---
工具名稱: Automater
所屬分類: Information Gathering
標簽: [information gathering,kali linux,automater]
創建時間: 2016-10-19 02:31:51
---
0x00 Automater介紹
-------------
Automater是一個URL /域,IP地址和Md5哈希開源情報工具,旨在為入侵分析師使分析過程更容易。 給定一個目標(URL,IP或HASH)或一個完整的目標文件,Automater將返回來自如下來源的相關結果:IPvoid.com,Robtex.com,Fortiguard.com,unshorten.me,Urlvoid.com,Labs。 alienvault.com,ThreatExpert,VxVault和VirusTotal。
工具來源:http://www.tekdefense.com/automater/
[Automater主頁][1] | [Kali AutomaterRepo倉庫][2]
- 作者:TekDefense.com
- 證書:其他
0x01 Automater功能
---------------
automater - 一個IP和URL分析工具
```shell
root@kali:~# automater -h
用法:Automater.py [-h] [-o OUTPUT] [-b] [-f CEF] [-w WEB] [-c CSV]
????????????????????[-d DELAY] [-s SOURCE] [--proxy PROXY] [-a USERAGENT] [-V]
????????????????????[-r] [-v]
????????????????????target
IP,URL和哈希被動式分析工具
位置參數:
??target 列出一個IP地址(接受CIDR或短劃線符號),
????????????????????????URL或哈希以查詢或傳遞文件的文件名
????????????????????????包含要查詢的IP地址信息,URL或哈希
????????????????????????用換行符分隔。
可選參數:
??-h,--help顯示此幫助信息并退出
??-o OUTPUT,--output OUTPUT
????????????????????????此選項將結果輸出到文件。
??-b,--bot此選項將輸出bot的最小化結果。
??-f CEF,--cef CEF此選項將結果輸出為CEF格式文件。
??-w WEB,--web WEB此選項將結果輸出到HTML文件。
??-c CSV,--csv CSV此選項將結果輸出到CSV文件。
??-d DELAY,-??-delay DELAY
????????????????????????這將改變延遲到輸入的秒數。
????????????????????????默認值為2。
-s SOURCE, --source SOURCE
????????????????????????此選項將僅針對特定源引擎運行目標以拉取關聯的域
????????????????????????選項在XML配置文件中的siteelement的name屬性中定義
????????????????????????可以是由分號分隔的名稱列表。
??--proxy PROXY 此選項將設置要使用的代理(例如 proxy.example.com:8080)
??-a USERAGENT,--useragent USERAGENT
????????????????????????此選項允許用戶設置正在使用的Web服務的user-agent
????????????????????????默認情況下,user-agent設置為Automatic / version
??-V,--vercheck 此選項檢查并報告Automator的版本
????????????????????????檢查包含在Automator中的每個python模塊
????????????????????????默認值(no -V)為False
??-r,--refreshxml 此選項刷新遠程GitHub站點上的tekdefense.xml文件。
默認值(no -r)為False。
??-v,--verbose 此選項將消息打印到屏幕。
默認值(no -v)為False。
```
0x02 Automater用法示例
-----------------
```shell
root@kali:~# automater -w test -v 210.41.224.132
____________________ Results found for: 210.41.224.132 ____________________
[+] A records from Robtex.com: www[.]cuit.edu.cn
No results found in the FNet URL
[+] VT ASN: 4538
[+] VT Country: CN
[+] VT AS Owner: No results found
[+] VT pDNS: ('2015-03-23 00:00:00', 'www[.]cuit.edu.cn')
[+] VT Malware: No results found
[+] VT Mal URLs: No results found
[+] Blacklist from IPVoid: No results found
[+] ISP from IPvoid: China Education and Research Networ...
[+] Country from IPVoid: (CN) China
[+] Malc0de Date: No results found
[+] Malc0de IP: No results found
[+] Malc0de Country: No results found
[+] Malc0de ASN: No results found
[+] Malc0de ASN Name: No results found
[+] Malc0de MD5: No results found
[+] Reputation Authority Score: 50/100
[+] FreeGeoIP Country Name: China
[+] FreeGeoIP Region Name: Sichuan
[+] FreeGeoIP City: Chengdu
[+] FreeGeoIP Zipcode: No results found
[+] FreeGeoIP Latitude: 30.6667
[+] FreeGeoIP Longitude: 104.0667
[+] SANS total target IPs seen: No results found
[+] SANS total packets blocked: No results found
[+] SANS last seen on: No results found
[+] SANS first seen on: No results found
No results found in the THIP
No results found in the TekHP
[+] ProjectHoneypot activity type: No results found
[+] ProjectHoneypot first mail received: No results found
[+] ProjectHoneypot last mail received: No results found
[+] ProjectHoneypot total mails received: No results found
[+] ProjectHoneypot spider first seen: No results found
[+] ProjectHoneypot spider last seen: No results found
[+] ProjectHoneypot spider sightings: No results found
[+] ProjectHoneypot user-agent sightings: No results found
[+] ProjectHoneypot first post on: No results found
[+] ProjectHoneypot last post on: No results found
[+] ProjectHoneypot form posts: No results found
[+] ProjectHoneypot first rule break on: No results found
[+] ProjectHoneypot last rule break on: No results found
[+] ProjectHoneypot rule break sightings: No results found
[+] ProjectHoneypot first dictionary attack on: No results found
[+] ProjectHoneypot last dictionary attack on: No results found
[+] ProjectHoneypot dictionary attack sightings: No results found
[+] ProjectHoneypot harvester first seen: No results found
[+] ProjectHoneypot harvester last seen: No results found
[+] ProjectHoneypot harvester sightings: No results found
[+] ProjectHoneypot harvester results: No results found
[+] Generating HTML output: test
test Generated
```
[1]: http://www.tekdefense.com/automater/
[2]: http://git.kali.org/gitweb/?p=packages/automater.git;a=summary
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool