2018-12-31 07:32:35 +00:00
|
|
|
#! /usr/bin/env python3
|
|
|
|
|
2018-12-30 20:25:04 +00:00
|
|
|
"""
|
|
|
|
Sherlock: Find Usernames Across Social Networks Module
|
2018-12-27 03:54:25 +00:00
|
|
|
|
|
|
|
This module contains the main logic to search for usernames at social
|
|
|
|
networks.
|
|
|
|
"""
|
2018-12-30 05:10:31 +00:00
|
|
|
|
2024-07-01 02:32:31 +00:00
|
|
|
import sys
|
|
|
|
|
|
|
|
try:
|
2024-07-08 08:56:21 +00:00
|
|
|
from sherlock_project.__init__ import import_error_test_var # noqa: F401
|
2024-07-01 02:32:31 +00:00
|
|
|
except ImportError:
|
|
|
|
print("Did you run Sherlock with `python3 sherlock/sherlock.py ...`?")
|
|
|
|
print("This is an outdated method. Please see https://sherlockproject.xyz/installation for up to date instructions.")
|
|
|
|
sys.exit(1)
|
|
|
|
|
2018-12-31 06:27:54 +00:00
|
|
|
import csv
|
2022-10-01 13:32:34 +00:00
|
|
|
import signal
|
2022-06-08 13:51:06 +00:00
|
|
|
import pandas as pd
|
2018-12-24 14:31:34 +00:00
|
|
|
import os
|
2018-12-27 01:41:11 +00:00
|
|
|
import re
|
2019-01-22 17:55:03 +00:00
|
|
|
from argparse import ArgumentParser, RawDescriptionHelpFormatter
|
2024-07-01 01:01:42 +00:00
|
|
|
from json import loads as json_loads
|
2019-11-29 01:00:23 +00:00
|
|
|
from time import monotonic
|
2018-12-31 06:27:54 +00:00
|
|
|
|
|
|
|
import requests
|
2024-06-29 22:50:24 +00:00
|
|
|
from requests_futures.sessions import FuturesSession
|
2019-01-22 17:55:03 +00:00
|
|
|
|
2024-07-08 08:45:14 +00:00
|
|
|
from sherlock_project.__init__ import (
|
2024-05-18 00:57:37 +00:00
|
|
|
__longname__,
|
2024-07-01 00:45:30 +00:00
|
|
|
__shortname__,
|
|
|
|
__version__,
|
2024-07-08 05:30:32 +00:00
|
|
|
forge_api_latest_release,
|
2024-05-18 00:57:37 +00:00
|
|
|
)
|
|
|
|
|
2024-07-08 08:45:14 +00:00
|
|
|
from sherlock_project.result import QueryStatus
|
|
|
|
from sherlock_project.result import QueryResult
|
|
|
|
from sherlock_project.notify import QueryNotify
|
|
|
|
from sherlock_project.notify import QueryNotifyPrint
|
|
|
|
from sherlock_project.sites import SitesInformation
|
2024-06-29 22:50:24 +00:00
|
|
|
from colorama import init
|
|
|
|
from argparse import ArgumentTypeError
|
2018-12-25 19:19:21 +00:00
|
|
|
|
|
|
|
|
2019-11-29 00:56:26 +00:00
|
|
|
class SherlockFuturesSession(FuturesSession):
|
2022-01-31 10:06:29 +00:00
|
|
|
def request(self, method, url, hooks=None, *args, **kwargs):
|
2019-11-29 00:56:26 +00:00
|
|
|
"""Request URL.
|
|
|
|
|
|
|
|
This extends the FuturesSession request method to calculate a response
|
|
|
|
time metric to each request.
|
|
|
|
|
2021-12-07 11:46:08 +00:00
|
|
|
It is taken (almost) directly from the following Stack Overflow answer:
|
2019-11-29 00:56:26 +00:00
|
|
|
https://github.com/ross/requests-futures#working-in-the-background
|
|
|
|
|
|
|
|
Keyword Arguments:
|
|
|
|
self -- This object.
|
|
|
|
method -- String containing method desired for request.
|
|
|
|
url -- String containing URL for request.
|
|
|
|
hooks -- Dictionary containing hooks to execute after
|
|
|
|
request finishes.
|
|
|
|
args -- Arguments.
|
|
|
|
kwargs -- Keyword arguments.
|
|
|
|
|
|
|
|
Return Value:
|
|
|
|
Request object.
|
|
|
|
"""
|
2020-11-12 18:43:24 +00:00
|
|
|
# Record the start time for the request.
|
2022-01-31 10:06:29 +00:00
|
|
|
if hooks is None:
|
|
|
|
hooks = {}
|
2019-11-29 01:00:23 +00:00
|
|
|
start = monotonic()
|
2019-01-07 03:33:36 +00:00
|
|
|
|
2019-11-29 00:56:26 +00:00
|
|
|
def response_time(resp, *args, **kwargs):
|
2019-11-29 01:16:23 +00:00
|
|
|
"""Response Time Hook.
|
|
|
|
|
|
|
|
Keyword Arguments:
|
|
|
|
resp -- Response object.
|
|
|
|
args -- Arguments.
|
|
|
|
kwargs -- Keyword arguments.
|
|
|
|
|
|
|
|
Return Value:
|
2021-12-10 10:04:08 +00:00
|
|
|
Nothing.
|
2019-11-29 01:16:23 +00:00
|
|
|
"""
|
|
|
|
resp.elapsed = monotonic() - start
|
|
|
|
|
|
|
|
return
|
2019-01-07 03:33:36 +00:00
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Install hook to execute when response completes.
|
|
|
|
# Make sure that the time measurement hook is first, so we will not
|
|
|
|
# track any later hook's execution time.
|
2019-01-07 03:33:36 +00:00
|
|
|
try:
|
2021-12-11 16:34:35 +00:00
|
|
|
if isinstance(hooks["response"], list):
|
|
|
|
hooks["response"].insert(0, response_time)
|
|
|
|
elif isinstance(hooks["response"], tuple):
|
2020-11-12 18:43:24 +00:00
|
|
|
# Convert tuple to list and insert time measurement hook first.
|
2021-12-11 16:34:35 +00:00
|
|
|
hooks["response"] = list(hooks["response"])
|
|
|
|
hooks["response"].insert(0, response_time)
|
2019-01-07 03:33:36 +00:00
|
|
|
else:
|
2020-11-12 18:43:24 +00:00
|
|
|
# Must have previously contained a single hook function,
|
|
|
|
# so convert to list.
|
2021-12-11 16:34:35 +00:00
|
|
|
hooks["response"] = [response_time, hooks["response"]]
|
2019-01-07 03:33:36 +00:00
|
|
|
except KeyError:
|
2020-11-12 18:43:24 +00:00
|
|
|
# No response hook was already defined, so install it ourselves.
|
2021-12-11 16:34:35 +00:00
|
|
|
hooks["response"] = [response_time]
|
2019-01-07 03:33:36 +00:00
|
|
|
|
2023-12-21 10:22:57 +00:00
|
|
|
return super(SherlockFuturesSession, self).request(
|
|
|
|
method, url, hooks=hooks, *args, **kwargs
|
|
|
|
)
|
2019-01-07 03:33:36 +00:00
|
|
|
|
|
|
|
|
2020-04-23 11:58:28 +00:00
|
|
|
def get_response(request_future, error_type, social_network):
|
2020-11-12 18:43:24 +00:00
|
|
|
# Default for Response object if some failure occurs.
|
2019-12-26 20:00:44 +00:00
|
|
|
response = None
|
2019-01-20 18:44:04 +00:00
|
|
|
|
2019-12-26 20:00:44 +00:00
|
|
|
error_context = "General Unknown Error"
|
2022-01-31 10:06:29 +00:00
|
|
|
exception_text = None
|
2018-12-25 16:01:01 +00:00
|
|
|
try:
|
2019-12-26 20:00:44 +00:00
|
|
|
response = request_future.result()
|
|
|
|
if response.status_code:
|
2020-11-12 18:43:24 +00:00
|
|
|
# Status code exists in response object
|
2019-12-26 20:00:44 +00:00
|
|
|
error_context = None
|
2018-12-25 16:01:01 +00:00
|
|
|
except requests.exceptions.HTTPError as errh:
|
2019-12-26 20:00:44 +00:00
|
|
|
error_context = "HTTP Error"
|
2022-01-31 10:06:29 +00:00
|
|
|
exception_text = str(errh)
|
2019-01-20 18:44:04 +00:00
|
|
|
except requests.exceptions.ProxyError as errp:
|
2019-12-26 20:00:44 +00:00
|
|
|
error_context = "Proxy Error"
|
2022-01-31 10:06:29 +00:00
|
|
|
exception_text = str(errp)
|
2018-12-25 16:01:01 +00:00
|
|
|
except requests.exceptions.ConnectionError as errc:
|
2019-12-26 20:00:44 +00:00
|
|
|
error_context = "Error Connecting"
|
2022-01-31 10:06:29 +00:00
|
|
|
exception_text = str(errc)
|
2018-12-25 16:01:01 +00:00
|
|
|
except requests.exceptions.Timeout as errt:
|
2019-12-26 20:00:44 +00:00
|
|
|
error_context = "Timeout Error"
|
2022-01-31 10:06:29 +00:00
|
|
|
exception_text = str(errt)
|
2018-12-25 16:01:01 +00:00
|
|
|
except requests.exceptions.RequestException as err:
|
2019-12-26 20:00:44 +00:00
|
|
|
error_context = "Unknown Error"
|
2022-01-31 10:06:29 +00:00
|
|
|
exception_text = str(err)
|
2019-12-26 20:00:44 +00:00
|
|
|
|
2022-01-31 10:06:29 +00:00
|
|
|
return response, error_context, exception_text
|
2018-12-24 14:31:34 +00:00
|
|
|
|
|
|
|
|
2023-12-21 10:22:57 +00:00
|
|
|
def interpolate_string(input_object, username):
|
|
|
|
if isinstance(input_object, str):
|
|
|
|
return input_object.replace("{}", username)
|
|
|
|
elif isinstance(input_object, dict):
|
|
|
|
return {k: interpolate_string(v, username) for k, v in input_object.items()}
|
|
|
|
elif isinstance(input_object, list):
|
|
|
|
return [interpolate_string(i, username) for i in input_object]
|
|
|
|
return input_object
|
2021-12-06 18:08:49 +00:00
|
|
|
|
|
|
|
|
2023-12-21 10:22:57 +00:00
|
|
|
def check_for_parameter(username):
|
|
|
|
"""checks if {?} exists in the username
|
|
|
|
if exist it means that sherlock is looking for more multiple username"""
|
|
|
|
return "{?}" in username
|
2022-03-31 12:16:57 +00:00
|
|
|
|
2022-04-09 15:31:04 +00:00
|
|
|
|
|
|
|
checksymbols = ["_", "-", "."]
|
|
|
|
|
|
|
|
|
2023-12-21 10:22:57 +00:00
|
|
|
def multiple_usernames(username):
|
|
|
|
"""replace the parameter with with symbols and return a list of usernames"""
|
2022-04-01 14:23:41 +00:00
|
|
|
allUsernames = []
|
|
|
|
for i in checksymbols:
|
|
|
|
allUsernames.append(username.replace("{?}", i))
|
2022-04-09 15:31:04 +00:00
|
|
|
return allUsernames
|
2022-03-31 12:16:57 +00:00
|
|
|
|
|
|
|
|
2023-12-21 10:22:57 +00:00
|
|
|
def sherlock(
|
|
|
|
username,
|
|
|
|
site_data,
|
2024-05-20 08:44:52 +00:00
|
|
|
query_notify: QueryNotify,
|
|
|
|
tor: bool = False,
|
|
|
|
unique_tor: bool = False,
|
2024-07-01 02:16:39 +00:00
|
|
|
dump_response: bool = False,
|
2023-12-21 10:22:57 +00:00
|
|
|
proxy=None,
|
|
|
|
timeout=60,
|
|
|
|
):
|
2018-12-29 04:28:47 +00:00
|
|
|
"""Run Sherlock Analysis.
|
|
|
|
|
|
|
|
Checks for existence of username on various social media sites.
|
2018-12-30 23:46:02 +00:00
|
|
|
|
2018-12-29 04:28:47 +00:00
|
|
|
Keyword Arguments:
|
|
|
|
username -- String indicating username that report
|
|
|
|
should be created against.
|
2019-01-06 04:52:53 +00:00
|
|
|
site_data -- Dictionary containing all of the site data.
|
2020-04-19 20:38:16 +00:00
|
|
|
query_notify -- Object with base type of QueryNotify().
|
|
|
|
This will be used to notify the caller about
|
|
|
|
query results.
|
2018-12-29 14:59:30 +00:00
|
|
|
tor -- Boolean indicating whether to use a tor circuit for the requests.
|
|
|
|
unique_tor -- Boolean indicating whether to use a new tor circuit for each request.
|
2019-01-12 04:55:19 +00:00
|
|
|
proxy -- String indicating the proxy URL
|
2019-12-07 23:24:09 +00:00
|
|
|
timeout -- Time in seconds to wait before timing out request.
|
2022-10-01 22:56:22 +00:00
|
|
|
Default is 60 seconds.
|
2018-12-29 04:28:47 +00:00
|
|
|
|
|
|
|
Return Value:
|
2019-11-26 16:42:06 +00:00
|
|
|
Dictionary containing results from report. Key of dictionary is the name
|
2018-12-29 04:28:47 +00:00
|
|
|
of the social network site, and the value is another dictionary with
|
|
|
|
the following keys:
|
|
|
|
url_main: URL of main site.
|
|
|
|
url_user: URL of user on site (if account exists).
|
2019-12-27 17:12:34 +00:00
|
|
|
status: QueryResult() object indicating results of test for
|
2019-12-27 16:17:10 +00:00
|
|
|
account existence.
|
2018-12-29 04:28:47 +00:00
|
|
|
http_status: HTTP status code of query which checked for existence on
|
|
|
|
site.
|
|
|
|
response_text: Text that came back from request. May be None if
|
|
|
|
there was an HTTP error when checking for existence.
|
|
|
|
"""
|
2020-04-23 11:58:28 +00:00
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Notify caller that we are starting the query.
|
2020-04-23 11:58:28 +00:00
|
|
|
query_notify.start(username)
|
2018-12-30 05:10:31 +00:00
|
|
|
# Create session based on request methodology
|
|
|
|
if tor or unique_tor:
|
2024-07-01 02:49:16 +00:00
|
|
|
try:
|
|
|
|
from torrequest import TorRequest # noqa: E402
|
|
|
|
except ImportError:
|
|
|
|
print("Important!")
|
2024-07-08 08:10:53 +00:00
|
|
|
print("> --tor and --unique-tor are now DEPRECATED, and may be removed in a future release of Sherlock.")
|
2024-07-08 08:56:21 +00:00
|
|
|
print("> If you've installed Sherlock via pip, you can include the optional dependency via `pip install 'sherlock-project[tor]'`.")
|
2024-07-08 08:10:53 +00:00
|
|
|
print("> Other packages should refer to their documentation, or install it separately with `pip install torrequest`.\n")
|
2024-07-01 02:49:16 +00:00
|
|
|
sys.exit(query_notify.finish())
|
|
|
|
|
2024-07-08 08:10:53 +00:00
|
|
|
print("Important!")
|
2024-07-08 08:56:21 +00:00
|
|
|
print("> --tor and --unique-tor are now DEPRECATED, and may be removed in a future release of Sherlock.")
