How to Install and Use Spiderfoot in Ubuntu
To Install and Use Spiderfoot in Ubuntu
Spiderfoot is a free source testing tool to analyse any vulnerabilities/malicious functions on the server to reduce the attacks by the hackers. It is also known as a footprint tool and is written in Python language. Installation of spiderfoot is explained in this article.
Features
- It supports Linux and windows machines and can be collaborated with GitHub.
- Supports GUI.
- Highly composed.
- It deploys SQLite in backend and stores the result in SQLite DB.
To install Spiderfoot
Utilise the following command to install the dependency packages.
root@linuxhelp:~# apt-get install git python-dev python-pip python-m2crypto python-netaddr python-pypdf python-stem python-lxml -y
Reading package lists... Done
Building dependency tree
Reading state information... Done
python-lxml is already the newest version.
python-lxml set to manually installed.
The following extra packages will be installed:
git-man ieee-data liberror-perl libexpat1 libexpat1-dev libpython-dev libpython2.7-dev python-colorama python-distlib python-ndg-httpsclient python-requests
python-setuptools python-urllib3 python-wheel python2.7-dev
.
.
.
Setting up python-urllib3 (1.11-1) ...
Setting up python-requests (2.7.0-3) ...
Setting up python-setuptools (18.4-1) ...
Setting up python-pip (1.5.6-7ubuntu1.2) ...
Setting up python-pypdf (1:1.13-3) ...
Setting up python-stem (1.4.1b-1) ...
Setting up python-wheel (0.26.0-1) ...
Processing triggers for libc-bin (2.21-0ubuntu4) ...
Run the following command to install cherrypy and mako
root@linuxhelp:~# pip install cherrypy
Downloading/unpacking cherrypy
Downloading CherryPy-7.1.0.tar.gz (416kB): 416kB downloaded
Running setup.py (path:/tmp/pip-build-x2vGzY/cherrypy/setup.py) egg_info for package cherrypy
Requirement already satisfied (use --upgrade to upgrade): six in /usr/lib/python2.7/dist-packages (from cherrypy)
Installing collected packages: cherrypy
Running setup.py install for cherrypy
changing mode of build/scripts-2.7/cherryd from 644 to 755
changing mode of /usr/local/bin/cherryd to 755
Successfully installed cherrypy
Cleaning up...
root@linuxhelp:~# pip install mako
Downloading/unpacking mako
Downloading Mako-1.0.4.tar.gz (574kB): 574kB downloaded
Running setup.py (path:/tmp/pip-build-fqiiY8/mako/setup.py) egg_info for package mako
warning: no files found matching ' *.xml' under directory ' examples'
warning: no files found matching ' *.mako' under directory ' examples'
warning: no files found matching ' distribute_setup.py'
.
.
.
building ' markupsafe._speedups' extension
x86_64-linux-gnu-gcc -pthread -DNDEBUG -g -fwrapv -O2 -Wall -Wstrict-prototypes -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -g -fstack-protector-strong -Wformat -Werror=format-security -fPIC -I/usr/include/python2.7 -c markupsafe/_speedups.c -o build/temp.linux-x86_64-2.7/markupsafe/_speedups.o
x86_64-linux-gnu-gcc -pthread -shared -Wl,-O1 -Wl,-Bsymbolic-functions -Wl,-Bsymbolic-functions -Wl,-z,relro -fno-strict-aliasing -DNDEBUG -g -fwrapv -O2 -Wall -Wstrict-prototypes -D_FORTIFY_SOURCE=2 -g -fstack-protector-strong -Wformat -Werror=format-security -Wl,-Bsymbolic-functions -Wl,-z,relro -D_FORTIFY_SOURCE=2 -g -fstack-protector-strong -Wformat -Werror=format-security build/temp.linux-x86_64-2.7/markupsafe/_speedups.o -o build/lib.linux-x86_64-2.7/markupsafe/_speedups.so
Successfully installed mako MarkupSafe
Cleaning up...
