The client component of the Bug Bounty Reconnaissance Framework (BBRF)
Project description
Introduction
The Bug Bounty Reconnaissance Framework (BBRF) can be used to coordinate your reconnaissance workflows across multiple devices. For more background, read the original blog post.
If you are new to BBRF, you will need to deploy a BBRF server before you can make use of the client.
Get started
# install the client
pip install bbrf
# create the .bbrf folder
mkdir -p ~/.bbrf
# ensure you have the required configuration in ~/.bbrf/config.json
cat > ~/.bbrf/config.json << EOF
{
"username": "bbrf",
"password": "<your secure password>",
"couchdb": "https://<your-bbrf-server>/bbrf",
"slack_token": "<a slack token to receive notifications>",
"discord_webhook": "<your discord webhook if you want one>",
"ignore_ssl_errors": false
}
EOF
# other optional settings are {"debug":true, "slack_channel": "channel-name", "slack_webhook":"https://..."}
# create a new program
bbrf new test
# or continue with a program you have created before
bbrf use test
# define a scope for your program
bbrf inscope add '*.example.com' '*.sub.example.com' 'example.com'
bbrf outscope add 'blog.example.com' '*.dev.example.com'
# view the program in/out scope
bbrf scope in
bbrf scope out
# start a background listener to listen for changes and send alerts to Slack
# in production, you probably want this continuously running on a VPS somewhere
bbrf listen &
# add some domains manually
bbrf domain add www.example.com example.com some.dev.example.com www.example.com www.example.com thisisnotadomain.example
# note that bbrf automatically safeguards the data quality, e.g.
# it checks the program's in and out scope to see if entries
# should be processed or not, prevents duplicate entries in the database,
# and rejects all input that is not a valid domain
bbrf domains
# add a list of ips from a file by piping into bbrf
cat ips.txt | bbrf ip add -
# run a tool based on the program scope, store results in bbrf,
# and display a list of domains that have been added
bbrf scope in --wildcard --top | subfinder | bbrf domain add - --show-new
# retrieve a raw document from the bbrf server and format with jq
bbrf show www.example.com | jq
# update the outscope
bbrf outscope add www.example.com
# note that this does not automatically remove outscoped domains that
# were already in the database, so you will manually need to fix that!
bbrf domains | bbrf scope filter out | bbrf domain remove -
# discover all features of bbrf on the help page
bbrf -h
# Use dnsx to resolve unresolved domains across all your programs
# and store the results in bbrf, either by updating existing ips and domains,
# or by adding them if they are new
for p in $(bbrf programs); do
bbrf domains --view unresolved -p $p | \
dnsx -silent -a -resp | tr -d '[]' | tee \
>(awk '{print $1":"$2}' | bbrf domain update - -p $p -s dnsx) \
>(awk '{print $1":"$2}' | bbrf domain add - -p $p -s dnsx) \
>(awk '{print $2":"$1}' | bbrf ip add - -p $p -s dnsx) \
>(awk '{print $2":"$1}' | bbrf ip update - -p $p -s dnsx)
done
# view all resolved domains
bbrf domains --view resolved
Python module
To use BBRF in your Python projects, use the interface as follows:
from bbrf import BBRFClient as bbrf
# this will use the system's default ~/.bbrf/config.json file:
programs = bbrf('programs').run()
# to specify a custom configuration, provide a second argument:
conf = {
"username": "bbrf",
"password": "<your secure password>",
"couchdb": "https://<your-instance>/bbrf",
"slack_token": "<a slack token to receive notifications>",
"discord_webhook": "<your discord webhook>",
"ignore_ssl_errors": false
}
domains = bbrf('domains --view resolved', conf).run()
Dashboard
If you like browsing through your recon data with a GUI, you can make use of the BBRF dashboard on https://bbrf.me. Just plug in your server URL, username and password, and the dashboard will pull your data and make it searchable. Note that all communication to the server happens via your browser, so your data remains safe!
Advanced
Domains
BBRF will accept and store domains in any of the following input formats:
<domain>
<domain>:<ip>
<domain>:<ip>,<ip>,...
Note that adding the DNS resolutions of a domain in this way does not automatically store the IP in the IPs table, but that domains and ips are logically seperated in the client, which requires you to write your scripts so that they handle this distinction appropriately.
bbrf domain add www.example.com:1.1.1.1
bbrf domain update www.example.com:2.2.2.2,3.3.3.3
bbrf show www.example.com | jq
IPs
Similarly, you can store hostnames of an IP address by appending one or more domains with a colon:
<ip>
<ip>:<domain>
<ip>:<domain>,<domain>,...