|
2024-07-08 08:10:53 +00:00
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Requests using Tor obfuscation
|
2024-03-01 12:45:28 +00:00
|
|
|
try:
|
|
|
|
underlying_request = TorRequest()
|
|
|
|
except OSError:
|
2024-05-13 05:07:17 +00:00
|
|
|
print("Tor not found in system path. Unable to continue.\n")
|
2024-03-01 12:45:28 +00:00
|
|
|
sys.exit(query_notify.finish())
|
|
|
|
|
2019-01-12 04:55:19 +00:00
|
|
|
underlying_session = underlying_request.session
|
2019-11-29 00:50:53 +00:00
|
|
|
else:
|
2020-11-12 18:43:24 +00:00
|
|
|
# Normal requests
|
2019-11-29 00:50:53 +00:00
|
|
|
underlying_session = requests.session()
|
|
|
|
underlying_request = requests.Request()
|
2018-12-30 05:10:31 +00:00
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Limit number of workers to 20.
|
|
|
|
# This is probably vastly overkill.
|
2019-12-24 22:56:10 +00:00
|
|
|
if len(site_data) >= 20:
|
2022-03-31 12:16:57 +00:00
|
|
|
max_workers = 20
|
2019-12-24 22:56:10 +00:00
|
|
|
else:
|
2022-03-31 12:16:57 +00:00
|
|
|
max_workers = len(site_data)
|
2019-12-24 22:56:10 +00:00
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Create multi-threaded session for all requests.
|
2023-12-21 10:22:57 +00:00
|
|
|
session = SherlockFuturesSession(
|
|
|
|
max_workers=max_workers, session=underlying_session
|
|
|
|
)
|
2019-11-29 00:56:26 +00:00
|
|
|
|
2018-12-29 04:28:47 +00:00
|
|
|
# Results from analysis of all sites
|
|
|
|
results_total = {}
|
2018-12-30 05:10:31 +00:00
|
|
|
|
|
|
|
# First create futures for all requests. This allows for the requests to run in parallel
|
2019-01-06 04:52:53 +00:00
|
|
|
for social_network, net_info in site_data.items():
|
2018-12-29 04:28:47 +00:00
|
|
|
# Results from analysis of this specific site
|
2022-01-31 10:06:29 +00:00
|
|
|
results_site = {"url_main": net_info.get("urlMain")}
|
2018-12-29 04:28:47 +00:00
|
|
|
|
|
|
|
# Record URL of main site
|
|
|
|
|
2019-10-20 15:46:11 +00:00
|
|
|
# A user agent is needed because some sites don't return the correct
|
|
|
|
# information since they think that we are bots (Which we actually are...)
|
2019-10-01 09:59:32 +00:00
|
|
|
headers = {
|
2024-04-12 01:23:11 +00:00
|
|
|
"User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/116.0",
|
2019-10-01 09:59:32 +00:00
|
|
|
}
|
2019-10-20 15:46:11 +00:00
|
|
|
|
2019-10-01 09:59:32 +00:00
|
|
|
if "headers" in net_info:
|
2019-11-26 16:42:06 +00:00
|
|
|
# Override/append any extra headers required by a given site.
|
2019-10-01 09:59:32 +00:00
|
|
|
headers.update(net_info["headers"])
|
2018-12-29 04:28:47 +00:00
|
|
|
|
2020-04-19 20:41:59 +00:00
|
|
|
# URL of user on site (if it exists)
|
2024-05-07 06:17:40 +00:00
|
|
|
url = interpolate_string(net_info["url"], username.replace(' ', '%20'))
|
2020-04-19 20:41:59 +00:00
|
|
|
|
2018-12-30 05:10:31 +00:00
|
|
|
# Don't make request if username is invalid for the site
|
2018-12-30 22:39:08 +00:00
|
|
|
regex_check = net_info.get("regexCheck")
|
2018-12-30 05:10:31 +00:00
|
|
|
if regex_check and re.search(regex_check, username) is None:
|
2022-01-31 10:06:29 +00:00
|
|
|
# No need to do the check at the site: this username is not allowed.
|
2023-12-21 10:22:57 +00:00
|
|
|
results_site["status"] = QueryResult(
|
|
|
|
username, social_network, url, QueryStatus.ILLEGAL
|
|
|
|
)
|
2019-07-16 11:35:57 +00:00
|
|
|
results_site["url_user"] = ""
|
2021-12-11 16:34:35 +00:00
|
|
|
results_site["http_status"] = ""
|
|
|
|
results_site["response_text"] = ""
|
|
|
|
query_notify.update(results_site["status"])
|
2018-12-30 05:10:31 +00:00
|
|
|
else:
|
|
|
|
# URL of user on site (if it exists)
|
|
|
|
results_site["url_user"] = url
|
2019-03-31 15:59:24 +00:00
|
|
|
url_probe = net_info.get("urlProbe")
|
2021-12-06 18:08:49 +00:00
|
|
|
request_method = net_info.get("request_method")
|
|
|
|
request_payload = net_info.get("request_payload")
|
|
|
|
request = None
|
|
|
|
|
|
|
|
if request_method is not None:
|
|
|
|
if request_method == "GET":
|
|
|
|
request = session.get
|
|
|
|
elif request_method == "HEAD":
|
|
|
|
request = session.head
|
|
|
|
elif request_method == "POST":
|
|
|
|
request = session.post
|
|
|
|
elif request_method == "PUT":
|
|
|
|
request = session.put
|
|
|
|
else:
|
2022-03-31 12:16:57 +00:00
|
|
|
raise RuntimeError(f"Unsupported request_method for {url}")
|
2021-12-06 18:08:49 +00:00
|
|
|
|
|
|
|
if request_payload is not None:
|
|
|
|
request_payload = interpolate_string(request_payload, username)
|
|
|
|
|
2019-03-31 15:59:24 +00:00
|
|
|
if url_probe is None:
|
2019-11-26 16:42:06 +00:00
|
|
|
# Probe URL is normal one seen by people out on the web.
|
2019-03-31 15:59:24 +00:00
|
|
|
url_probe = url
|
|
|
|
else:
|
2019-11-26 16:42:06 +00:00
|
|
|
# There is a special URL for probing existence separate
|
|
|
|
# from where the user profile normally can be found.
|
2021-12-06 18:08:49 +00:00
|
|
|
url_probe = interpolate_string(url_probe, username)
|
|
|
|
|
|
|
|
if request is None:
|
2021-12-11 16:34:35 +00:00
|
|
|
if net_info["errorType"] == "status_code":
|
2021-12-06 18:08:49 +00:00
|
|
|
# In most cases when we are detecting by status code,
|
|
|
|
# it is not necessary to get the entire body: we can
|
|
|
|
# detect fine with just the HEAD response.
|
|
|
|
request = session.head
|
|
|
|
else:
|
|
|
|
# Either this detect method needs the content associated
|
|
|
|
# with the GET response, or this specific website will
|
|
|
|
# not respond properly unless we request the whole page.
|
|
|
|
request = session.get
|
2019-01-03 17:39:43 +00:00
|
|
|
|
Change "response_url" detection strategy completely.
Previously, there was a problem with sites that redirect an attempt to view a non-existing username to the main site. For example, if you try to go to https://devrant.com/users/dfoxxxxxxxxx (a user name that does not exist), then we get a redirect to the https://devrant.com/ root of the site. But, the "response_url" checking algorithm was only looking for the configured error URL being included in the response. So, these sites always indicated that the username was not found.
Update the "response_url" detection method so that the request does not allow redirects. If we get a 200 response of some type, then the username has been found. However, if we get something like a 302, then we know that the username was not found as we are being redirected.
This whole method seems fragile, but I did exhaustively test all of the supported sites, and they all work. So, this change is clearly an improvement.
