Skip to main content

Faraday cli package

Project description

Faraday on the terminal

Use faraday directly from your favorite terminal

Install from source

git clone https://github.com/infobyte/faraday-cli.git
cd faraday-cli
pip install .

Install from pip

pip install faraday-cli

Use it like a command

Get help

Get help of any command

$ faraday-cli help create_ws
usage: create_ws [-h] [-d] workspace_name

Create Workspace

positional arguments:
  workspace_name     Workspace name

optional arguments:
  -h, --help         show this help message and exit
  -d, --dont-select  Dont select after create

Login

Configure auth for farday-cli

$ faraday-cli auth

Example

View faraday-cli status

$ faraday-cli status
FARADAY SERVER         IGNORE SSL    VERSION    VALID TOKEN    WORKSPACE
---------------------  ------------  ---------  -------------  -----------
http://localhost:5985  False         corp-3.12  

Create a workspace

When you create a workspace by default is selected as active, unless you use the "-d" flag

$ faraday-cli create_ws some_name
✔ Created workspace: some_name

Select active workspace

$ faraday-cli select_ws some_name
✔ Selected workspace: some_name

List workspaces

$ faraday-cli list_ws
NAME         HOSTS    SERVICES    VULNS  ACTIVE    PUBLIC    READONLY
---------  -------  ----------  -------  --------  --------  ----------
some_name       14          13       39  True      False     False

Delete a workspace

$ faraday-cli delete_ws some_name

List hosts of a workspace

$ faraday-cli list_host
  ID  IP           OS       HOSTNAMES          SERVICES  VULNS
----  -----------  -------  ---------------  ----------  -------
 574  127.0.0.1    unknown                            1  3
 566  127.0.0.10   unknown                            1  3
 569  127.0.0.11   unknown                            1  3
 568  127.0.0.12   unknown                            1  3
 570  127.0.0.13   unknown                            1  3
 576  127.0.0.2    unknown                            1  3
 565  127.0.0.3    unknown                            1  3
 572  127.0.0.4    unknown                            1  3
 573  127.0.0.5    unknown                            1  3
 567  127.0.0.6    unknown                            1  3
 571  127.0.0.7    unknown                            1  3
 564  127.0.0.8    unknown                            1  3
 575  127.0.0.9    unknown                            1  3
 590  58.76.184.4  unknown  www.googlec.com           0  -

Get host

$ faraday-cli get_host 574

$ faraday-cli get_host 574
Host:
  ID  IP         OS       HOSTNAMES    OWNER    OWNED      VULNS
----  ---------  -------  -----------  -------  -------  -------
 574  127.0.0.1  unknown               faraday  False          3

Services:
  ID  NAME    DESCRIPTION    PROTOCOL      PORT  VERSION    STATUS      VULNS
----  ------  -------------  ----------  ------  ---------  --------  -------
2638  ssh                    tcp             22  unknown    open            2

Vulnerabilities:
   ID  NAME                                      SEVERITY    STATUS    CONFIRMED    TOOL
-----  ----------------------------------------  ----------  --------  -----------  -------
13509  SSH Weak Encryption Algorithms Supported  MED         opened    False        Openvas
13510  SSH Weak MAC Algorithms Supported         LOW         opened    False        Openvas
13511  TCP timestamps                            LOW         opened    False        Openvas

Create hosts

$ faraday-cli create_host -d \''[{"ip": "stan.local", "description": "some server"}]'\'

Or pipe it

$ echo '[{"ip": "1.1.1.5", "description": "some text"}]' | faraday-cli create_host --stdin

The escaping of the single quotes (\') is only needed when using it as a command. In the shell or using pipes it not necessary

Delete host

$ faraday-cli delete_host HOST_ID

Import vulnerabilities from tool report

$ faraday-cli process_report "/path/to/report.xml"

Example

Import vulnerabilities from command

$ faraday-cli ping -c 1 www.google.com

Example

List agents

$ faraday-cli list_agent
  id  name      active    status    executors
----  --------  --------  --------  -----------
   8  internal  True      online    nmap

Get agent executors

$ faraday-cli get_agent 8
  id  name      active    status
----  --------  --------  --------
   8  internal  True      online
Executors:
  id  name    parameters
----  ------  ------------
   9  nmap    target

Run executor

$ faraday-cli run_executor -a 1 -e nmap -p \''{"target": "www.google.com"}'\'
Run executor: internal/nmap [{'successful': True}]

