emo-crab/observer_ward
Fork: 135 Star: 1258 (更新于 2024-11-08 18:21:31)
license: GPL-3.0
Language: Rust .
侦查守卫(observer_ward)Web应用和服务指纹识别工具
最后发布版本: v2024.8.16 ( 2024-08-16 14:28:44)
关于这个项目
- 郑重声明:文中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途以及盈利等目的,否则后果自行承担。
类别 | 说明 |
---|---|
作者 | 三米前有蕉皮 |
团队 | 0x727 未来一段时间将陆续开源工具 |
定位 | 社区化指纹库识别工具。 |
语言 | Rust |
功能 | 服务和Web应用指纹识别工具 |
安装
源码安装
- 从源码编译安装,更多可以查看github的action工作流文件 workflow
cargo build --release --manifest-path=observer_ward/Cargo.toml
二进制安装
- 从发布页面下载 release
- 如果是Mac系统可以通过brew安装
使用Mac系统brew安装
brew install observer_ward
Docker镜像
- docker镜像,
observer_ward
只有指纹识别功能
➜ docker run --rm -it kaliteam/observer_ward -t http://172.17.0.2
[INFO ] probes loaded: 2223
[INFO ] optimized probes: 7
[INFO ] target loaded: 1
|_uri:[ http://172.17.0.2/ [apache-http] <> (200 OK) ]
|_uri:[ http://172.17.0.2/ [thinkphp] <> (200 OK) ]
-
kaliteam/observer_ward:nuclei
是内置nuclei,在默认配置文件夹有plugins
目录,但是更新时间不会最新了,是构建docker时的版本
➜ docker run --rm -it kaliteam/observer_ward:nuclei -t http://172.17.0.2 --plugin default
[INFO ] probes loaded: 2223
[INFO ] optimized probes: 7
[INFO ] target loaded: 1
|_uri:[ http://172.17.0.2/ [apache-http] <> (200 OK) ]
|_uri:[ http://172.17.0.2/ [thinkphp] <> (200 OK) ]
|_exploitable: [Critical] thinkphp-5023-rce: ThinkPHP 5.0.23 - Remote Code Execution
|_matched_at: http://172.17.0.2/index.php?s=captcha
|_shell: curl -X 'POST' -d '_method=__construct&filter[]=phpinfo&method=get&server[REQUEST_METHOD]=1' -H 'Accept: */*' -H 'Accept-Language: en' -H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.2.1 Safari/605.3.23' 'http://172.17.0.2/index.php?s=captcha'
入门
➜ ~ ./observer_ward -u
➜ ~ ./observer_ward -t http://httpbin.org/
[INFO ] 📇probes loaded: 6183
[INFO ] 🎯target loaded: 1
[INFO ] 🚀optimized probes: 8
🎯:[ http://httpbin.org/ [0example,swagger] <httpbin.org> (200 OK) ]
- 使用帮助
➜ ./observer_ward --help
Usage: observer_ward [-l <list>] [-t <target...>] [-p <probe-path>] [--probe-dir <probe-dir...>] [--ua <ua>] [--mode <mode>] [--timeout <timeout>] [--thread <thread>] [--proxy <proxy>] [--ir] [--ic] [--plugin <plugin>] [-o <output>] [--format <format>] [--no-color] [--nuclei-args <nuclei-args...>] [--silent] [--debug] [--config-dir <config-dir>] [--update-self] [-u] [--update-plugin] [--daemon] [--token <token>] [--webhook <webhook>] [--webhook-auth <webhook-auth>] [--api-server <api-server>]
observer_ward
Options:
-l, --list multiple targets from file path
-t, --target the target (required)
-p, --probe-path customized fingerprint json file path
--probe-dir customized fingerprint yaml file dir
--ua customized ua
--mode mode probes option[tcp,http,all] default: all
--timeout set request timeout.
--thread number of concurrent threads.
--proxy proxy to use for requests
(ex:[http(s)|socks5(h)]://host:port)
--ir include request/response pairs in output
--ic include certificate pairs in output
--plugin customized template dir
-o, --output export to the file
--format output format option[json,csv,txt] default: txt
--no-color disable output content coloring
--nuclei-args poc nuclei engine additional args
--silent silent mode
--debug debug mode
--config-dir customized template dir
--update-self update self
-u, --update-fingerprint
update fingerprint
--update-plugin update plugin
--daemon api background service
--token api Bearer authentication
--webhook send results to webhook server
(ex:https://host:port/webhook)
--webhook-auth the auth will be set to the webhook request header
AUTHORIZATION
--api-server start a web API service (ex:127.0.0.1:8080)
--help display usage information
参数名 | 作用和描述 |
---|---|
-l,--list | 从文件中读取目标列表,一行一个目标 |
-t,--target | 单个或者多个目标 |
-p,--probe | json探针路径(如果和--probe-dir 一起使用,该参数为转换json后的输出文件路径) |
--probe-dir | yaml探针目录(如果和--probe 一起使用,会读取该目录下的全部yaml文件转换为一个json文件) |
--ua | 设置请求头 |
--mode | 模式:safe和danger,safe只请求首页,dranger会请求特殊路径,容易被waf拦截 |
--timeout | 请求和连接超时,单位为秒 |
--thread | 同时识别的线程数,默认为cpu的核数 |
--proxy | 设置代理服务器,支持http和socks5,例如:https://username:password@your-proxy.com:port |
--ir | 在json结果中保存请求和响应,保存请求响应可能比较消耗内存 |
--ic | 在json结果中保存证书数据 |
--plugin | 指定nuclei插件路径,会开启nuclei验证漏洞,如果路径为default 默认调用配置文件夹下的plugins 目录 |
-o,--output | 将结果保存到文件,如果文件后缀名是下面格式支持的可以省略--format 参数 |
--format | 输出格式:支持json ,csv 和txt ,在保存文件的时候会根据文件后缀自动识别 |
--no-color | 禁用颜色输出 |
--nuclei-args | nuclei的额外参数,会按照空格分割追加到调用nuclei参数,例如:-es info ,排除info插件 |
--silent | 静默模式,不打印任何信息,常用在命令行管道作为输入源 |
--debug | 开启调试模式,会输出更多信息,包括请求和响应,提取到的图标哈希,nuclei调用命令行等信息 |
--config-dir | 指定配置文件夹,默认在用户配置文件夹下的observer_ward 目录 |
--update-self | 更新程序自身版本,也就是该项目的defaultv4 发布标签 |
-u,--update-fingerprint | 更新指纹到配置文件夹,会覆盖web_fingerprint_v4.json 文件 |
--update-plugin | 更新社区nuclei插件到配置文件夹,会自动解压zip并且覆盖plugins 目录 |
--daemon | api服务后台运行,window不支持 |
--token | api服务认证token |
--webhook | 要将识别结果通过webhook发送到指定url |
--webhook-auth | webhook的AUTHORIZATION 认证 |
--api-server | api监听地址的端口 |
--help | 打印帮助信息 |
更新指纹库
-
从github下载指纹库,默认只更新web指纹,如果需要加载服务指纹需要自行下载service_fingerprint_v4.json 到配置文件夹。
-
默认不更新服务指纹
➜ ./observer_ward -u
- 默认的指纹文件名有两个
web_fingerprint_v4.json
和service_fingerprint_v4.json
,如果在配置文件夹中存在将会自动加载。 - 例如:
web_fingerprint_v4.json
文件在配置文件夹下的路径
操作系统 | 保存路径 |
---|---|
Windows | C:\Users\Alice\AppData\Roaming\observer_ward\web_fingerprint_v4.json |
Linux | /home/alice/.config/observer_ward/web_fingerprint_v4.json |
macOS | /Users/Alice/Library/Application Support/observer_ward/web_fingerprint_v4.json |
- 指定yaml文件夹
--probe-dir
和单个json文件--probe-path
参数将全部yaml文件转换为一个单json文件,方便携带 - 然后将这个json文件复制到配置文件夹
➜ ./observer_ward --probe-dir web_fingerprint --probe-dir service_fingerprint/null -p fingerprint_v4.json
[INFO ] ℹ️ convert the 6183 yaml file of the probe directory to a json file fingerprint_v4.json
- 例如你可以将
FingerprintHub
项目下的服务指纹中null
探针转换为json文件,并保存到配置文件夹
➜ ~ ./observer_ward --probe-dir FingerprintHub/service-fingerprint/null -p .config/observer_ward/service_fingerprint_v4.json
[INFO ] ℹ️ convert the 3960 yaml file of the probe directory to a json file .config/observer_ward/service_fingerprint_v4.json
调试模式
- 使用
--debug
开启调试模式,可以看到更详细的输出结果
➜ ./observer_ward -t http://httpbin.org -p observer_ward/examples/json.yaml --debug
[INFO ] 📇probes loaded: 1