2019-01-23 02:37:05 +00:00
|
|
|
if net_info["errorType"] == "response_url":
|
2019-01-23 23:00:34 +00:00
|
|
|
# Site forwards request to a different URL if username not
|
|
|
|
# found. Disallow the redirect so we can capture the
|
|
|
|
# http status from the original URL request.
|
Change "response_url" detection strategy completely.
Previously, there was a problem with sites that redirect an attempt to view a non-existing username to the main site. For example, if you try to go to https://devrant.com/users/dfoxxxxxxxxx (a user name that does not exist), then we get a redirect to the https://devrant.com/ root of the site. But, the "response_url" checking algorithm was only looking for the configured error URL being included in the response. So, these sites always indicated that the username was not found.
Update the "response_url" detection method so that the request does not allow redirects. If we get a 200 response of some type, then the username has been found. However, if we get something like a 302, then we know that the username was not found as we are being redirected.
This whole method seems fragile, but I did exhaustively test all of the supported sites, and they all work. So, this change is clearly an improvement.
2019-01-23 02:37:05 +00:00
|
|
|
allow_redirects = False
|
|
|
|
else:
|
2019-01-23 23:00:34 +00:00
|
|
|
# Allow whatever redirect that the site wants to do.
|
|
|
|
# The final result of the request will be what is available.
|
Change "response_url" detection strategy completely.
Previously, there was a problem with sites that redirect an attempt to view a non-existing username to the main site. For example, if you try to go to https://devrant.com/users/dfoxxxxxxxxx (a user name that does not exist), then we get a redirect to the https://devrant.com/ root of the site. But, the "response_url" checking algorithm was only looking for the configured error URL being included in the response. So, these sites always indicated that the username was not found.
Update the "response_url" detection method so that the request does not allow redirects. If we get a 200 response of some type, then the username has been found. However, if we get something like a 302, then we know that the username was not found as we are being redirected.
This whole method seems fragile, but I did exhaustively test all of the supported sites, and they all work. So, this change is clearly an improvement.
2019-01-23 02:37:05 +00:00
|
|
|
allow_redirects = True
|
|
|
|
|
2018-12-30 05:10:31 +00:00
|
|
|
# This future starts running the request in a new thread, doesn't block the main thread
|
2020-05-24 03:35:04 +00:00
|
|
|
if proxy is not None:
|
2019-01-12 04:55:19 +00:00
|
|
|
proxies = {"http": proxy, "https": proxy}
|
2023-12-21 10:22:57 +00:00
|
|
|
future = request(
|
|
|
|
url=url_probe,
|
|
|
|
headers=headers,
|
|
|
|
proxies=proxies,
|
|
|
|
allow_redirects=allow_redirects,
|
|
|
|
timeout=timeout,
|
|
|
|
json=request_payload,
|
|
|
|
)
|
2019-01-12 04:55:19 +00:00
|
|
|
else:
|
2023-12-21 10:22:57 +00:00
|
|
|
future = request(
|
|
|
|
url=url_probe,
|
|
|
|
headers=headers,
|
|
|
|
allow_redirects=allow_redirects,
|
|
|
|
timeout=timeout,
|
|
|
|
json=request_payload,
|
|
|
|
)
|
2018-12-25 19:19:21 +00:00
|
|
|
|
2018-12-30 05:10:31 +00:00
|
|
|
# Store future in data for access later
|
2018-12-30 22:22:29 +00:00
|
|
|
net_info["request_future"] = future
|
2018-12-30 05:10:31 +00:00
|
|
|
|
|
|
|
# Reset identify for tor (if needed)
|
|
|
|
if unique_tor:
|
|
|
|
underlying_request.reset_identity()
|
|
|
|
|
2022-01-31 10:06:29 +00:00
|
|
|
# Add this site's results into final dictionary with all the other results.
|
2018-12-30 05:10:31 +00:00
|
|
|
results_total[social_network] = results_site
|
|
|
|
|
2019-01-05 12:43:03 +00:00
|
|
|
# Open the file containing account links
|
2018-12-30 05:10:31 +00:00
|
|
|
# Core logic: If tor requests, make them here. If multi-threaded requests, wait for responses
|
2019-01-06 04:52:53 +00:00
|
|
|
for social_network, net_info in site_data.items():
|
2018-12-30 05:10:31 +00:00
|
|
|
# Retrieve results again
|
|
|
|
results_site = results_total.get(social_network)
|
|
|
|
|
|
|
|
# Retrieve other site information again
|
|
|
|
url = results_site.get("url_user")
|
2019-12-27 16:17:10 +00:00
|
|
|
status = results_site.get("status")
|
|
|
|
if status is not None:
|
2018-12-30 05:10:31 +00:00
|
|
|
# We have already determined the user doesn't exist here
|
|
|
|
continue
|
|
|
|
|
|
|
|
# Get the expected error type
|
2018-12-30 22:22:29 +00:00
|
|
|
error_type = net_info["errorType"]
|
2018-12-24 14:31:34 +00:00
|
|
|
|
2018-12-25 19:19:21 +00:00
|
|
|
# Retrieve future and ensure it has finished
|
2018-12-30 22:22:29 +00:00
|
|
|
future = net_info["request_future"]
|
2023-12-21 10:22:57 +00:00
|
|
|
r, error_text, exception_text = get_response(
|
|
|
|
request_future=future, error_type=error_type, social_network=social_network
|
|
|
|
)
|
2019-12-26 20:00:44 +00:00
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Get response time for response of our request.
|
2019-12-26 20:00:44 +00:00
|
|
|
try:
|
|
|
|
response_time = r.elapsed
|
|
|
|
except AttributeError:
|
|
|
|
response_time = None
|
2018-12-25 18:14:39 +00:00
|
|
|
|
2018-12-30 05:10:31 +00:00
|
|
|
# Attempt to get request information
|
|
|
|
try:
|
|
|
|
http_status = r.status_code
|
2023-12-21 17:13:18 +00:00
|
|
|
except Exception:
|
2019-12-27 16:17:10 +00:00
|
|
|
http_status = "?"
|
2018-12-30 05:10:31 +00:00
|
|
|
try:
|
2021-12-06 18:08:49 +00:00
|
|
|
response_text = r.text.encode(r.encoding or "UTF-8")
|
2023-12-21 17:13:18 +00:00
|
|
|
except Exception:
|
2019-12-27 16:17:10 +00:00
|
|
|
response_text = ""
