Kiterunner:一款功能强大的上下文感知型内容搜索工具 – 作者:Alpha_h4ck

图片[1]-Kiterunner:一款功能强大的上下文感知型内容搜索工具 – 作者:Alpha_h4ck-安全小百科

关于Kiterunner

长期以来,跟“内容搜索”相关的技术一直都是基于文件和文件夹查找来实现的。虽然这种方法对于托管静态文件或响应文件路径的Web服务器来说是有效的,但对于现代Web应用程序来说,这种方法的有效性就没那么高了,尤其是那些使用了API来实现功能的Web应用程序。

随着时间的推移,越来越多的研究人员开始投身于加快内容发现工具的开发上,以便使用更大型的字典,但这种方式仍然没有本质上的革新。

Kiterunner这款工具不仅能够以闪电般的速度执行传统的内容扫描技术,而且还能够在现代应用程序中爆破路由或节点。

现代应用程序框架,例如Flask、Rails、Express、Django等,都遵循显式定义路由的范式,路由需要特定的HTTP方法、头、参数和值。当使用传统的内容发现工具时,这样的路由常常会被遗漏,而且很难被发现。

通过整理Swagger规范的数据集并将其压缩到我们自己的模式中,Kiterunner可以使用此数据集,并通过为它发送的每个请求发送正确的HTTP方法、头、路径、参数和值来爆破API节点。

工具安装

下载Release版本

广大研究人员可以直接点击【这里】下载该工具的预编译拷贝。

源码构建

首先,我们需要使用下列命令将该项目源码克隆至本地:

git clone https://github.com/assetnote/kiterunner.git

接下来,构建源码:

make build

设置代码符号链接:

ln -s $(pwd)/dist/kr /usr/local/bin/kr

编译字典:

kr kb compile routes.json routes.kite

执行扫描:

kr scan hosts.txt -w routes.kite -x 20 -j 100 --ignore-length=1053

JSON格式数据集

rootes-large.json(压缩后118MB,解压后2.6GB)

rootes-small.json(压缩后14MB,解压后228MB)

或者,我们也可以直接下载.kite文件:

routes-large.kite(压缩后40MB,解压后182MB)

routes-small.kite(压缩后2MB,解压后35MB)

工具使用

快速扫描

其中的<imput>可以是一个文件、域名或者URI:

kr [scan|brute] <input> [flags]

有一个待扫描主机的列表,但是没有字典:

kr scan hosts.txt -A=apiroutes-210328:20000 -x 5 -j 100 --fail-status-codes 400,401,404,403,501,502,426,411

有自己的字典:

kr scan target.com -w routes.kite -A=apiroutes-210328:20000 -x 20 -j 1 --fail-status-codes 400,401,404,403,501,502,426,411

使用前20000个单词进行常规爆破:

kr brute https://target.com/subapp/ -A=aspx-210328:20000 -x 20 -j 1

使用目录搜索风格的字典和%EXT%结合扫描:

kr brute https://target.com/subapp/ -w dirsearch.txt -x 20 -j 1 -exml,asp,aspx,ashx -D

命令行选项

Usage:

  kite scan [flags]

 

Flags:

  -A, --assetnote-wordlist strings    use the wordlists from wordlist.assetnote.io. specify the type/name to use, e.g. apiroutes-210228. You can specify an additional maxlength to use only the first N values in the wordlist, e.g. apiroutes-210228;20000 will only use the first 20000 lines in that wordlist

      --blacklist-domain strings      domains that are blacklisted for redirects. We will not follow redirects to these domains

      --delay duration                delay to place inbetween requests to a single host

      --disable-precheck              whether to skip host discovery

      --fail-status-codes ints        which status codes blacklist as fail. if this is set, this will override success-status-codes

      --filter-api strings            only scan apis matching this ksuid

      --force-method string           whether to ignore the methods specified in the ogl file and force this method

  -H, --header strings                headers to add to requests (default [x-forwarded-for: 127.0.0.1])

  -h, --help                          help for scan

      --ignore-length strings         a range of content length bytes to ignore. you can have multiple. e.g. 100-105 or 1234 or 123,34-53. This is inclusive on both ends

      --kitebuilder-full-scan         perform a full scan without first performing a phase scan.

  -w, --kitebuilder-list strings      ogl wordlist to use for scanning

  -x, --max-connection-per-host int   max connections to a single host (default 3)

  -j, --max-parallel-hosts int        max number of concurrent hosts to scan at once (default 50)

      --max-redirects int             maximum number of redirects to follow (default 3)

  -d, --preflight-depth int           when performing preflight checks, what directory depth do we attempt to check. 0 means that only the docroot is checked (default 1)

      --profile-name string           name for profile output file

      --progress                      a progress bar while scanning. by default enabled only on Stderr (default true)

      --quarantine-threshold int      if the host return N consecutive hits, we quarantine the host as wildcard. Set to 0 to disable (default 10)

      --success-status-codes ints     which status codes whitelist as success. this is the default mode

  -t, --timeout duration              timeout to use on all requests (default 3s)

      --user-agent string             user agent to use for requests (default "Chrome. Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.96 Safari/537.36")

      --wildcard-detection            can be set to false to disable wildcard redirect detection (default true)

 

Global Flags:

      --config string    config file (default is $HOME/.kiterunner.yaml)

  -o, --output string    output format. can be json,text,pretty (default "pretty")

  -q, --quiet            quiet mode. will mute unecessarry pretty text

  -v, --verbose string   level of logging verbosity. can be error,info,debug,trace (default "info")

爆破选项

bruteforce flags (all the flags above +)

 

  -D, --dirsearch-compat              this will replace %EXT% with the extensions provided. backwards compat with dirsearch because shubs loves him some dirsearch

  -e, --extensions strings            extensions to append while scanning

  -w, --wordlist strings              normal wordlist to use for scanning

API扫描

扫描单个目标:

kr scan https://target.com:8443/ -w routes.kite -A=apiroutes-210228:20000 -x 10 --ignore-length=34

扫描单个目标,并尝试http和https:

kr scan target.com -w routes.kite -A=apiroutes-210228:20000 -x 10 --ignore-length=34

扫描目标列表:

kr scan targets.txt -w routes.kite -A=apiroutes-210228:20000 -x 10 --ignore-length=34

项目地址

Kiterunner:【GitHub传送门

来源:freebuf.com 2021-05-13 17:39:17 by: Alpha_h4ck

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享
评论 抢沙发

请登录后发表评论