Different output

Most of the commands support different ways to show output

  • In json (-j)
  • In a pretty table (-p)
$ faraday-cli list_ws
NAME         HOSTS    SERVICES    VULNS  ACTIVE    PUBLIC    READONLY
---------  -------  ----------  -------  --------  --------  ----------
some_name       14          13       39  True      False     False

$ faraday-cli list_ws -p
+-----------+---------+------------+---------+----------+----------+------------+
| NAME      |   HOSTS |   SERVICES |   VULNS | ACTIVE   | PUBLIC   | READONLY   |
|-----------+---------+------------+---------+----------+----------+------------|
| some_name |      14 |         13 |      39 | True     | False    | False      |
+-----------+---------+------------+---------+----------+----------+------------+


$ faraday-cli list_ws -j
[
    {
        "update_date": "2020-12-04T18:46:46.473892+00:00",
        "name": "some_name",
        "scope": [],
        "_id": 116,
        "id": 116,
        "public": false,
        "readonly": false,
        "active_agents_count": 0,
        "duration": {
            "start_date": null,
            "end_date": null
        },
        "stats": {
            "code_vulns": 0,
            "critical_vulns": 0,
            "unclassified_vulns": 0,
            "hosts": 14,
            "medium_vulns": 13,
            "high_vulns": 0,
            "web_vulns": 0,
            "low_vulns": 26,
            "info_vulns": 0,
            "total_vulns": 39,
            "services": 13,
            "std_vulns": 39
        },
        "create_date": "2020-12-04T18:46:46.453040+00:00",
        "description": "",
        "active": true,
        "customer": ""
    }
]

Specify workspace

The commands use by default the active workspace, but you can specify other with the "-w" parameter

Continuous scan your assets with faraday

For example run nmap for all the hosts in faraday that listen on the 443 port and import the results back to faraday

$ faraday-cli list_host --port 443 -ip | nmap -iL - -oX /tmp/nmap.xml  && faraday-cli process_report /tmp/nmap.xml

Use it like a shell

Faraday-cli can be used as a shell and have all the same commands you have as a cli

Example

With Faraday commercial version

If you have a Faraday commercial version you can automate report generation and download

You can filter vulnerabilities

  • --ignore-info (ignore info/unclassified vulnerabilities)
  • --severity (only include vulnerabilities with the selected severities)
  • --confirmed (only include confirmed vulnerabilities)
$ faraday-cli generate_executive_report -t \'"generic_default.docx (generic)"\'  --title title --summary summary --enterprise company  -o /tmp/test.docx  --ignore-info
Report generated: /tmp/test.docx

1.0.1 [Jan 4th, 2021]:

  • Fix error in list_host command

1.0.0 [Dec 28th, 2020]:

  • Add List Services command
  • Change the import command/report message
  • Add support for executive reports
  • Show in status if token is valid

0.1.0 [Aug 28th, 2020]:

  • First version released, use with caution as it is still beta phase.
  • Access a faraday server from your CLI, your CI o any other bash interpreter.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

faraday-cli-1.0.1.tar.gz (33.5 kB view details)

Uploaded Source

Built Distribution

faraday_cli-1.0.1-py3-none-any.whl (39.5 kB view details)

Uploaded Python 3

File details

Details for the file faraday-cli-1.0.1.tar.gz.

File metadata

  • Download URL: faraday-cli-1.0.1.tar.gz
  • Upload date:
  • Size: 33.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.13.0 pkginfo/1.4.2 requests/2.21.0 setuptools/40.8.0 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.7.3

File hashes

Hashes for faraday-cli-1.0.1.tar.gz
Algorithm Hash digest
SHA256 afc53421076c1290f3f64e1674b4cdba020408d6093b94d50a82711a6136cb1c
MD5 cd6d124f164381ce0a47d9f044dcfb5e
BLAKE2b-256 f4e3474d724aba23fed5062de62d3ad81fbd74af65040c618ca690a4dc2096f1

See more details on using hashes here.

File details

Details for the file faraday_cli-1.0.1-py3-none-any.whl.

File metadata

  • Download URL: faraday_cli-1.0.1-py3-none-any.whl
  • Upload date:
  • Size: 39.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.13.0 pkginfo/1.4.2 requests/2.21.0 setuptools/40.8.0 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.7.3

File hashes

Hashes for faraday_cli-1.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 4990c06665d8c88a50293fa936dfa856cef63a847a4657d2376fa13a29970f92
MD5 06cecbdc70ee396cd529505814b3cf8e
BLAKE2b-256 9dda72f53e06e902b67a38d986528863803be8f8edb895ba98d358879b929bfa

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page