Download the spiderfoot package by using wget command.
root@linuxhelp:~# wget http://downloads.sourceforge.net/project/spiderfoot/spiderfoot-2.6.1-src.tar.gz
--2016-07-28 09:46:30-- http://downloads.sourceforge.net/project/spiderfoot/spiderfoot-2.6.1-src.tar.gz
Resolving downloads.sourceforge.net (downloads.sourceforge.net)... 216.34.181.59
Connecting to downloads.sourceforge.net (downloads.sourceforge.net)|216.34.181.59|:80... connected.
HTTP request sent, awaiting response... 302 Found
Location: http://liquidtelecom.dl.sourceforge.net/project/spiderfoot/spiderfoot-2.6.1-src.tar.gz [following]
--2016-07-28 09:46:30-- http://liquidtelecom.dl.sourceforge.net/project/spiderfoot/spiderfoot-2.6.1-src.tar.gz
Resolving liquidtelecom.dl.sourceforge.net (liquidtelecom.dl.sourceforge.net)... 197.155.77.8
Connecting to liquidtelecom.dl.sourceforge.net (liquidtelecom.dl.sourceforge.net)|197.155.77.8|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1460517 (1.4M) [application/x-gzip]
Saving to: ‘ spiderfoot-2.6.1-src.tar.gz’
spiderfoot-2.6.1-src.tar.gz 100%[==========================================================================================> ] 1.39M 61.7KB/s in 41s
2016-07-28 09:47:17 (34.8 KB/s) - ‘ spiderfoot-2.6.1-src.tar.gz’ saved [1460517/1460517]
Extract the downloaded file by using the following command.
root@linuxhelp:~# tar -xzvf spiderfoot-2.6.1-src.tar.gz
spiderfoot-2.6.1/
spiderfoot-2.6.1/sfdb.py
spiderfoot-2.6.1/cache/
spiderfoot-2.6.1/cache/95c5dab788d19e124540cb1e96e6277f0871c648f4b3f2526fa1f765
spiderfoot-2.6.1/modules/
spiderfoot-2.6.1/modules/sfp_darksearch.py
spiderfoot-2.6.1/modules/sfp_sharedip.py
spiderfoot-2.6.1/modules/sfp_webframework.py
spiderfoot-2.6.1/modules/sfp_accounts.py
spiderfoot-2.6.1/modules/sfp_vuln.py
.
.
.
spiderfoot-2.6.1/ext/stem/interpreter/arguments.py
spiderfoot-2.6.1/ext/stem/interpreter/autocomplete.py
spiderfoot-2.6.1/ext/gexf/
spiderfoot-2.6.1/ext/gexf/_gexf.py
spiderfoot-2.6.1/ext/gexf/__init__.py
spiderfoot-2.6.1/LICENSE
spiderfoot-2.6.1/sfwebui.py
spiderfoot-2.6.1/LICENSE.tp
Run the python script located in the extracted directory.
root@linuxhelp:~# cd spiderfoot-2.6.1/ root@linuxhelp:~/spiderfoot-2.6.1# ls cache Dockerfile dyn ext LICENSE LICENSE.tp modules README.md sfdb.py sflib.py sf.py sfscan.py sfwebui.py static THANKYOU VERSION root@linuxhelp:~/spiderfoot-2.6.1# ./sf.py Starting web server at http://127.0.0.1:5001 ... ************************************************************* Use SpiderFoot by starting your web browser of choice and browse to http://127.0.0.1:5001 ************************************************************* [28/Jul/2016:09:48:28] ENGINE Listening for SIGHUP. [28/Jul/2016:09:48:28] ENGINE Listening for SIGTERM. [28/Jul/2016:09:48:28] ENGINE Listening for SIGUSR1. [28/Jul/2016:09:48:28] ENGINE Bus STARTING [28/Jul/2016:09:48:28] ENGINE Started monitor thread ' _TimeoutMonitor' . [28/Jul/2016:09:48:28] ENGINE Serving on http://127.0.0.1:5001 [28/Jul/2016:09:48:28] ENGINE Bus STARTED
Open the browser and navigate to http://< IP_address> :5001
Click New Scan to start a scan.
Enter the scan name and target server and then click Run Scan.
To view the status of the scan click Status tab.
IP Address
Malicious IP Address
Open TCP Port
Open TCP Port Banner
Raw Data from RIRs
Click Browse to see all Data Elements.
To view the Log, click log tab
Comments ( 0 )
No comments available