Don't Crash When Tor Proxy is Not Up
This commit is contained in:
parent
76ffa74b5d
commit
7068ce8442
6
main.go
6
main.go
|
@ -90,9 +90,9 @@ func main() {
|
||||||
onionScan.Config.LogError(errors.New(scanReport.HiddenService + " timed out"))
|
onionScan.Config.LogError(errors.New(scanReport.HiddenService + " timed out"))
|
||||||
}
|
}
|
||||||
|
|
||||||
file := *reportFile
|
file := *reportFile
|
||||||
if file != "" {
|
if file != "" {
|
||||||
file := scanReport.HiddenService + "." + *reportFile
|
file = scanReport.HiddenService + "." + *reportFile
|
||||||
}
|
}
|
||||||
|
|
||||||
if *jsonReport {
|
if *jsonReport {
|
||||||
|
|
|
@ -22,5 +22,7 @@ func (rps *BitcoinProtocolScanner) ScanProtocol(hiddenService string, osc *confi
|
||||||
// TODO: Actual Analysis
|
// TODO: Actual Analysis
|
||||||
report.BitcoinDetected = true
|
report.BitcoinDetected = true
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -31,5 +31,7 @@ func (sps *FTPProtocolScanner) ScanProtocol(hiddenService string, osc *config.On
|
||||||
osc.LogInfo(fmt.Sprintf("Found FTP Banner: %s (%s)", banner, report.FTPFingerprint))
|
osc.LogInfo(fmt.Sprintf("Found FTP Banner: %s (%s)", banner, report.FTPFingerprint))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
package protocol
|
package protocol
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
"github.com/s-rah/onionscan/config"
|
"github.com/s-rah/onionscan/config"
|
||||||
"github.com/s-rah/onionscan/report"
|
"github.com/s-rah/onionscan/report"
|
||||||
|
@ -10,7 +11,6 @@ import (
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
"crypto/tls"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type HTTPProtocolScanner struct {
|
type HTTPProtocolScanner struct {
|
||||||
|
@ -33,19 +33,20 @@ func (hps *HTTPProtocolScanner) ScanProtocol(hiddenService string, osc *config.O
|
||||||
if err != nil {
|
if err != nil {
|
||||||
osc.LogInfo("Failed to connect to service on port 80\n")
|
osc.LogInfo("Failed to connect to service on port 80\n")
|
||||||
report.WebDetected = false
|
report.WebDetected = false
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
osc.LogInfo("Found potential service on http(80)\n")
|
osc.LogInfo("Found potential service on http(80)\n")
|
||||||
report.WebDetected = true
|
report.WebDetected = true
|
||||||
conn.Close()
|
conn.Close()
|
||||||
dialSocksProxy := socks.DialSocksProxy(socks.SOCKS5, osc.TorProxyAddress)
|
dialSocksProxy := socks.DialSocksProxy(socks.SOCKS5, osc.TorProxyAddress)
|
||||||
transportConfig := &http.Transport{
|
transportConfig := &http.Transport{
|
||||||
Dial: dialSocksProxy,
|
Dial: dialSocksProxy,
|
||||||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
|
||||||
}
|
}
|
||||||
hps.Client = &http.Client{
|
hps.Client = &http.Client{
|
||||||
Transport: transportConfig,
|
Transport: transportConfig,
|
||||||
|
|
||||||
}
|
}
|
||||||
// FIXME This should probably be moved to it's own file now.
|
// FIXME This should probably be moved to it's own file now.
|
||||||
response, err := hps.Client.Get("http://" + hiddenService)
|
response, err := hps.Client.Get("http://" + hiddenService)
|
||||||
|
|
|
@ -22,7 +22,9 @@ func (rps *IRCProtocolScanner) ScanProtocol(hiddenService string, osc *config.On
|
||||||
// TODO: Actual Analysis
|
// TODO: Actual Analysis
|
||||||
report.IRCDetected = true
|
report.IRCDetected = true
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
|
|
||||||
// IRC
|
// IRC
|
||||||
osc.LogInfo(fmt.Sprintf("Checking %s IRC(6697)\n", hiddenService))
|
osc.LogInfo(fmt.Sprintf("Checking %s IRC(6697)\n", hiddenService))
|
||||||
|
@ -34,5 +36,7 @@ func (rps *IRCProtocolScanner) ScanProtocol(hiddenService string, osc *config.On
|
||||||
// TODO: Actual Analysis
|
// TODO: Actual Analysis
|
||||||
report.IRCDetected = true
|
report.IRCDetected = true
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,6 +22,8 @@ func (rps *MongoDBProtocolScanner) ScanProtocol(hiddenService string, osc *confi
|
||||||
// TODO: Actual Analysis
|
// TODO: Actual Analysis
|
||||||
report.MongoDBDetected = true
|
report.MongoDBDetected = true
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,5 +22,7 @@ func (rps *RicochetProtocolScanner) ScanProtocol(hiddenService string, osc *conf
|
||||||
// TODO: Actual Analysis
|
// TODO: Actual Analysis
|
||||||
report.RicochetDetected = true
|
report.RicochetDetected = true
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -32,5 +32,7 @@ func (sps *SMTPProtocolScanner) ScanProtocol(hiddenService string, osc *config.O
|
||||||
osc.LogInfo(fmt.Sprintf("Found SMTP Banner: %s (%s)", banner, report.SMTPFingerprint))
|
osc.LogInfo(fmt.Sprintf("Found SMTP Banner: %s (%s)", banner, report.SMTPFingerprint))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,7 +22,9 @@ func (sps *SSHProtocolScanner) ScanProtocol(hiddenService string, osc *config.On
|
||||||
if err != nil {
|
if err != nil {
|
||||||
osc.LogInfo("Failed to connect to service on port 22\n")