|
2018-12-25 18:14:39 +00:00
|
|
|
|
2022-03-26 11:23:48 +00:00
|
|
|
query_status = QueryStatus.UNKNOWN
|
|
|
|
error_context = None
|
|
|
|
|
2024-05-14 02:47:53 +00:00
|
|
|
# As WAFs advance and evolve, they will occasionally block Sherlock and
|
|
|
|
# lead to false positives and negatives. Fingerprints should be added
|
|
|
|
# here to filter results that fail to bypass WAFs. Fingerprints should
|
|
|
|
# be highly targetted. Comment at the end of each fingerprint to
|
|
|
|
# indicate target and date fingerprinted.
|
2024-04-08 22:07:14 +00:00
|
|
|
WAFHitMsgs = [
|
2024-05-14 02:47:53 +00:00
|
|
|
'.loading-spinner{visibility:hidden}body.no-js .challenge-running{display:none}body.dark{background-color:#222;color:#d9d9d9}body.dark a{color:#fff}body.dark a:hover{color:#ee730a;text-decoration:underline}body.dark .lds-ring div{border-color:#999 transparent transparent}body.dark .font-red{color:#b20f03}body.dark', # 2024-05-13 Cloudflare
|
2024-04-09 21:15:21 +00:00
|
|
|
'{return l.onPageView}}),Object.defineProperty(r,"perimeterxIdentifiers",{enumerable:' # 2024-04-09 PerimeterX / Human Security
|
2024-04-08 22:07:14 +00:00
|
|
|
]
|
|
|
|
|
2019-12-26 20:00:44 +00:00
|
|
|
if error_text is not None:
|
2022-03-26 11:23:48 +00:00
|
|
|
error_context = error_text
|
2022-06-08 13:51:06 +00:00
|
|
|
|
2024-04-08 22:07:14 +00:00
|
|
|
elif any(hitMsg in r.text for hitMsg in WAFHitMsgs):
|
|
|
|
query_status = QueryStatus.WAF
|
|
|
|
|
2019-12-26 20:00:44 +00:00
|
|
|
elif error_type == "message":
|
2020-11-05 18:51:41 +00:00
|
|
|
# error_flag True denotes no error found in the HTML
|
|
|
|
# error_flag False denotes error found in the HTML
|
|
|
|
error_flag = True
|
2022-03-31 12:16:57 +00:00
|
|
|
errors = net_info.get("errorMsg")
|
2020-11-05 18:51:41 +00:00
|
|
|
# errors will hold the error message
|
|
|
|
# it can be string or list
|
2022-01-31 10:06:29 +00:00
|
|
|
# by isinstance method we can detect that
|
2020-11-05 18:51:41 +00:00
|
|
|
# and handle the case for strings as normal procedure
|
|
|
|
# and if its list we can iterate the errors
|
2022-03-31 12:16:57 +00:00
|
|
|
if isinstance(errors, str):
|
2020-11-05 18:51:41 +00:00
|
|
|
# Checks if the error message is in the HTML
|
|
|
|
# if error is present we will set flag to False
|
|
|
|
if errors in r.text:
|
|
|
|
error_flag = False
|
|
|
|
else:
|
|
|
|
# If it's list, it will iterate all the error message
|
|
|
|
for error in errors:
|
|
|
|
if error in r.text:
|
|
|
|
error_flag = False
|
|
|
|
break
|
|
|
|
if error_flag:
|
2022-03-26 11:23:48 +00:00
|
|
|
query_status = QueryStatus.CLAIMED
|
2018-12-24 14:31:34 +00:00
|
|
|
else:
|
2022-03-26 11:23:48 +00:00
|
|
|
query_status = QueryStatus.AVAILABLE
|
2018-12-24 14:31:34 +00:00
|
|
|
elif error_type == "status_code":
|
2024-04-09 03:19:50 +00:00
|
|
|
error_codes = net_info.get("errorCode")
|
2024-04-11 21:28:39 +00:00
|
|
|
query_status = QueryStatus.CLAIMED
|
2024-04-09 03:19:50 +00:00
|
|
|
|
2024-04-11 21:28:39 +00:00
|
|
|
# Type consistency, allowing for both singlets and lists in manifest
|
|
|
|
if isinstance(error_codes, int):
|
|
|
|
error_codes = [error_codes]
|
2024-05-09 16:22:22 +00:00
|
|
|
|
2024-04-11 21:39:23 +00:00
|
|
|
if error_codes is not None and r.status_code in error_codes:
|
2024-04-11 21:28:39 +00:00
|
|
|
query_status = QueryStatus.AVAILABLE
|
|
|
|
elif r.status_code >= 300 or r.status_code < 200:
|
|
|
|
query_status = QueryStatus.AVAILABLE
|
2018-12-24 14:31:34 +00:00
|
|
|
elif error_type == "response_url":
|
Change "response_url" detection strategy completely.
Previously, there was a problem with sites that redirect an attempt to view a non-existing username to the main site. For example, if you try to go to https://devrant.com/users/dfoxxxxxxxxx (a user name that does not exist), then we get a redirect to the https://devrant.com/ root of the site. But, the "response_url" checking algorithm was only looking for the configured error URL being included in the response. So, these sites always indicated that the username was not found.
Update the "response_url" detection method so that the request does not allow redirects. If we get a 200 response of some type, then the username has been found. However, if we get something like a 302, then we know that the username was not found as we are being redirected.
This whole method seems fragile, but I did exhaustively test all of the supported sites, and they all work. So, this change is clearly an improvement.
2019-01-23 02:37:05 +00:00
|
|
|
# For this detection method, we have turned off the redirect.
|
|
|
|
# So, there is no need to check the response URL: it will always
|
|
|
|
# match the request. Instead, we will ensure that the response
|
|
|
|
# code indicates that the request was successful (i.e. no 404, or
|
|
|
|
# forward to some odd redirect).
|
Use compound if statement rather than "if and"
This approach is a bit strange to read the first few time but has advantages in that it is easier to get right and faster to execute.
The interactions between `and`, `or`, `not`, and `()` can get confusing for new coders. For example, the code line 308 does not match the comment on 307 and I believe that in this case the comment correct and the code is wrong (for values < 200) because it is missing parens. I believe that __200 <= status_code < 300__ produces the correct results in a readable (semi-)intuitive code.
```
>>> for status_code in (-1, 1, 199, 200, 201, 299, 300, 301, 1000):
... print(not status_code >= 300 or status_code < 200,
... not (status_code >= 300 or status_code < 200),
... 200 <= status_code < 300)
...
True False False
True False False
True False False
True True True
True True True
True True True
False False False
False False False
False False False
```
2019-03-07 22:57:56 +00:00
|
|
|
if 200 <= r.status_code < 300:
|
2022-03-26 11:23:48 +00:00
|
|
|
query_status = QueryStatus.CLAIMED
|
2018-12-24 14:31:34 +00:00
|
|
|
else:
|
2022-03-26 11:23:48 +00:00
|
|
|
query_status = QueryStatus.AVAILABLE
|
2019-12-27 17:12:34 +00:00
|
|
|
else:
|
2020-11-12 18:43:24 +00:00
|
|
|
# It should be impossible to ever get here...
|
2023-12-21 10:22:57 +00:00
|
|
|
raise ValueError(
|
|
|
|
f"Unknown Error Type '{error_type}' for " f"site '{social_network}'"
|
|
|
|
)
|
2024-07-01 02:16:39 +00:00
|
|
|
|
|
|
|
if dump_response:
|
|
|
|
print("+++++++++++++++++++++")
|
|
|
|
print(f"TARGET NAME : {social_network}")
|
|
|
|
print(f"USERNAME : {username}")
|
|
|
|
print(f"TARGET URL : {url}")
|
|
|
|
print(f"TEST METHOD : {error_type}")
|
|
|
|
try:
|
|
|
|
print(f"STATUS CODES : {net_info['errorCode']}")
|
|
|
|
except KeyError:
|
|
|
|
pass
|
|
|
|
print("Results...")
|
|
|
|
try:
|
|
|
|
print(f"RESPONSE CODE : {r.status_code}")
|
|
|
|
except Exception:
|
|
|
|
pass
|
|
|
|
try:
|
|
|
|
print(f"ERROR TEXT : {net_info['errorMsg']}")
|
|
|
|
except KeyError:
|
|
|
|
pass
|
|
|
|
print(">>>>> BEGIN RESPONSE TEXT")
|
|
|
|
try:
|
|
|
|
print(r.text)
|
|
|
|
except Exception:
|
|
|
|
pass
|
|
|
|
print("<<<<< END RESPONSE TEXT")
|
|
|
|
print("VERDICT : " + str(query_status))
|
|
|
|
print("+++++++++++++++++++++")
|
2018-12-29 04:28:47 +00:00
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Notify caller about results of query.
