Showing posts with label SpiderFoot. Show all posts
Showing posts with label SpiderFoot. Show all posts

Monday, 13 January 2014

[SpiderFoot v2.1.0] The Open Source Footprinting tool

SpiderFoot is a free, open-source footprinting tool, enabling you to perform various scans against a given domain name in order to obtain information such as sub-domains, e-mail addresses, owned netblocks, web server versions and so on. The main objective of SpiderFoot is to automate the footprinting process to the greatest extent possible, freeing up a penetration tester’s time to focus their efforts on the security testing itself.

2.1.0 - Major release

  • New Module (sfp_malcheck): Identify whether an IP or domain (target, co-host or affiliate) appears on any malicious domain lists, RBLs, etc.
  • New Module (sfp_bingsearch): Bing searches, as well as identifying co-hosted sites on the target's IPs
  • New Module (sfp_affilinfo): Obtain information about affiliates
  • New Module (sfp_strangeheaders): Identify non-standard HTTP headers
  • Module overhaul (sfp_ripe, now sfp_ir): Identifies ISPs / Up-streams, BGP ASs, and much smarter at identifying owned netblocks
  • Module overhaul (sfp_searchtld, now sfp_tldsearch): Uses the Mozilla public TLD list for identifying all TLDs.
  • UI Enhancement: Option to configure a new scan by results desired in addition to modules
  • UI Enhancement: Simple visualizations added
  • UI Enhancement: Improved configuration section
  • Lots of small tweaks, performance improvements, bug fixes

Sunday, 8 September 2013

[SpiderFoot v2.0.4] Footprinting tool

SpiderFoot is a free, open-source footprinting tool, enabling you to perform various scans against a given domain name in order to obtain information such as sub-domains, e-mail addresses, owned netblocks, web server versions and so on. The main objective of SpiderFoot is to automate the footprinting process to the greatest extent possible, freeing up a penetration tester’s time to focus their efforts on the security testing itself.


Main features
  • Fast, Easy to Use
  • Highly Configurable
  • For Windows & Linux
  • Create your own modules in Python


Changelog v2.04

  • New module: Search all Internet TLDs for targets with the same name (sfp_searchtld), with threading and handling wildcard DNS
  • New module: Obtain SSL certificate information (issued to, issued by) and check for host-mismatch, expiry and approaching expiry
  • Improve sfp_dns to identify and handle cases where wildcard DNS is enabled
  • A number of bug fixes, should improve the amount of results returned
Full Changelog: here

Monday, 6 May 2013

[SpiderFoot v2.0] The Open Source Footprinting tool

SpiderFoot is a free, open-source footprinting tool, enabling you to perform various scans against a given domain name in order to obtain information such as sub-domains, e-mail addresses, owned netblocks, web server versions and so on. The main objective of SpiderFoot is to automate the footprinting process to the greatest extent possible, freeing up a penetration tester’s time to focus their efforts on the security testing itself.


Main features
  • Fast, Easy to Use
  • Highly Configurable
  • For Windows & Linux
  • Create your own modules in Python
New in this release, which is actually a complete re-write of the version from 2005(!):
  • Now runs on Windows as well as Linux, Solaris, *BSD (basically anything with Python should be fine)
  • Scans are even more configurable than before
  • All scan data stored locally in an SQLite database for querying, reporting and analysis
  • Many more scans/tests included (GeoIP, URL linkage, web technology, port scans…)
  • You can now easily extend functionality by writing your own modules in Python
  • Completely new user interface, which is now entirely web-based
  • Configuration state is stored between runs
  • Scanning can be remotely controlled

Full Changelog: here
More Information: http://www.spiderfoot.net/