[INFO ] 🎯target loaded: 1
[INFO ] 🚀optimized probes: 1
[DEBUG] start: http://httpbin.org/
[DEBUG] Request {
uri: http://httpbin.org/ip,
version: HTTP/1.1,
method: GET,
headers: {
"accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8",
"content-type": "application/json",
},
body: None,
raw_request: None,
}
[DEBUG] Response {
version: HTTP/1.1,
uri: http://httpbin.org/ip,
status_code: 200,
headers: {
"date": "Mon, 08 Jul 2024 13:19:59 GMT",
"content-type": "application/json",
"content-length": "32",
"connection": "keep-alive",
"server": "gunicorn/19.9.0",
"access-control-allow-origin": "*",
"access-control-allow-credentials": "true",
},
extensions: Extensions,
body: Some(
{
"origin": "1.1.1.1"
}
,
),
}
[DEBUG] end: http://httpbin.org/
🎯:[ http://httpbin.org/]
🎯:[ http://httpbin.org/ip [httpbin-ip] <>]
|_📰: ip:["1.1.1.1"]
目标输入
- 使用
--target
或者-t
指定一个或者多个uri目标
➜ ~ ./observer_ward -t https://www.example.com/ -t http://httpbin.org
[INFO ] 📇probes loaded: 6183
[INFO ] 🎯target loaded: 2
[INFO ] 🚀optimized probes: 8
🎯:[ https://www.example.com/ <Example Domain> (200 OK) ]
🎯:[ http://httpbin.org/ [0example,swagger] <httpbin.org> (200 OK) ]
- 使用
--list
或者-l
指定一个目标列表文件
➜ ~ ./observer_ward -l target.txt
[INFO ] 📇probes loaded: 6183
[INFO ] 🎯target loaded: 3
[INFO ] 🚀optimized probes: 8
🎯:[ tcp://127.0.0.1:22/ [ssh] <SSH-2.0-OpenSSH_9.7>]
|_📰: version:[9.7] info:[protocol 2.0]
🎯:[ http://172.17.0.2/ [apache-http] <>]
🎯:[ http://172.17.0.2/ [thinkphp] <>]
🎯:[ http://httpbin.org/ [swagger,0example] <httpbin.org> (200 OK) ]
- 从标准输入读取目标
➜ ~ echo http://172.17.0.2 | ./observer_ward
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
🎯:[ http://172.17.0.2/ [apache-http] <>]
🎯:[ http://172.17.0.2/ [thinkphp] <>]
结果输出
- 使用
--output
或者-o
将结果保存到指定文件路径
➜ ~ ./observer_ward -t https://www.example.com/ -o output.txt
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
➜ ~ cat output.txt
🎯:[ https://www.example.com/ <Example Domain> (200 OK) ]
- 如果是保存到文件输出格式会根据文件后缀自动切换,也可以使用
--format
参数指定输出格式,支持:txt
,json
,csv
➜ ~ ./observer_ward -t https://httpbin.org/ -o output.json
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
➜ ~ cat output.json
{"https://httpbin.org/":{"title":["httpbin.org"],"status":200,"favicon":{"https://httpbin.org/static/favicon.ico":{"md5":"3aa2067193b2ed83f24c30bd238a717c","mmh3":"-1296740046"}},"name":["swagger"],"fingerprints":[{"matcher-results":[{"template":"swagger","info":{"name":"swagger","author":"cn-kali-team","tags":"detect,tech,swagger","severity":"info","metadata":{"product":"swagger","vendor":"00_unknown","verified":true}},"matcher-name":["swagger-ui.css"],"extractor":{}}],"matched-at":"https://httpbin.org/"}],"nuclei":{}}}
- 再保存文件的同时也会在终端打印进度信息,如果要想只打印纯结果数据可以使用
--silent
开启静默模式,例如:我只想打印json
格式的数据并输出到jq
➜ ~ ./observer_ward_amd64 -t http://172.17.0.2 --format json --ir --ic --silent |jq
-
其中的
--ir
和--ic
分别为保存结果的请求响应和证书信息 -
使用
--webhook
指定要将结果发送到的服务器url,如果webhook服务器有认证也可以使用--webhook-auth
添加值到Authorization
请求头
from flask import Flask, request
app = Flask(__name__)
@app.route("/webhook", methods=['POST'])
def observer_ward_webhook():
print("Authorization: ", request.headers.get("Authorization"))
print(request.json)
return 'ok'
if __name__ == '__main__':
app.run()
- 例如先在本地启动一个简易webhook服务器
➜ observer_ward git:(main) ✗ python observer_ward/examples/webhook.py
* Serving Flask app 'webhook'
* Debug mode: off
WARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.