|
2023-12-21 10:22:57 +00:00
|
|
|
result = QueryResult(
|
|
|
|
username=username,
|
|
|
|
site_name=social_network,
|
|
|
|
site_url_user=url,
|
|
|
|
status=query_status,
|
|
|
|
query_time=response_time,
|
|
|
|
context=error_context,
|
|
|
|
)
|
2020-04-19 20:38:16 +00:00
|
|
|
query_notify.update(result)
|
|
|
|
|
2019-12-27 16:17:10 +00:00
|
|
|
# Save status of request
|
2021-12-11 16:34:35 +00:00
|
|
|
results_site["status"] = result
|
2018-12-29 04:28:47 +00:00
|
|
|
|
|
|
|
# Save results from request
|
2021-12-11 16:34:35 +00:00
|
|
|
results_site["http_status"] = http_status
|
|
|
|
results_site["response_text"] = response_text
|
2018-12-29 04:28:47 +00:00
|
|
|
|
|
|
|
# Add this site's results into final dictionary with all of the other results.
|
|
|
|
results_total[social_network] = results_site
|
2020-04-23 11:58:28 +00:00
|
|
|
|
2018-12-29 04:28:47 +00:00
|
|
|
return results_total
|
2018-12-27 03:54:25 +00:00
|
|
|
|
|
|
|
|
2019-12-07 23:24:09 +00:00
|
|
|
def timeout_check(value):
|
|
|
|
"""Check Timeout Argument.
|
|
|
|
|
|
|
|
Checks timeout for validity.
|
|
|
|
|
|
|
|
Keyword Arguments:
|
|
|
|
value -- Time in seconds to wait before timing out request.
|
|
|
|
|
|
|
|
Return Value:
|
|
|
|
Floating point number representing the time (in seconds) that should be
|
|
|
|
used for the timeout.
|
|
|
|
|
|
|
|
NOTE: Will raise an exception if the timeout in invalid.
|
|
|
|
"""
|
|
|
|
|
2023-12-25 01:43:58 +00:00
|
|
|
float_value = float(value)
|
|
|
|
|
|
|
|
if float_value <= 0:
|
2022-03-31 12:16:57 +00:00
|
|
|
raise ArgumentTypeError(
|
2023-12-21 10:22:57 +00:00
|
|
|
f"Invalid timeout value: {value}. Timeout must be a positive number."
|
|
|
|
)
|
|
|
|
|
2023-12-25 01:43:58 +00:00
|
|
|
return float_value
|
2019-12-07 23:24:09 +00:00
|
|
|
|
|
|
|
|
2022-10-01 13:32:34 +00:00
|
|
|
def handler(signal_received, frame):
|
|
|
|
"""Exit gracefully without throwing errors
|
|
|
|
|
|
|
|
Source: https://www.devdungeon.com/content/python-catch-sigint-ctrl-c
|
|
|
|
"""
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
|
2018-12-28 19:15:41 +00:00
|
|
|
def main():
|
2023-12-21 10:22:57 +00:00
|
|
|
parser = ArgumentParser(
|
|
|
|
formatter_class=RawDescriptionHelpFormatter,
|
2024-05-18 00:57:37 +00:00
|
|
|
description=f"{__longname__} (Version {__version__})",
|
2023-12-21 10:22:57 +00:00
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--version",
|
|
|
|
action="version",
|
2024-06-25 04:15:32 +00:00
|
|
|
version=f"{__shortname__} v{__version__}",
|
2023-12-21 10:22:57 +00:00
|
|
|
help="Display version information and dependencies.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--verbose",
|
|
|
|
"-v",
|
|
|
|
"-d",
|
|
|
|
"--debug",
|
|
|
|
action="store_true",
|
|
|
|
dest="verbose",
|
|
|
|
default=False,
|
|
|
|
help="Display extra debugging information and metrics.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--folderoutput",
|
|
|
|
"-fo",
|
|
|
|
dest="folderoutput",
|
|
|
|
help="If using multiple usernames, the output of the results will be saved to this folder.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--output",
|
|
|
|
"-o",
|
|
|
|
dest="output",
|
|
|
|
help="If using single username, the output of the result will be saved to this file.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--tor",
|
|
|
|
"-t",
|
|
|
|
action="store_true",
|
|
|
|
dest="tor",
|
|
|
|
default=False,
|
|
|
|
help="Make requests over Tor; increases runtime; requires Tor to be installed and in system path.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--unique-tor",
|
|
|
|
"-u",
|
|
|
|
action="store_true",
|
|
|
|
dest="unique_tor",
|
|
|
|
default=False,
|
|
|
|
help="Make requests over Tor with new Tor circuit after each request; increases runtime; requires Tor to be installed and in system path.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--csv",
|
|
|
|
action="store_true",
|
|
|
|
dest="csv",
|
|
|
|
default=False,
|
|
|
|
help="Create Comma-Separated Values (CSV) File.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--xlsx",
|
|
|
|
action="store_true",
|
|
|
|
dest="xlsx",
|
|
|
|
default=False,
|
2024-03-15 16:56:02 +00:00
|
|
|
help="Create the standard file for the modern Microsoft Excel spreadsheet (xlsx).",
|
2023-12-21 10:22:57 +00:00
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--site",
|
|
|
|
action="append",
|
|
|
|
metavar="SITE_NAME",
|
|
|
|
dest="site_list",
|
2024-05-07 07:05:52 +00:00
|
|
|
default=[],
|
2023-12-21 10:22:57 +00:00
|
|
|
help="Limit analysis to just the listed sites. Add multiple options to specify more than one site.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--proxy",
|
|
|
|
"-p",
|
|
|
|
metavar="PROXY_URL",
|
|
|
|
action="store",
|
|
|
|
dest="proxy",
|
|
|
|
default=None,
|
|
|
|
help="Make requests over a proxy. e.g. socks5://127.0.0.1:1080",
|
|
|
|
)
|
2024-07-01 02:16:39 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--dump-response",
|
|
|
|
action="store_true",
|
|
|
|
dest="dump_response",
|
|
|
|
default=False,
|
|
|
|
help="Dump the HTTP response to stdout for targeted debugging.",
|
|
|
|
)
|
2023-12-21 10:22:57 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--json",
|
|
|
|
"-j",
|
|
|
|
metavar="JSON_FILE",
|
|
|
|
dest="json_file",
|
|
|
|
default=None,
|
|
|
|
help="Load data from a JSON file or an online, valid, JSON file.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--timeout",
|
|
|
|
action="store",
|
|
|
|
metavar="TIMEOUT",
|
|
|
|
dest="timeout",
|
|
|
|
type=timeout_check,
|
|
|
|
default=60,
|
|
|
|
help="Time (in seconds) to wait for response to requests (Default: 60)",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--print-all",
|
|
|
|
action="store_true",
|
|
|
|
dest="print_all",
|
|
|
|
default=False,
|
|
|
|
help="Output sites where the username was not found.",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--print-found",
|
|
|
|
action="store_true",
|
|
|
|
dest="print_found",
|
|
|
|
default=True,
|
|
|
|
help="Output sites where the username was found (also if exported as file).",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--no-color",
|
|
|
|
action="store_true",
|
|
|
|
dest="no_color",
|
|
|
|
default=False,
|
|
|
|
help="Don't color terminal output",
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"username",
|
|
|
|
nargs="+",
|
|
|
|
metavar="USERNAMES",
|
|
|
|
action="store",
|
2024-01-19 21:16:18 +00:00
|
|
|
help="One or more usernames to check with social networks. Check similar usernames using {?} (replace to '_', '-', '.').",
|
2023-12-21 10:22:57 +00:00
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--browse",
|
|
|
|
"-b",
|
|
|
|
action="store_true",
|
|
|
|
dest="browse",
|
|
|
|
default=False,
|
|
|
|
help="Browse to all results on default browser.",
|
|
|
|
)
|
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
"--local",
|
|
|
|
"-l",
|
|
|
|
action="store_true",
|
|
|
|
default=False,
|
|
|
|
help="Force the use of the local data.json file.",
|
|
|
|
)
|
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
"--nsfw",
|
|
|
|
action="store_true",
|
|
|
|
default=False,
|
|
|
|
help="Include checking of NSFW sites from default list.",
|
|
|
|
)
|
2022-10-01 08:36:31 +00:00
|
|
|
|
2024-08-21 11:01:22 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--no-txt",
|
|
|
|
action="store_true",
|
|
|
|
dest="no_txt",
|
|
|
|
default=False,
|
|
|
|
help="Disable creation of a txt file",
|
|
|
|
)
|
|
|
|
|
2018-12-26 17:25:28 +00:00
|
|
|
args = parser.parse_args()
|
2023-02-15 18:56:22 +00:00
|
|
|
|
2022-10-01 13:32:34 +00:00
|
|
|
# If the user presses CTRL-C, exit gracefully without throwing errors
|
|
|
|
signal.signal(signal.SIGINT, handler)
|
2023-02-15 18:56:22 +00:00
|
|
|
|
2020-08-08 16:56:50 +00:00
|
|
|
# Check for newer version of Sherlock. If it exists, let the user know about it
|
2020-08-09 05:44:44 +00:00
|
|
|
try:
|
2024-07-08 05:30:32 +00:00
|
|
|
latest_release_raw = requests.get(forge_api_latest_release).text
|
|
|
|
latest_release_json = json_loads(latest_release_raw)
|
|
|
|
latest_remote_tag = latest_release_json["tag_name"]
|
2020-08-09 05:44:44 +00:00
|
|
|
|
2024-07-08 05:30:32 +00:00
|
|
|
if latest_remote_tag[1:] != __version__:
|
2023-12-21 10:22:57 +00:00
|
|
|
print(
|
2024-07-08 05:30:32 +00:00
|
|
|
f"Update available! {__version__} --> {latest_remote_tag[1:]}"
|
|
|
|
f"\n{latest_release_json['html_url']}"
|
2023-12-21 10:22:57 +00:00
|
|
|
)
|
2020-09-07 16:02:24 +00:00
|
|
|
|
2020-08-09 05:44:44 +00:00
|
|
|
except Exception as error:
|
2021-12-07 08:51:04 +00:00
|
|
|
print(f"A problem occurred while checking for an update: {error}")
|
2020-08-08 16:56:50 +00:00
|
|
|
|
2019-01-12 04:55:19 +00:00
|
|
|
# Argument check
|
|
|
|
# TODO regex check on args.proxy
|
2020-05-24 03:35:04 +00:00
|
|
|
if args.tor and (args.proxy is not None):
|
Remove Proxy List Support
While doing the restructuring, I am testing in more depth as I change the code. And, I am trying to grok how the proxy options work. Specifically, how the proxy list works. Or, does not work.
