今天為大家介紹一個基於 Python 開發的開源神器 - Argus,它能讓你的安全評估工作事半功倍。
https://github.com/jasonxtn/Argus
⚙️ Installation ⚙️安裝
To get started with Argus, follow these simple steps:
要開始使用 Argus,請按照以下簡單步驟操作:
git clone https://github.com/jasonxtn/argus.git
cd argus
pip install -r requirements.txt
Once installed, you can launch Argus with:
安裝後,您可以使用以下命令啟動 Argus:
python argus.py
📖 Usage 📖 用法
Argus offers a rich collection of tools categorized into three main areas:
阿格斯提供豐富的工具集,分為三個主要領域:
Network & Infrastructure Tools
網絡和基礎設施工具
These tools help you gather data about a network, uncovering vital details about servers, IP addresses, DNS records, and more:
這些工具可幫助您收集有關網絡的數據,揭示有關伺服器、IP 地址、DNS 記錄等的重要詳細信息:
Associated Hosts: Discover domains associated with the target.
關聯主機:發現與目標關聯的域。
DNS Over HTTPS: Resolve DNS securely via encrypted channels.
DNS Over HTTPS :通過加密通道安全地解析 DNS。
DNS Records: Collect DNS records, including A, AAAA, MX, etc.
DNS 記錄:收集 DNS 記錄,包括 A、AAAA、MX 等。
DNSSEC Check: Verify if DNSSEC is properly configured.
DNSSEC 檢查:驗證 DNSSEC 是否配置正確。
Domain Info: Gather information such as registrar details and expiry dates.
域名信息:收集註冊商詳細信息和到期日期等信息。
Domain Reputation Check: Check domain trustworthiness using various reputation sources.
域信譽檢查:使用各種信譽源檢查域的可信度。
IP Info: Retrieve geographic and ownership details of an IP address.
IP 信息:檢索 IP 地址的地理和所有權詳細信息。
Open Ports Scan: Scan the target for open ports and services.
開放端口掃描:掃描目標的開放端口和服務。
Server Info: Extract key server details using various techniques.
伺服器信息:使用各種技術提取關鍵伺服器詳細信息。
Server Location: Identify the physical location of the server.
伺服器位置:標識伺服器的物理位置。
SSL Chain Analysis: Analyze the SSL certificate chain for trustworthiness.
SSL 鏈分析:分析 SSL 證書鏈的可信度。
SSL Expiry Alert: Check SSL certificates for upcoming expiry.
SSL 到期警報:檢查 SSL 證書是否即將到期。
TLS Cipher Suites: List the supported TLS ciphers on the server.
TLS 密碼套件:列出伺服器上支持的 TLS 密碼。
TLS Handshake Simulation: Simulate a TLS handshake to check for security issues.
TLS 握手模擬:模擬 TLS 握手以檢查安全問題。
Traceroute: Trace the path packets take to reach the target.
Traceroute :跟踪數據包到達目標的路徑。
TXT Records: Fetch TXT records, often used for verification purposes.
TXT 記錄:獲取 TXT 記錄,通常用於驗證目的。
WHOIS Lookup: Perform WHOIS queries to gather domain ownership details.
WHOIS 查找:執行 WHOIS 查詢以收集域所有權詳細信息。
Zone Transfer: Attempt to perform DNS zone transfers.
區域傳輸:嘗試執行 DNS 區域傳輸。
HTTP/2 and HTTP/3 Support Checker: Check if the server supports HTTP/2 and HTTP/3.
HTTP/2 和 HTTP/3 支持檢查器:檢查伺服器是否支持 HTTP/2 和 HTTP/3。
Web Application Analysis Tools
Web 應用程序分析工具
These modules focus on understanding the structure and security of web applications:
這些模塊側重於了解 Web 應用程序的結構和安全性:
Archive History: View the target's history using internet archives.
存檔歷史記錄:使用互聯網存檔查看目標的歷史記錄。
Broken Links Detection: Find broken links that may lead to user frustration or security gaps.
損壞鏈接檢測:查找可能導致用戶沮喪或安全漏洞的損壞鏈接。
Carbon Footprint: Evaluate the environmental impact of a website.
碳足跡:評估網站對環境的影響。
CMS Detection: Detect the type of CMS used, like WordPress, Joomla, etc.
CMS 檢測:檢測所使用的 CMS 類型,如 WordPress、Joomla 等。
Cookies Analyzer: Analyze cookies for secure attributes and potential privacy issues.
Cookies 分析器:分析 cookie 的安全屬性和潛在的隱私問題。
Content Discovery: Discover hidden directories, files, and endpoints.
內容發現:發現隱藏的目錄、文件和端點。
Crawler: Crawl the site to uncover data and map out its structure.
爬蟲:爬行站點以發現數據並繪製其結構。
Robots.txt Analyzer: Analyze the robots.txt file for hidden resources.
