koutto / jok3r

Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
https://www.jok3r-framework.com
Other
1.03k stars 250 forks source link

[enhancement] Import targets from Shodan #14

Closed cyrinux closed 5 years ago

cyrinux commented 5 years ago

Do you think it can be usefull to do the recon with shodan? In fast mode this will do noise directly so useless but if in interactive before going further this can help?

koutto commented 5 years ago

I think OSINT checks that are more based on a domain/host should not be included inside the checks because Jok3r is designed to be oriented on testing services that have already been discovered by other means. There are still a lot of tools for performing and automating OSINT.

But at one moment, I was wondering about adding Shodan as a source for importing targets, like we can aready do with Nmap by running the command nmap in db. Maybe, adding a command shodan that would request Shodan to retrieve targets based on IP(s) or keywords might be a cool feature. I let that open as a possible enhancement !

cyrinux commented 5 years ago

I take this point, i try at least.

cyrinux commented 5 years ago

I got a first version working, command "shodan IP", i try do shodan_api_key option to store api_key in the database before opening PR. edit: I open the PR if you want give an eye. I don't know/understand yet how/where to store the api_key.

cyrinux commented 5 years ago

https://github.com/koutto/jok3r/pull/20