diff --git a/README.md b/README.md index 7b4d9c8..d7ea47f 100644 --- a/README.md +++ b/README.md @@ -76,7 +76,7 @@ Detail information File Reconnaissance & Juicy Data - subdomain.txt -- Subdomain list < $DOMAIN (Target) - httprobe_subdomain.txt -- Validate Subdomain < subdomain.txt - webanalyzes.txt -- Identify technology scan < httprobe_subdomain.txt -- httpx_status_title.txt -- title+statuscode+lenght < httprobe_subdomain.txt +- httpx_status_title.txt -- title+statuscode+length < httprobe_subdomain.txt - dnsprobe_subdomain.txt -- Subdomain resolv < subdomain.txt - Subdomain_Resolver.txt -- Subdomain resolv (alt) < subdomain.txt - cf-ipresolv.txt -- Cloudflare scan < ip_resolver.txt @@ -91,7 +91,7 @@ Detail information File Reconnaissance & Juicy Data - Passive_Collect_URL_Full.txt -- Full All Url Crawl (WebArchive, CommonCrawl, UrlScanIO) ------------------------------------------------------------------------------------------------------ -- ./screenshots/report-0.html -- Screenshoting report < httprobe_subdomain.txt +- ./screenshots/report-0.html -- Screenshotting report < httprobe_subdomain.txt - ./screenshots/gowitness/gowitness.sqlite3 -- Database screenshot < httprobe_subdomain.txt ------------------------------------------------------------------------------------------------------ @@ -110,7 +110,7 @@ Detail information File Reconnaissance & Juicy Data - ./takeover/CNAME-resolv.txt -- CNAME Resolver < subdomain.txt - ./takeover/TakeOver-Lookup.txt -- DNSLookup < CNAME-resolv.txt - ./takeover/TakeOver-nxdomain.txt -- Other 3d service platform < TakeOver-Lookup.txt -- ./takeover/TakeOver.txt -- Checking Vulnerabilty < CNAME-resolv.txt +- ./takeover/TakeOver.txt -- Checking Vulnerability < CNAME-resolv.txt ------------------------------------------------------------------------------------------------------ @@ -269,7 +269,7 @@ Optional Arguments: -aI, --apps-identifier Identify technologies on website (ex: -aI webanalyze) -dP, --db-port Collecting port from 3rd Party default=shodan -eP, --extract-params Collecting URL Parameter from Engine - -tO, --takeover Subdomain TakeOver Vulnerabilty Scanner + -tO, --takeover Subdomain TakeOver Vulnerability Scanner -wS, --websocket WebSocket Connection Check -cF, --cloudfare Check an IP is Owned by Cloudflare -pS, --ping-sweep Check live host using methode Ping Sweep @@ -320,7 +320,7 @@ HTML Report Sample: |![Index](https://user-images.githubusercontent.com/17976841/63597336-6ab6e880-c5e7-11e9-819e-91634e347b0c.PNG)|![f](https://user-images.githubusercontent.com/17976841/63597476-bbc6dc80-c5e7-11e9-8985-6a73348a2e02.PNG)| -To gnereate network graph visualization subdomain & virtualhosts +To generate network graph visualization subdomain & virtualhosts ``` $ sudomy -d hackerone.com -rS --graph ``` diff --git a/doc/README_ID.md b/doc/README_ID.md index 4186eb9..127ddb5 100644 --- a/doc/README_ID.md +++ b/doc/README_ID.md @@ -148,7 +148,7 @@ Optional Arguments: -h, --help show this help message -o, --html Make report output into HTML -s, --source Use source for Enumerate Subdomain - -tO, --takeover Subdomain TakeOver Vulnerabilty Scanner + -tO, --takeover Subdomain TakeOver Vulnerability Scanner -pS, --ping-sweep Check live host using methode Ping Sweep -rS, --resolver Convert domain lists to resolved IP lists without duplicates -sC, --status-code Get status codes, response from domain list diff --git a/doc/README_PT_BR.md b/doc/README_PT_BR.md index 6cf79ba..3e1fb45 100644 --- a/doc/README_PT_BR.md +++ b/doc/README_PT_BR.md @@ -189,7 +189,7 @@ Optional Arguments: -aI, --apps-identifier Identify technologies on websites from domain list -dP, --db-port Collecting port from 3rd Party default=shodan -eP, --extract-params Collecting URL Parameter from Engine - -tO, --takeover Subdomain TakeOver Vulnerabilty Scanner + -tO, --takeover Subdomain TakeOver Vulnerability Scanner -pS, --ping-sweep Check live host using methode Ping Sweep -rS, --resolver Convert domain lists to resolved IP lists without duplicates -sC, --status-code Get status codes, response from domain list diff --git a/sudomy b/sudomy index 4cc015c..64b12a6 100755 --- a/sudomy +++ b/sudomy @@ -33,7 +33,7 @@ goBanner() { echo -e ${RED}"\__ \ || / _ ${YELLOW}/ __ \ ${GREEN} ' \ || |${RESET}" echo -e ${RED}"|___/\_,_\__,_${YELLOW}\____/${GREEN}_|_|_\_, |${RESET}" echo -e ${RED}" ${YELLOW} ${GREEN} |__/${RESET} v{${RED}${VERSION}${RESET}} by ${GREEN}@screetsec ${RESET}" - echo -e "${YELLOW}Sud⍥my ${RESET}- Fast Subdmain Enumeration and Analyzer ${RESET} " + echo -e "${YELLOW}Sud⍥my ${RESET}- Fast Subdomain Enumeration and Analyzer ${RESET} " echo -e "\t http://github.com/screetsec/sudomy\n" } @@ -56,10 +56,10 @@ LGREEN="\033[1;32m" # Light GREEN LBLUE="\033[1;34m" # Light Blue LPURPLE="\033[1;35m" # Light Purple LCYAN="\033[1;36m" # Light Cyan -SORANGE="\033[0;33m" # Standar Orange -SBLUE="\033[0;34m" # Standar Blue -SPURPLE="\033[0;35m" # Standar Purple -SCYAN="\033[0;36m" # Standar Cyan +SORANGE="\033[0;33m" # Standard Orange +SBLUE="\033[0;34m" # Standard Blue +SPURPLE="\033[0;35m" # Standard Purple +SCYAN="\033[0;36m" # Standard Cyan DGRAY="\033[1;30m" # Dark Gray goHelp() { @@ -79,9 +79,9 @@ goHelp() { echo -e "${PADDING}${BOLD}-aI,${RESET} --apps-identifier Identify technologies on website (ex: -aI webanalyze)" echo -e "${PADDING}${BOLD}-dP,${RESET} --db-port\t Collecting port from 3rd Party default=shodan" echo -e "${PADDING}${BOLD}-eP,${RESET} --extract-params\t Collecting URL Parameter from Engine" - echo -e "${PADDING}${BOLD}-tO,${RESET} --takeover\t Subdomain TakeOver Vulnerabilty Scanner" + echo -e "${PADDING}${BOLD}-tO,${RESET} --takeover\t Subdomain TakeOver Vulnerability Scanner" echo -e "${PADDING}${BOLD}-wS,${RESET} --websocket\t WebSocket Connection Check" - echo -e "${PADDING}${BOLD}-cF,${RESET} --cloudfare\t Check an IP is Owned by Cloudflare" + echo -e "${PADDING}${BOLD}-cF,${RESET} --cloudflare\t Check an IP is Owned by Cloudflare" echo -e "${PADDING}${BOLD}-pS,${RESET} --ping-sweep\t Check live host using methode Ping Sweep" echo -e "${PADDING}${BOLD}-rS,${RESET} --resolver\t Convert domain lists to resolved IP lists