Skip to main content Link Menu Expand (external link) Copy Copied

recon / spiderfoot

install

/sys/docker/spiderfoot

start

#? memo osint spiderfoot
#
#? run docker spiderfoot
docker run -p 5002:5001 -d spiderfoot

#? list sfcli modules
python3 ./sf.py -M |grep -i dns

#? run/connect sfcli with docker
python3 ./sfcli.py -s http://localhost:5002

# check memo osint sfcli

run

Watch the tutorial video HERE.

# test connectivity
ping

#? scan dns
start jmvwork.xyz -m sfp_dnsgrep,sfp_dnsraw,sfp_dnsdumpster,sfp_dns_brute

#? scan crt and dns #!VERBOSE
start jmvwork.xyz -m sfp_crt

# sfcli - scan - start example 2
start jmvwork.xyz -m sfp_dns,sfp_spider,sfp_pwned -n "blabla"

#? check typosquatting
start jmvwork.xyz -m sfp_similar

# sfcli - scan - information status
scaninfo <sid>

# sfcli - scan - progression watch - with the scan ID <sid>
logs <sid> -w

# sfcli - scan - get data collected
data <sid> -t IP_ADDRESS

# sfcli - list all scans 
scans

# sfcli - scan - delete by its <sid>
delete <sid>

modules

shodan

Watch the tutorial video HERE.

# sfcli shodan - checking the settings 
set | str shodan

# sfcli shodan - set the API key <apikey>
set module.sfp_shodan.api_key = <apikey>

# sfcli shodan - start a scan
start 1.2.3.4 -m spf_shodan

hibp

Watch the tutorial video HERE.

# sfcli HIBP - start a scan
start elon@testla.com -m sfp_pwned -w

# sfcli HIBP - scan - get data collected
data <sid> -t EMAILADDR_COMPROMISED

dnsrecon

Watch the tutorial video HERE.

# sfcli DNSRecon - start a scan
start elon@testla.com -m sfp_dnsbrute,sfp_dnsresolve -r

crt

Watch the tutorial video HERE.

# sfcli crt - start a scan
start tesla.com -m sfp_crt -q -F INTERNET_NAME

whatcms

# sfcli whatcms - checking the settings 
set | str whatcms

# sfcli whatcms - set the API key <apikey>
set module.sfp_whatcms.api_key = <apikey>

# sfcli whatcms - start a scan
start tesla.com -m sfp_whatcms