wgpsec / tig

Threat Intelligence Gathering 威胁情报收集,旨在提高蓝队拿到攻击 IP 后对其进行威胁情报信息收集的效率。
Apache License 2.0
850 stars 138 forks source link

无法正常使用tig #9

Closed capjie closed 3 years ago

capjie commented 3 years ago

报错的内容

Traceback (most recent call last):
  File ".\tig.py", line 655, in <module>
    main(i, config_path, proxies)
  File ".\tig.py", line 413, in main
    IP_reverse2_result = IP_reverse2(ip, proxies)
  File ".\tig.py", line 238, in IP_reverse2
    for ip in r.json():
  File "D:\python37\lib\site-packages\requests\models.py", line 898, in json
    return complexjson.loads(self.text, **kwargs)
  File "D:\python37\lib\json\__init__.py", line 348, in loads
    return _default_decoder.decode(s)
  File "D:\python37\lib\json\decoder.py", line 337, in decode
    obj, end = self.raw_decode(s, idx=_w(s, 0).end())
  File "D:\python37\lib\json\decoder.py", line 355, in raw_decode
    raise JSONDecodeError("Expecting value", s, err.value) from None
json.decoder.JSONDecodeError: Expecting value: line 1 column 1 (char 0)

image

keac commented 3 years ago

请问输入的是什么内容,fofa是否高级会员

capjie commented 3 years ago

没有使用fofa,只是使用了微步的API。输入的内容是批量查询IP并输出xlsx文件。 python .\tig.py -f .\ip\IP2.txt -o ip2.xlsx

capjie commented 3 years ago

并且只是查询IP也会报错,这是我的配置文件: [Api Config]


# 微步威胁情报查询,查看 api 地址:https://x.threatbook.cn/nodev4/vb4/myAPI(每天 50 次的免费额度)
ThreatBook_api = '马赛克'

# Fofa ip 信息查询,查看 api 地址:https://fofa.so/personalData(付费,普通会员每次100条,高级会员每次10000条)
Fofa_email = ''
Fofa_api = ''
# 360威胁情报中心Cookie (暂无API支持)
ti360_cookie = '
```'
capjie commented 3 years ago

好吧,需要再配置FOFA的api和email