|
osc.LogInfo("Failed to connect to service on port 22\n")
|
||||||
report.SSHDetected = false
|
report.SSHDetected = false
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
// TODO SSH Checking
|
// TODO SSH Checking
|
||||||
report.SSHDetected = true
|
report.SSHDetected = true
|
||||||
|
@ -48,7 +50,9 @@ func (sps *SSHProtocolScanner) ScanProtocol(hiddenService string, osc *config.On
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
ssh.NewClientConn(conn, hiddenService+":22", config)
|
ssh.NewClientConn(conn, hiddenService+":22", config)
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
conn, err = utils.GetNetworkConnection(hiddenService, 22, osc.TorProxyAddress, osc.Timeout)
|
conn, err = utils.GetNetworkConnection(hiddenService, 22, osc.TorProxyAddress, osc.Timeout)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
reader := bufio.NewReader(conn)
|
reader := bufio.NewReader(conn)
|
||||||
|
@ -58,6 +62,8 @@ func (sps *SSHProtocolScanner) ScanProtocol(hiddenService string, osc *config.On
|
||||||
osc.LogInfo(fmt.Sprintf("Found SSH Banner: %s (%s)", banner))
|
osc.LogInfo(fmt.Sprintf("Found SSH Banner: %s (%s)", banner))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -18,18 +18,20 @@ func (sps *TLSProtocolScanner) ScanProtocol(hiddenService string, osc *config.On
|
||||||
osc.LogInfo("Failed to connect to service on port 443\n")
|
osc.LogInfo("Failed to connect to service on port 443\n")
|
||||||
report.TLSDetected = false
|
report.TLSDetected = false
|
||||||
} else {
|
} else {
|
||||||
osc.LogInfo("Found TLS Endpoint\n")
|
osc.LogInfo("Found TLS Endpoint\n")
|
||||||
report.TLSDetected = true
|
report.TLSDetected = true
|
||||||
config := &tls.Config{
|
config := &tls.Config{
|
||||||
InsecureSkipVerify:true,
|
InsecureSkipVerify: true,
|
||||||
}
|
}
|
||||||
tlsConn := tls.Client(conn, config)
|
tlsConn := tls.Client(conn, config)
|
||||||
tlsConn.Write([]byte("GET / HTTP/1.1\r\n\r\n"))
|
tlsConn.Write([]byte("GET / HTTP/1.1\r\n\r\n"))
|
||||||
for _, certificate := range tlsConn.ConnectionState().PeerCertificates {
|
for _, certificate := range tlsConn.ConnectionState().PeerCertificates {
|
||||||
osc.LogInfo(fmt.Sprintf("Found Certificate %v \n", certificate))
|
osc.LogInfo(fmt.Sprintf("Found Certificate %v \n", certificate))
|
||||||
report.Certificates = append(report.Certificates, *certificate)
|
report.Certificates = append(report.Certificates, *certificate)
|
||||||
}
|
}
|
||||||
tlsConn.Close()
|
tlsConn.Close()
|
||||||
|
}
|
||||||
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
}
|
}
|
||||||
conn.Close()
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,5 +22,7 @@ func (vncps *VNCProtocolScanner) ScanProtocol(hiddenService string, osc *config.
|
||||||
// TODO: Actual Analysis
|
// TODO: Actual Analysis
|
||||||
report.VNCDetected = true
|
report.VNCDetected = true
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,7 +22,9 @@ func (rps *XMPPProtocolScanner) ScanProtocol(hiddenService string, osc *config.O
|
||||||
// TODO: Actual Analysis
|
// TODO: Actual Analysis
|
||||||
report.XMPPDetected = true
|
report.XMPPDetected = true
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
// XMPP
|
// XMPP
|
||||||
osc.LogInfo(fmt.Sprintf("Checking %s XMPP(5223)\n", hiddenService))
|
osc.LogInfo(fmt.Sprintf("Checking %s XMPP(5223)\n", hiddenService))
|
||||||
conn, err = utils.GetNetworkConnection(hiddenService, 5223, osc.TorProxyAddress, osc.Timeout)
|
conn, err = utils.GetNetworkConnection(hiddenService, 5223, osc.TorProxyAddress, osc.Timeout)
|
||||||
|
@ -33,5 +35,7 @@ func (rps *XMPPProtocolScanner) ScanProtocol(hiddenService string, osc *config.O
|
||||||
// TODO: Actual Analysis
|
// TODO: Actual Analysis
|
||||||
report.XMPPDetected = true
|
report.XMPPDetected = true
|
||||||
}
|
}
|
||||||
conn.Close()
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,11 +1,11 @@
|
||||||
package report
|
package report
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/x509"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"github.com/s-rah/onionscan/utils"
|
"github.com/s-rah/onionscan/utils"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"time"
|
"time"
|
||||||
"crypto/x509"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type ExifTag struct {
|
type ExifTag struct {
|
||||||
|
@ -62,8 +62,8 @@ type OnionScanReport struct {
|
||||||
PageTitle string `json:"pageTitle"`
|
PageTitle string `json:"pageTitle"`
|
||||||
ResponseHeaders map[string]string `json:"responseHeaders"`
|
ResponseHeaders map[string]string `json:"responseHeaders"`
|
||||||
|
|
||||||
// TLS
|
// TLS
|
||||||
Certificates []x509.Certificate `json:"certificates"`
|
Certificates []x509.Certificate `json:"certificates"`
|
||||||
|
|
||||||
//Bitcoin
|
//Bitcoin
|
||||||
BitcoinAddresses []string `json:"bitcoinAddresses"`
|
BitcoinAddresses []string `json:"bitcoinAddresses"`
|
||||||
|
|
Loading…
Reference in New Issue