Again, BBRF will make sure the provided hostnames are valid domain names before storing them, but will not add them to your list of domains for the program, nor does it validate these domains against the defined program scope. Instead, these domains are stored in a domains
property on the IP document:
bbrf ip add 1.1.1.1:www.example.com,sub.example.com
bbrf ip update 1.1.1.1:www.google.com,www.apple.com
bbrf show 1.1.1.1 | jq
URLs
BBRF will help you manage your URLs, and store their hostname, port, status code and content length for you:
bbrf url add 'https://www.example.com:8443/a' 'http://www.example.com/b' 'http://www.example.com/c 200 1234'
Two formats are accepted: <url>
or <url> <statuscode> <contentlength>
delimited by spaces.
The <url>
can be absolute or relative. A relative URL will require the -d <hostname>
flag to be specified or will be skipped. Whenever the -d
flag is set, it will compare that with the hostname parsed from the URL, and skip the URL if they do not match.
Relative URLs and URLs that do not specify a scheme (http://
or https://
) will always be interpreted with scheme http://
. If no port is found, ports 80 and 443 will be used as a default depending on the scheme.
The flag --show-new
will print a list of new and updated URLs if they were added, or if their status code and/or content length were updated respectively:
cat urls.txt | bbrf url add - --show-new
[UPDATED] https://sub.example.com:8443/b
[NEW] http://www.example.com/a
[NEW] http://www.example.com/c
To view a list of stored URLs of your active program, simply use:
bbrf urls
Or, to return URLs belonging to a specific host:
bbrf urls -d www.example.com
To list URLs across all programs, run:
bbrf urls --all
To print full URLs with the saved query strings:
bbrf urls --all --with-query
Services
To store services (i.e. open ports) in BBRF, provide the input formatted as ip:port
or ip:port:service
, and manually specify other properties by means of the tagging system (see below for more info about tags), e.g.:
bbrf service add 127.0.0.1:8443 127.0.0.1:8888 -t hostname:localhost -t protocol:tcp
bbrf service add 127.0.0.1:80:http 127.0.0.1:21:ftp -t hostname:localhost -t protocol:tcp
bbrf service add 127.0.0.1:22:ssh 127.0.0.1:53:domain 127.0.0.1:80 -t scanned:$(date +%s)
Note that services can only be stored for an IP address, and not as domain:port
for example. This avoids the complexity of mapping domains to IPs (especially when an IP address maps to more than one domain), while still allowing search operations supported by a mix of default properties and tags:
# get all known services on port 8443
bbrf services where port is 8443
# return services for which a tag has been manually provided
bbrf services where hostname is localhost
Tagging and querying
By setting custom properties for the different document types (programs, domains, ips, urls and services), you can specify e.g. the platform a program belongs to or the name of a team member that added a bunch of new domains.
To add tags to documents, specify a -t key:value
when creating a new domain, ip, url or service, or leave empty to remove the tag:
# add a custom tag to all domains
cat domains.txt | bbrf domain add - -t added_by:pieter -t from:domains.txt
# create an IP with a custom tag
bbrf ip add 1.2.3.4 -t added_by:pieter
# remove the tag
bbrf ip update 1.2.3.4 -t added_by:
Note that you can specify the same tag multiple times to store the tags as arrays. BBRF will follow the following rules to determine how to store tags:
- if a single
-t tag:value
is found, treat as a normal value; - if the same tag name is provided more than once, default to an array:
-t cname:one -t cname:two
- by default, overwrite existing values for the tags when updating, unless
--append-tags
is specified, in which case append new values to existing values:
bbrf domain update www.example.tld -t name:value
bbrf show www.example.tld | jq .tags # { "name": "value" }
bbrf domain update www.example.tld -t name:value2 -t name:value3
bbrf show www.example.tld | jq .tags # { "name": ["value2", "value3"] }
bbrf domain update www.example.tld -t name:value4 --append-tags
bbrf show www.example.tld | jq .tags # { "name": ["value2", "value3", "value4"] }
bbrf domain update www.example.tld -t name:
bbrf show www.example.tld | jq .tags # { }
To facilitate basic data querying, the BBRF server provides an indexed search based on all custom tags, as well as some default properties of all document types:
# search domains based on custom tags:
bbrf domains where added_by is pieter --all
bbrf domains where last_updated is before 1610698911
bbrf domains where last_scan is after 2021-01-01 -p myprogram
# or search the properties that are available by design:
bbrf domains where ip is 1.1.1.1
bbrf ips where domain is www.example.com
bbrf urls where port is 443
bbrf services where port is 22
This works on domains, ips, urls and services and will search based on text-based comparisons as is defined in the Unicode Collation Algorithm as implemented by Couchdb.
