Skip to content

Commit

Permalink
Fix inline documentation in kisreport and kiscollect
Browse files Browse the repository at this point in the history
  • Loading branch information
chopicalqui committed Aug 29, 2021
1 parent 090495b commit 47d977a
Show file tree
Hide file tree
Showing 2 changed files with 14 additions and 12 deletions.
14 changes: 7 additions & 7 deletions kis/kiscollect.py
Original file line number Diff line number Diff line change
Expand Up @@ -87,8 +87,8 @@
review collected domain information and eventually add additional second-level domains and sub-domains in scope
$ sudo docker-compose run kaliintelsuite kisreport domain -w $ws --csv --scope outside | \
csvcut -c "Second-Level Domain (SLD)","Scope (SLD)","Companies (SLD)" | \
csvsort -c "Second-Level Domain (SLD)" | csvlook
csvcut -c "Second-Level Domain (SLD)","Scope (SLD)","Companies (SLD)" | \
csvsort -c "Second-Level Domain (SLD)" | csvlook
$ domains=
$ sudo docker-compose run kaliintelsuite kismanage domain -w $ws -s {all,strict} $domains
$ hostnames=
Expand Down Expand Up @@ -167,8 +167,8 @@
review collected domain information and eventually add domains in scope
$ sudo docker-compose run kaliintelsuite kisre--httpburpsuitepro port domain -w $ws --csv --scope outside | \
csvcut -c "Second-Level Domain (SLD)","Scope (SLD)","Companies (SLD)" | \
csvsort -c "Second-Level Domain (SLD)" | csvlook
csvcut -c "Second-Level Domain (SLD)","Scope (SLD)","Companies (SLD)" | \
csvsort -c "Second-Level Domain (SLD)" | csvlook
$ domains=
$ sudo docker-compose run kaliintelsuite kismanage domain -w $ws -s {all,strict} $domains
Expand All @@ -183,8 +183,8 @@
--vncnmap --x11nmap --httpburpsuitepro --vhost domain --autostart
collect screenshots with aquatone
$ sudo docker-compose run kaliintelsuite kisreport path -w $ws --scope within --type Http --csv | \
csvcut -c "Full Path" | grep -v "Full Path" | aquatone -out aquatone
$ sudo docker-compose run kaliintelsuite kisreport path -w $ws --scope within --type http --csv | \
csvcut -c "Full Path" | grep -v "Full Path" | aquatone -out aquatone
export collected information into microsoft excel
$ sudo docker-compose run kaliintelsuite kisreport excel /kis/kis-scan-results.xlsx -w $ws
Expand Down Expand Up @@ -222,7 +222,7 @@
# Find additional domains using dnsgen and massdns
$ sudo docker-compose run kaliintelsuite kisreport domain -w $ws --csv --scope within | \
csvcut -c "Host Name (HN)" | sort -u | dnsgen - | massdns -r /opt/lazydns/resolvers.txt -c 5 -t A -o S --flush 2> /dev/null
csvcut -c "Host Name (HN)" | sort -u | dnsgen - | massdns -r /opt/lazydns/resolvers.txt -c 5 -t A -o S --flush 2> /dev/null
# At the end, do final DNS lookup to ensure that all collected host names are resolved. This ensures that the data is
# complete for the final report
Expand Down
12 changes: 7 additions & 5 deletions kis/kisreport.py
Original file line number Diff line number Diff line change
Expand Up @@ -61,12 +61,14 @@
workspace $ws. the returned list could be used as input for other
external intelligence gathering tools
$ sudo docker-compose run kaliintelsuite kisreport domain -w $ws --csv --scope within | csvcut -c "Host Name"
$ sudo docker-compose run kaliintelsuite kisreport domain -w $ws --csv --scope within | csvcut -c "Host Name (HN)" \
| csvlook | sort -u
alternatively, you could query all second-level domains from workspace
$ws to identify those domains that are relevant for the assessment.
$ws to manually identify those domains that are relevant for the assessment.
$ sudo docker-compose run kaliintelsuite kisreport domain -w $ws --csv | csvcut -c "Second-Level Domain"
$ sudo docker-compose run kaliintelsuite kisreport domain -w $ws --csv | csvcut -c "Second-Level Domain (SLD)" \
| csvlook | sort -u
the relevant domains can then be set in-scope using the script kismanage.
after setting them in-scope, it is possible to perform active intelligence
Expand All @@ -81,8 +83,8 @@
the following command returns a unique list of URLs, which could be used as
input for other external intelligence gathering tools (e.g., aquatone)
$ sudo docker-compose run kaliintelsuite kisreport path -w $ws --scope within --type Http --csv | \
csvcut -H -c 15 | sed -e 's/^"//' -e 's/"$//' | sort -u
$ sudo docker-compose run kaliintelsuite kisreport path -w $ws --scope within --type http --csv | \
csvcut -c "Full Path" | grep -v "Full Path"
- IV. obtain all hosts/services where the collector http was executed
Expand Down

0 comments on commit 47d977a

Please sign in to comment.