Robots.txt 分析器:分析 robots.txt 文件中的隱藏資源。
Directory Finder: Look for directories that may not be indexed publicly.
目錄查找器:查找可能未公開索引的目錄。
Email Harvesting: Extract email addresses from the target domain.
電子郵件收集:從目標域中提取電子郵件地址。
Performance Monitoring: Monitor the website's response time and load performance.
性能監控:監控網站的響應時間和負載性能。
Quality Metrics: Assess the quality of the site's content and user experience.
質量指標:評估網站內容和用戶體驗的質量。
Redirect Chain: Follow redirects to analyze if they're safe or malicious.
重定向鏈:跟踪重定向來分析它們是安全的還是惡意的。
Sitemap Parsing: Extract URLs from the site's sitemap.
站點地圖解析:從站點的站點地圖中提取 URL。
Social Media Presence Scan: Analyze the social media profiles linked to the target.
社交媒體存在掃描:分析與目標鏈接的社交媒體配置文件。
Technology Stack Detection: Identify the technologies and frameworks the site uses.
技術堆棧檢測:識別網站使用的技術和框架。
Third-Party Integrations: Discover any third-party services integrated into the site.
第三方集成:發現集成到站點中的任何第三方服務。
Security & Threat Intelligence Tools
安全和威脅情報工具
The security modules in Argus are designed to assess the target's defenses and gather threat intelligence:
Argus 中的安全模塊旨在評估目標的防禦並收集威脅情報:
Censys Reconnaissance: Use Censys for in-depth details about the target's assets.
Censys 侦察:使用 Censys 獲取有關目標資產的深入詳細信息。
Certificate Authority Recon: Examine the certificate authority details.
證書頒發機構侦察:檢查證書頒發機構詳細信息。
Data Leak Detection: Check for potential data leaks and sensitive data exposure.
數據洩漏檢測:檢查潛在的數據洩漏和敏感數據暴露。
Exposed Environment Files Checker: Identify publicly exposed .env files.
暴露的環境文件檢查器:識別公開暴露的.env 文件。
Firewall Detection: Identify whether a firewall or WAF is protecting the target.
防火牆檢測:識別防火牆或 WAF 是否正在保護目標。
Global Ranking: Look up the site's global ranking to gauge its popularity.
全球排名:查看網站的全球排名以衡量其受歡迎程度。
HTTP Headers: Extract and evaluate HTTP response headers.
HTTP headers :提取並評估 HTTP 響應標頭。
HTTP Security Features: Check for secure HTTP headers such as HSTS, CSP, etc.
HTTP 安全功能:檢查安全 HTTP 標頭,例如 HSTS、CSP 等。
Malware & Phishing Check: Scan the site for signs of malware and phishing risks.
惡意軟件和網絡釣魚檢查:掃描網站是否存在惡意軟件和網絡釣魚風險的跡象。
Pastebin Monitoring: Search paste sites for leaks associated with the target.
Pastebin 監控:搜索粘貼站點以查找與目標相關的洩漏。
Privacy & GDPR Compliance: Verify compliance with GDPR and other privacy regulations.
隱私和 GDPR 合規性:驗證是否符合 GDPR 和其他隱私法規。
Security.txt Check: Locate and analyze the security.txt file for vulnerability disclosure policies.
Security.txt 檢查:查找並分析 security.txt 文件以了解漏洞披露策略。
Shodan Reconnaissance: Use Shodan to discover open ports, services, and vulnerabilities.
Shodan 侦察:使用 Shodan 發現開放端口、服務和漏洞。
SSL Labs Report: Get a detailed SSL/TLS assessment via SSL Labs.
SSL 實驗室報告:通過 SSL 實驗室獲取詳細的 SSL/TLS 評估。
SSL Pinning Check: Check if SSL pinning is implemented on the site.
SSL Pinning 檢查:檢查站點上是否實施了 SSL pinning。
Subdomain Enumeration: Discover subdomains of the target domain.
子域枚舉:發現目標域的子域。
Subdomain Takeover: Test whether subdomains are vulnerable to takeover.
子域接管:測試子域是否容易被接管。
VirusTotal Scan: Check the target's reputation using VirusTotal.
VirusTotal 掃描:使用 VirusTotal 檢查目標的聲譽。
How to Use Argus 如何使用阿古斯
Launch Argus from the command line.
從命令行啟動 Argus。
Enter the tool number you want to use from the main menu.
從主菜單輸入您要使用的工具編號。
Follow the prompts to enter relevant information.
按照提示輸入相關信息。
Review the results and adjust your strategy accordingly.
查看結果並相應調整您的策略。
Example Command: 命令示例:
root@argus:~# 1
This command initiates the Associated Hosts tool.
此命令啟動關聯主機工具。