi.com -o amass_domains.txt`
**Step 2.** Feed the output of Step 1. to Step 2. to validate subdomains with massdns
`/opt/massdns/bin/massdns -r /opt/massdns/lists/resolvers.txt -t A -o S -w massdns_domains.txt amass_domains.txt > /dev/null 2>&1`
Then Export just subdomains
`cat massdns_domains.txt | awk '{print $1}' | sed 's/.$//' | sort -u > valid_domains.txt`
**Step 3.** Feed Step 2a. to certificate monitoring
## Inspiration
- https://0xpatrik.com/subdomain-enumeration-2019/
- Jason Haddix Bughunter Methodology
- https://www.youtube.com/watch?v=gIz_yn0Uvb8
- https://docs.google.com/presentation/d/1MWWXXRvvesWL8V-GiwGssvg4iDM58_RMeI_SZ65VXwQ/edit
- https://medium.com/@noobhax/my-recon-process-dns-enumeration-d0e288f81a8a