without duplicates" echo -e "${PADDING}${BOLD}-sC,${RESET} --status-code\t Get status codes, response from domain list" @@ -193,7 +193,7 @@ while [[ "${#}" -gt 0 ]]; do ;; \ - "-cf" | "--cloudfare") + "-cf" | "--cloudflare") PLUGIN_CFCHECK=true shift ;; @@ -1034,7 +1034,7 @@ if [[ ${PLUGIN_PING_SWEEP} == true ]]; then fi # Ddetect virtualhost (several subdomains which resolve to single IP Address -# resolve the collected subdomains to IP addresses, then classify them if several subdomains resolve to single IP addres +# resolve the collected subdomains to IP addresses, then classify them if several subdomains resolve to single IP address if [[ ${PLUGIN_RESOLV_SD} == true ]]; then source ${APP_RESOLVER} @@ -1069,7 +1069,7 @@ if [[ ${PLUGIN_CFCHECK} == true ]]; then fi # Port scanning with top-ports using nmap from domain list -# To run this plugin, rung with argument -cF to check IP Onwed with Cloudfare +# To run this plugin, rung with argument -cF to check IP Owned with Cloudflare # Before perform Active Scanning # For Example sudomy -d example.com -cF -nT if [[ ${PLUGIN_NMAP_PORTS} == true ]]; then @@ -1110,14 +1110,14 @@ fi #Remove Temporary RAW DATA [] #rm -r ${OUT_RAW_WEBARCHIVE} ${OUT_RAW_COMMONCRAWL} ${OUT_RAW_URLSCAN} ${OUT}/${RESULT_EXTRACT_PARAM} > /dev/null 2>&1 -# Subdomain TakeOver Vulnerabilty Scanner +# Subdomain TakeOver Vulnerability Scanner if [[ ${PLUGIN_TAKEOVER} == true ]]; then source ${APP_TAKEOVER} exec_takeover fi # Identify technology on websites -# Run argument -aI / --apps-identifider ( -aI webanalyze / -aI webanalyze,wappalyzer +# Run argument -aI / --apps-identifier ( -aI webanalyze / -aI webanalyze,wappalyzer if [[ ${APPS_IDENTIFIER} == true ]]; then # Default running Apps Identifier (wappalyzer) if [[ -z ${LIST_API} ]]; then @@ -1183,7 +1183,7 @@ fi # Subdomain, IPAddress & Virtualhost (Make Network Graph Mapping) # nGraph for Mapping Results -# Run this argument wirh -rS or this argument will rung that argument to perform +# Run this argument with -rS or this argument will rung that argument to perform if [[ ${PLUGIN_NGRAPH} == true ]]; then if [[ ${PLUGIN_RESOLV_SD} == true ]]; then source ${APP_GRAPH} @@ -1338,14 +1338,14 @@ for i in $(ls "${OUT}/${DATE_LOG}/${DOMAIN}"); do done echo -e "---------------------------------------------\n" -echo -e "If your using the screenshot plugin (gowitness) Remeber to kill the server process when you're done" +echo -e "If your using the screenshot plugin (gowitness) Remember to kill the server process when you're done" echo -e "ps aux | grep gowitness" echo -e "kill -9 " echo -e "---------------------------------------------\n" if [[ $DESTINATION == true ]]; then - echo -e "\n${BOLD}[${LGREEN}+${RESET}${BOLD}]${RESET} Sud⍥my has been sucessfully ${GRENN}completed${RESET}" + echo -e "\n${BOLD}[${LGREEN}+${RESET}${BOLD}]${RESET} Sud⍥my has been successfully ${GRENN}completed${RESET}" echo -e "---------------------------------------------\n" echo -e "${PADDING}${YELLOW}${PADDING}⍥${PADDING}${RESET}Location output: " [[ ! -e "${OUTFILE}/${OUT_NAME}" ]] &&