* Running on http://127.0.0.1:5000
Press CTRL+C to quit
- 将结果发送到本地webhook服务器:
http://127.0.0.1:5000
,当识别完成后你将可以在webhook服务器接收到结果
➜ ~ ./observer_ward -t http://httpbin.org --webhook http://127.0.0.1:5000/webhook --webhook-auth 22e038328151a7a06fd4ebfa63a10228
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
🎯:[ http://httpbin.org/ [swagger,0example] <httpbin.org> (200 OK) ]
更新nuclei插件
- 使用
--update-plugin
更新nuclei插件到配置文件夹的plugins
目录 - 当然你也可以手动将plugins.zip 下载到配置文件夹并解压
- 注意:每次更新会将原来插件文件夹删除掉再解压,如果你有自己的插件需要单独存放在别的文件夹
集成nuclei验证漏洞
- 开启该功能前先安装最新版的nuclei到系统环境变量,使得程序可以在命令行中正常调用
- 使用
--plugin
指定nuclei的template文件夹开启nuclei,这个plugins
文件夹可以到社区指纹库项目下载 - 当
--plugin
的参数为default
时,默认使用配置文件夹中的plugins
文件夹,也就是使用--update-plugin
下载的插件 - 文件夹结构为
厂商/产品/nuclei的yaml文件
,如果识别到的指纹解析cpe后得到了厂商和产品在这个文件夹可以找到就会调用这个文件夹下面的yaml进行漏洞验证 - 例如:指纹识别到了
tomcat
,通过解析cpe得到厂商为apache
和产品为tomcat
,调用apache/tomcat
文件夹下面的全部yaml验证漏洞
➜ ~ ./observer_ward -t http://172.17.0.2/ --plugin default
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
🎯:[ http://172.17.0.2/ [apache-http] <>]
🎯:[ http://172.17.0.2/ [thinkphp] <>]
|_🐞: [Critical] thinkphp-5023-rce: ThinkPHP 5.0.23 - Remote Code Execution
|_🔥: http://172.17.0.2/index.php?s=captcha
|_🐚: curl -X 'POST' -d '_method=__construct&filter[]=phpinfo&method=get&server[REQUEST_METHOD]=1' -H 'Accept: */*' -H 'Accept-Language: en' -H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Safari/605.1.15 Ddg/17.4' 'http://172.17.0.2/index.php?s=captcha'
开启Web服务
- 使用
--api-server
指定监听IP和端口,--token
设置api的Bearer
认证
➜ ~ ./observer_ward --api-server 127.0.0.1:8000 --token 22e038328151a7a06fd4ebfa63a10228
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🌐API service has been started: http://127.0.0.1:8000/v1/observer_ward
[INFO ] 📔:curl --request POST \
--url http://127.0.0.1:8000/v1/observer_ward \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--json '{"target":["https://httpbin.org/"]}'
[INFO ] 🗳:[result...]
