Friday, July 8, 2022

✳️ Fav-Up : IP Lookup By Favicon Using Shodan

 

Kali Linux Hackingz

HomeNetworking toolsFav-Up : IP Lookup By Favicon Using Shodan

Fav-Up : IP Lookup By Favicon Using Shodan

ADMINJUNE 05, 2021

 Fav-Up is a tool used for lookups for real IP starting from the favicon icon and using Shodan.






Installation


pip3 install -r requirements.txt


Shodan API key (not the free one)


Usage


CLI


First define how you pass the API key:


-k or --key to pass the key to the stdin

-kf or --key-file to pass the filename which get the key from

-sc or --shodan-cli to get the key from Shodan CLI (if you initialized it)

As of now, this tool can be used in three different ways


-ff or --favicon-file: you store locally a favicon icon which you want to lookup

-fu or --favicon-url: you don’t store locally the favicon icon, but you know the exact url where it resides

-w or --web: you don’t know the URL of the favicon icon, but you still know that’s there

-fh or --favicon-hash: you know the hash and want to search the entire internet.

You can specify input files which may contain urls to domain, to favicon icons, or simply locations of locally stored icons:


-fl, --favicon-list: the file contains the full path of all the icons which you want to lookup

-ul, --url-list: the file contains the full URL of all the icons which you want to lookup

-wl, --web-list: the contains all the domains which you want to lookup

You can also save the results to a CSV/JSON file:


-o, --output: specify the output and the format, e.g.: results.csv will save to a CSV file (the type is automatically recognized by the extension of the output file)


Examples


Favicon-file

python3 favUp.py –favicon-file favicon.ico -sc


Favicon-url

python3 favUp.py –favicon-url https://domain.behind.cloudflare/assets/favicon.ico -sc


Web

python3 favUp.py –web domain.behind.cloudflare -sc


Module


from favUp import FavUp

f = FavUp()

f.shodanCLI = True

f.web = “domain.behind.cloudflare”

f.show = True

f.run()

for result in f.faviconsList:

print(f”Real-IP: {result[‘found_ips’]}”)

print(f”Hash: {result[‘favhash’]}”)


All Attributes


Variable Type

FavUp.show bool

FavUp.key str

FavUp.keyFile str

FavUp.shodanCLI bool

FavUp.faviconFile str

FavUp.faviconURL str

FavUp.web str

FavUp.shodan Shodan class

FavUp.faviconsList list[dict]

FavUp.faviconsList stores all the results, the key fields depend by the type of the lookup you want to do.


In case of –favicon-file or –favicon-list:

favhash stores the hash of the favicon icon

file stores the path

In case of –favicon-url or –url-list:

favhash stores the hash of the favicon icon

url stores the URL of the favicon icon

domain stores the domain name

maskIP stores the “fake” IP (e.g. the Cloudflare one)

maskISP store the ISP name associated to the maskIP

In case of –web or –web-list:

favhash stores the hash of the favicon icon

domain stores the domain name

maskIP stores the “fake” IP (e.g. the Cloudflare one)

maskISP store the ISP name associated to the maskIP

(in this case the URL of the favicon icon is returned by the href attribute of HTML element)


If, while searching for the favicon icon, nothing useful is found, not-found will be returned.


In all three cases, found_ips field is added for every checked entry. If no IP(s) have been found, not-found will be


Compatibility


At least python3.6 is required due to spicy syntax.


Disclaimer


This tool is for educational purposes only. The authors and contributors don’t take any responsibility for the misuse of this tool. Use It At Your Own Risk!


Download

Tags

Kali linux toolsNetworking tools

YOU MAY LIKE THESE POSTS

Modlishka : A Flexible And Powerful Reverse Proxy Tool

Modlishka : A Flexible And Powerful Reverse Proxy Tool

JUNE 08, 2021

SlackPirate : Slack Enumeration & Extraction Tool

SlackPirate : Slack Enumeration & Extraction Tool

JUNE 07, 2021

OverRide : Binary Exploitation And Reverse-Engineering

OverRide : Binary Exploitation And Reverse-Engineering

JUNE 07, 2021

POPULAR POSTS

Password Cracking with Medusa in Linux

Password Cracking with Medusa in Linux

JUNE 05, 2021

3 Ways to Crack Wifi using Pyrit, oclHashcat and Cowpatty

3 Ways to Crack Wifi using Pyrit, oclHashcat and Cowpatty

JUNE 03, 2021

Modlishka : A Flexible And Powerful Reverse Proxy Tool

Modlishka : A Flexible And Powerful Reverse Proxy Tool

JUNE 08, 2021

LABELS

Binary Exploitation

Cafe Business

CTF

Cybersecurity

Digital Forensic Tools

Dork Tools

Information Gathering Tools

Kali Linux Tools

Networking Tools

Password Cracking Tools

Pentest Tools

Phishing Tools

Post Exploitation

Powershell

Reverse Engineering Tools

Reverse Shell

Social Engineering Tools

Uac

Vulnerability Analysis

Web Tools

Wifi Tools

Windows Hacking

COPYRIGHT (C) 2020 KALILINUXHACKINGZ ALL RIGHT RESEVED


CREATED BY EAADHAR | DISTRIBUTED BY BLOGGER THEME








0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home