There is code in the main function that randomly selects proxies from a list, but it does not actually use the result. This was noticed in #292. It looks like the only place where the proxy list is used is when there is a proxy error during get_response()...in that case a new random proxy is chosen. But, there is no care taken to ensure that we do not get the same proxy that just errored out. It seems like problematic proxies should be blacklisted if there is that type of failure.
Moreover, there is a check earlier in the code that does not allow the proxy list and proxy command line option to be used simultaneously. So, I can see no way that the proxy list has any functionality: if you do define the proxy list, then there is no way to kick off the general request with a proxy.
I also noticed that the recursive get_response() call does not pass its return tuples back up the call chain. The existing code would never get any good from the switchover to an alternate proxy (even if the other problems mentioned above were resolved).
For now, I am removing the support. This feature may be looked at after the restructuring is done.
2019-12-26 16:59:52 +00:00
|
|
|
raise Exception("Tor and Proxy cannot be set at the same time.")
|
2019-01-20 18:18:24 +00:00
|
|
|
|
2019-01-12 04:55:19 +00:00
|
|
|
# Make prompts
|
2020-05-24 03:35:04 +00:00
|
|
|
if args.proxy is not None:
|
2019-01-12 04:55:19 +00:00
|
|
|
print("Using the proxy: " + args.proxy)
|
2019-01-20 18:22:44 +00:00
|
|
|
|
2018-12-29 01:31:31 +00:00
|
|
|
if args.tor or args.unique_tor:
|
2019-04-10 09:15:55 +00:00
|
|
|
print("Using Tor to make requests")
|
2022-06-08 13:51:06 +00:00
|
|
|
|
2022-01-31 10:06:29 +00:00
|
|
|
print(
|
2023-12-21 10:22:57 +00:00
|
|
|
"Warning: some websites might refuse connecting over Tor, so note that using this option might increase connection errors."
|
|
|
|
)
|
2022-03-31 12:16:57 +00:00
|
|
|
|
2021-12-26 00:54:45 +00:00
|
|
|
if args.no_color:
|
|
|
|
# Disable color output.
|
|
|
|
init(strip=True, convert=False)
|
|
|
|
else:
|
|
|
|
# Enable color output.
|
|
|
|
init(autoreset=True)
|
2022-03-31 12:16:57 +00:00
|
|
|
|
2019-01-24 19:59:06 +00:00
|
|
|
# Check if both output methods are entered as input.
|
|
|
|
if args.output is not None and args.folderoutput is not None:
|
|
|
|
print("You can only use one of the output methods.")
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
# Check validity for single username output.
|
|
|
|
if args.output is not None and len(args.username) != 1:
|
|
|
|
print("You can only use --output with a single username")
|
|
|
|
sys.exit(1)
|
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Create object with all information about sites we are aware of.
|
2019-01-23 23:00:34 +00:00
|
|
|
try:
|
2020-08-20 19:37:30 +00:00
|
|
|
if args.local:
|
2023-12-21 10:22:57 +00:00
|
|
|
sites = SitesInformation(
|
|
|
|
os.path.join(os.path.dirname(__file__), "resources/data.json")
|
|
|
|
)
|
2020-08-20 19:37:30 +00:00
|
|
|
else:
|
|
|
|
sites = SitesInformation(args.json_file)
|
2019-12-29 06:50:06 +00:00
|
|
|
except Exception as error:
|
|
|
|
print(f"ERROR: {error}")
|
|
|
|
sys.exit(1)
|
2019-01-23 23:00:34 +00:00
|
|
|
|
2022-10-01 17:44:44 +00:00
|
|
|
if not args.nsfw:
|
2024-05-07 07:05:52 +00:00
|
|
|
sites.remove_nsfw_sites(do_not_remove=args.site_list)
|
2022-10-01 08:36:31 +00:00
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Create original dictionary from SitesInformation() object.
|
|
|
|
# Eventually, the rest of the code will be updated to use the new object
|
|
|
|
# directly, but this will glue the two pieces together.
|
2022-01-31 10:06:29 +00:00
|
|
|
site_data_all = {site.name: site.information for site in sites}
|
2024-05-07 07:05:52 +00:00
|
|
|
if args.site_list == []:
|
2019-01-06 04:52:53 +00:00
|
|
|
# Not desired to look at a sub-set of sites
|
|
|
|
site_data = site_data_all
|
|
|
|
else:
|
|
|
|
# User desires to selectively run queries on a sub-set of the site list.
|
|
|
|
# Make sure that the sites are supported & build up pruned site database.
|
|
|
|
site_data = {}
|
|
|
|
site_missing = []
|
|
|
|
for site in args.site_list:
|
2020-08-13 17:10:13 +00:00
|
|
|
counter = 0
|
2019-01-09 17:43:00 +00:00
|
|
|
for existing_site in site_data_all:
|
|
|
|
if site.lower() == existing_site.lower():
|
|
|
|
site_data[existing_site] = site_data_all[existing_site]
|
2020-08-13 17:10:13 +00:00
|
|
|
counter += 1
|
|
|
|
if counter == 0:
|
2019-01-06 04:52:53 +00:00
|
|
|
# Build up list of sites not supported for future error message.
|
2019-05-15 12:39:39 +00:00
|
|
|
site_missing.append(f"'{site}'")
|
2019-01-06 04:52:53 +00:00
|
|
|
|
2019-01-09 17:46:02 +00:00
|
|
|
if site_missing:
|
2023-12-21 10:22:57 +00:00
|
|
|
print(f"Error: Desired sites not found: {', '.join(site_missing)}.")