- 使用curl请求api,同时设置
Authorization
参数
➜ ~ curl --request POST \
--url http://127.0.0.1:8000/v1/observer_ward \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--json '{"target":["https://httpbin.org/"]}'
{"https://httpbin.org/":{"title":["httpbin.org"],"status":200,"favicon":{"https://httpbin.org/static/favicon.ico":{"md5":"3aa2067193b2ed83f24c30bd238a717c","mmh3":"-1296740046"}},"name":["swagger"],"fingerprints":[{"matcher-results":[{"template":"swagger","info":{"name":"swagger","author":"cn-kali-team","tags":"detect,tech,swagger","severity":"info","metadata":{"product":"swagger","vendor":"00_unknown","verified":true}},"matcher-name":["swagger-ui.css"],"extractor":{}}],"matched-at":"https://httpbin.org/"}],"nuclei":{}}}
- 通过api获取当前config,这些字段都是可以通过每次的POST请求创建识别任务中配置
➜ ~ curl --request GET \
--url http://127.0.0.1:8000/v1/config \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--header 'Content-Type: application/json'
{"target":[],"ua":"Mozilla/5.0 (X11; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/94.0","timeout":10,"thread":4,"ir":false,"ic":false,"update-fingerprint":false,"update-plugin":false,"webhook":null,"webhook-auth":null}
- 设置
update-plugin
和update-fingerprint
为true
更新指纹库和nuclei的插件库
➜ ~ curl --request POST \
--url http://127.0.0.1:8000/v1/config \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--json '{"target":[],"update-plugin":true,"update-fingerprint":true}'
{"target":[],"ua":"Mozilla/5.0 (X11; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/94.0","timeout":10,"thread":4,"ir":false,"ic":false,"update-fingerprint":true,"update-plugin":true,"webhook":null,"webhook-auth":null
-
如果同时开启了
--webhook
或者提交的任务配置中的webhook
不为空,请求api后会在后台运行任务,结果将通过webhook发送到指定服务器 -
如果不想监听本地端口也可以指定
--api-server
参数为unix-socket文件路径,使用socket over http
➜ ~ ./observer_ward --api-server /tmp/observer_ward.socket
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🌐API service has been started: /tmp/observer_ward.socket
[INFO ] 📔:curl --request POST \
--unix-socket /tmp/observer_ward.socket \
--url http://localhost/v1/observer_ward \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--json '{"target":["https://httpbin.org/"]}'
[INFO ] 🗳:[result...]
提交指纹
- observer_ward使用到的指纹规则全部来自FingerprintHub项目。
- 如果需要获取指纹库和提交指纹规则,请查看FingerprintHub项目。
为observer_ward做贡献
提交代码
- 点击Fork按钮克隆这个项目到你的仓库
git clone git@github.com:你的个人github用户名/observer_ward.git
- 添加上游接收更新
cd observer_ward
git remote add upstream git@github.com:emo-crab/observer_ward.git
git fetch upstream
- 配置你的github个人信息
git config --global user.name "$GITHUB_USERNAME"
git config --global user.email "$GITHUB_EMAIL"
git config --global github.user "$GITHUB_USERNAME"
- 拉取所有分支的规则
git fetch --all
git fetch upstream
-
不要直接在
main
分支上修改,例如我想修改某个bug,创建一个新的分支并切换到新的分支。
git checkout -b dev
- 修改完成后,测试通过
- 跟踪修改和提交Pull-Requests。
git add 你添加或者修改的文件名
git commit -m "添加你的描述"
git push origin dev
- 打开你Fork这个项目的地址,点击与上游合并,等待审核合并代码。
License
Distributed under the GPL-3.0-only
License. See LICENSE
for more information.
Contact
Your Name - @Kali_Team - root@kali-team.cn
Project Link: https://github.com/emo-crab/observer_ward
Acknowledgments
Stargazers over time
最近版本更新:(数据更新于 2024-09-17 11:07:10)
2024-08-16 14:28:44 v2024.8.16
2024-08-15 12:37:58 v2024.8.15
2024-08-07 20:05:56 v2024.8.7
2024-08-06 18:01:26 v2024.8.6
2024-07-31 19:09:22 v2024.7.31
2024-07-25 20:05:38 v2024.7.25
2024-07-23 18:14:27 v2024.7.23
2024-07-22 21:24:38 v2024.7.22
2024-07-20 20:43:46 v2024.7.20
2024-07-19 21:25:09 v2024.7.19
主题(topics):
nmap-vscan, nuclei, nuclei-templates, serivce, wappalyzer, whatweb
emo-crab/observer_ward同语言 Rust最近更新仓库
2024-11-20 07:29:29 lanyeeee/jmcomic-downloader
2024-11-19 23:39:15 gleam-lang/gleam
2024-11-19 08:50:55 lapce/lapce
2024-11-11 22:51:00 tauri-apps/tauri
2024-11-11 07:55:30 dani-garcia/vaultwarden
2024-11-09 16:42:37 rustdesk/rustdesk