Since all values are stored as text, this allows date comparison if you store dates as unix timestamps or in a ISO-8601 format e.g. 2021-01-15T09:02:40.628Z
.
That also means, however, that for example "20"
comes after "1000"
, which makes this less suitable for integer comparison. So if you want to store integers, you may want to use padded zeros at the front to ensure that 0020
comes before 1000
.
Dynamic program inference
Use the dynamic program name -p @INFER
to infer the program name based on other properties if you're unable to specify the program flag yourself for some reason; this is currently supported for the following operations:
bbrf ip add 1.1.1.1:example.tld -p @INFER
will set the IP's program name to the same as the domain example.tld if it already exists;bbrf domain add some.example.tld:1.2.3.4 -p @INFER
will set the domain's program name to the same as 1.2.3.4 if it already exists - note that this will bypass the scope validation of the program, because the program name is inferred just before writing to the database.bbrf domain add some.example.tld some.other.tld -p @INFER
will add the domains to whatever program scope matches the input;bbrf url add http://this.example.tld https://that.some.tld/robots.txt -p @INFER
will add the URLs to whatever program has the domain in scope;
BBRF Listener
In order to process changes and alerts as they are pushed to the data store, you need to have an active listener running somewhere:
bbrf listen
This will start listening for changes on the BBRF server and push notifications to your configured Slack instance. Note that this will fail e.g. when the BBRF server is temporarily unavailable or in case of certificate errors, so you may want to loop this to auto-start in case of issues.
Custom execution hooks
The BBRF listener will also execute custom local scripts when it sees new or updated ips, domains, urls and/or services. It will automatically look for executable .sh
files in the following locations:
~/.bbrf/hooks/ip/new/
,~/.bbrf/hooks/ip/update/
,~/.bbrf/hooks/domain/new/
,~/.bbrf/hooks/domain/update/
,~/.bbrf/hooks/url/new/
,~/.bbrf/hooks/url/update/
,~/.bbrf/hooks/service/new/
,~/.bbrf/hooks/service/update/
,
For example, here is a custom execution hook that will resolve newly added domains and store the results back in BBRF. Find more examples in docs/hooks
.
#!/bin/bash
#
# BBRF hook - save to ~/.bbrf/hooks/domain/new/resolve.sh
# and make sure it is executable: chmod +x resolve.sh
#
domains=$@
printf '%s\n' ${domains[@]} | dnsx -silent -a -resp | tr -d '[]' | tee \
>(awk '{print $1":"$2}' | bbrf domain update -) \
>(awk '{print $2":"$1}' | bbrf ip add - -p @INFER) \
>(awk '{print $2":"$1}' | bbrf ip update -);
Proxy configuration
Since version 1.2, BBRF allows you to store and retrieve proxy configurations per program. This feature was designed to integrate with my OpenVPN via SOCKS5 proxy setup, but can be used with other proxy setups independently.
For example, configure your proxy settings in BBRF as follows:
# add a proxy with name 'hackerone' and a valid proxy URL
bbrf proxy set hackerone socks5://user:pass@yourserver.com:1080
Update a program's proxy settings with the custom tag proxy
as follows:
# use the same name as the name of the configured proxy
bbrf program update my_hackerone_program -t proxy:hackerone
Get the proxy settings of a program with bbrf proxy -p my_hackerone_program
. For example, you can update your automation scripts to always send traffic through the right proxy as follows:
# note that the use of double quotes will allow this to work even if no proxy is configured for the current program
curl -x "$(bbrf proxy)" ifconfig.co
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file bbrf-1.3.2.tar.gz
.
File metadata
- Download URL: bbrf-1.3.2.tar.gz
- Upload date:
- Size: 34.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.8.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | dc7ae2138c8a74fd3651cf80bfbf35e398d9fddb6676cef84f89c2048ae5dfc6 |
|
MD5 | 05316eac0996ab47e9c1f5f53798e16e |
|
BLAKE2b-256 | 4c36d778d3fc0260fc35cd6d725445ea0bba7f5c5409e1f47aa9b73a2a71c893 |
File details
Details for the file bbrf-1.3.2-py3-none-any.whl
.
File metadata
- Download URL: bbrf-1.3.2-py3-none-any.whl
- Upload date:
- Size: 52.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.8.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9a029817708deba7212fe858dd2e788b952535cf2495127c013aef13cd2b2412 |
|
MD5 | 4fd98d4bc171ac683b2e0c047c69be2f |
|
BLAKE2b-256 | 1c56b0e55717d2b3cf9dcafc0d8632987af9c2df4ab1d96dceff3b4277e6f1dc |