|
2020-08-13 17:10:13 +00:00
|
|
|
|
|
|
|
if not site_data:
|
2019-01-06 04:52:53 +00:00
|
|
|
sys.exit(1)
|
|
|
|
|
2020-11-12 18:43:24 +00:00
|
|
|
# Create notify object for query results.
|
2023-12-21 10:22:57 +00:00
|
|
|
query_notify = QueryNotifyPrint(
|
|
|
|
result=None, verbose=args.verbose, print_all=args.print_all, browse=args.browse
|
|
|
|
)
|
2020-04-19 20:38:16 +00:00
|
|
|
|
2018-12-29 01:45:19 +00:00
|
|
|
# Run report on all specified users.
|
2022-03-31 12:16:57 +00:00
|
|
|
all_usernames = []
|
2018-12-27 03:54:25 +00:00
|
|
|
for username in args.username:
|
2023-12-21 10:22:57 +00:00
|
|
|
if check_for_parameter(username):
|
|
|
|
for name in multiple_usernames(username):
|
2022-03-31 12:16:57 +00:00
|
|
|
all_usernames.append(name)
|
|
|
|
else:
|
|
|
|
all_usernames.append(username)
|
|
|
|
for username in all_usernames:
|
2023-12-21 10:22:57 +00:00
|
|
|
results = sherlock(
|
|
|
|
username,
|
|
|
|
site_data,
|
|
|
|
query_notify,
|
|
|
|
tor=args.tor,
|
|
|
|
unique_tor=args.unique_tor,
|
2024-07-01 02:16:39 +00:00
|
|
|
dump_response=args.dump_response,
|
2023-12-21 10:22:57 +00:00
|
|
|
proxy=args.proxy,
|
|
|
|
timeout=args.timeout,
|
|
|
|
)
|
2018-12-25 18:14:39 +00:00
|
|
|
|
2019-12-31 17:19:15 +00:00
|
|
|
if args.output:
|
|
|
|
result_file = args.output
|
|
|
|
elif args.folderoutput:
|
|
|
|
# The usernames results should be stored in a targeted folder.
|
2019-12-31 21:51:40 +00:00
|
|
|
# If the folder doesn't exist, create it first
|
|
|
|
os.makedirs(args.folderoutput, exist_ok=True)
|
2019-12-31 17:19:15 +00:00
|
|
|
result_file = os.path.join(args.folderoutput, f"{username}.txt")
|
|
|
|
else:
|
|
|
|
result_file = f"{username}.txt"
|
|
|
|
|
2024-08-21 11:01:22 +00:00
|
|
|
if not args.no_txt:
|
|
|
|
with open(result_file, "w", encoding="utf-8") as file:
|
|
|
|
exists_counter = 0
|
|
|
|
for website_name in results:
|
|
|
|
dictionary = results[website_name]
|
|
|
|
if dictionary.get("status").status == QueryStatus.CLAIMED:
|
|
|
|
exists_counter += 1
|
|
|
|
file.write(dictionary["url_user"] + "\n")
|
|
|
|
file.write(f"Total Websites Username Detected On : {exists_counter}\n")
|
2019-01-24 19:59:06 +00:00
|
|
|
|
2020-05-24 03:35:04 +00:00
|
|
|
if args.csv:
|
2020-12-08 00:26:44 +00:00
|
|
|
result_file = f"{username}.csv"
|
|
|
|
if args.folderoutput:
|
|
|
|
# The usernames results should be stored in a targeted folder.
|
|
|
|
# If the folder doesn't exist, create it first
|
|
|
|
os.makedirs(args.folderoutput, exist_ok=True)
|
|
|
|
result_file = os.path.join(args.folderoutput, result_file)
|
|
|
|
|
2023-12-21 10:22:57 +00:00
|
|
|
with open(result_file, "w", newline="", encoding="utf-8") as csv_report:
|
2018-12-29 04:32:30 +00:00
|
|
|
writer = csv.writer(csv_report)
|
2023-12-21 10:22:57 +00:00
|
|
|
writer.writerow(
|
|
|
|
[
|
|
|
|
"username",
|
|
|
|
"name",
|
|
|
|
"url_main",
|
|
|
|
"url_user",
|
|
|
|
"exists",
|
|
|
|
"http_status",
|
|
|
|
"response_time_s",
|
|
|
|
]
|
|
|
|
)
|
2018-12-29 04:32:30 +00:00
|
|
|
for site in results:
|
2023-12-21 10:22:57 +00:00
|
|
|
if (
|
|
|
|
args.print_found
|
|
|
|
and not args.print_all
|
|
|
|
and results[site]["status"].status != QueryStatus.CLAIMED
|
|
|
|
):
|
2023-03-06 08:31:39 +00:00
|
|
|
continue
|
|
|
|
|
2021-12-11 16:34:35 +00:00
|
|
|
response_time_s = results[site]["status"].query_time
|
2020-04-19 03:04:09 +00:00
|
|
|
if response_time_s is None:
|
|
|
|
response_time_s = ""
|
2023-12-21 10:22:57 +00:00
|
|
|
writer.writerow(
|
|
|
|
[
|
|
|
|
username,
|
|
|
|
site,
|
|
|
|
results[site]["url_main"],
|
|
|
|
results[site]["url_user"],
|
|
|
|
str(results[site]["status"].status),
|
|
|
|
results[site]["http_status"],
|
|
|
|
response_time_s,
|
|
|
|
]
|
|
|
|
)
|
2022-06-08 13:51:06 +00:00
|
|
|
if args.xlsx:
|
|
|
|
usernames = []
|
|
|
|
names = []
|
|
|
|
url_main = []
|
|
|
|
url_user = []
|
|
|
|
exists = []
|
|
|
|
http_status = []
|
|
|
|
response_time_s = []
|
|
|
|
|
|
|
|
for site in results:
|
2023-12-21 10:22:57 +00:00
|
|
|
if (
|
|
|
|
args.print_found
|
|
|
|
and not args.print_all
|
|
|
|
and results[site]["status"].status != QueryStatus.CLAIMED
|
|
|
|
):
|
2023-03-06 08:31:39 +00:00
|
|
|
continue
|
|
|
|
|
2022-06-08 13:51:06 +00:00
|
|
|
if response_time_s is None:
|
|
|
|
response_time_s.append("")
|
|
|
|
else:
|
|
|
|
response_time_s.append(results[site]["status"].query_time)
|
|
|
|
usernames.append(username)
|
|
|
|
names.append(site)
|
|
|
|
url_main.append(results[site]["url_main"])
|
|
|
|
url_user.append(results[site]["url_user"])
|
|
|
|
exists.append(str(results[site]["status"].status))
|
|
|
|
http_status.append(results[site]["http_status"])
|
|
|
|
|
2023-12-21 10:22:57 +00:00
|
|
|
DataFrame = pd.DataFrame(
|
|
|
|
{
|
|
|
|
"username": usernames,
|
|
|
|
"name": names,
|
|
|
|
"url_main": url_main,
|
|
|
|
"url_user": url_user,
|
|
|
|
"exists": exists,
|
|
|
|
"http_status": http_status,
|
|
|
|
"response_time_s": response_time_s,
|
|
|
|
}
|
|
|
|
)
|
|
|
|
DataFrame.to_excel(f"{username}.xlsx", sheet_name="sheet1", index=False)
|
2022-06-08 13:51:06 +00:00
|
|
|
|
2020-09-03 09:14:43 +00:00
|
|
|
print()
|
2022-04-09 15:31:04 +00:00
|
|
|
query_notify.finish()
|
2018-12-24 14:31:34 +00:00
|
|
|
|
2019-01-07 03:33:36 +00:00
|
|
|
|
2018-12-28 19:15:41 +00:00
|
|
|
if __name__ == "__main__":
|
2019-01-27 10:27:03 +00:00
|
|
|
main()
|