Skip to content

Latest commit

 

History

History
39 lines (32 loc) · 1.41 KB

README.md

File metadata and controls

39 lines (32 loc) · 1.41 KB

Offpremise

Offpremise perform infrastructure fingerprinting to determine type of cloud/waf provider of an IP. it works by checking input IP and compare it to lists of subnet owned by cloud provider's. The Subnet list (mostly) only contain public IP reservable by third party such as IP for ec2 or IP utilize as cloudflare WAF. This list obtained either by official publication of the cloud provider, or by fetching from ipinfo (onlly few of them publish their subnet lists). Inspired by cf-check

The script purpose of use are:

  • classify remote asset for recon proccess, so cloud recon/exploit process doesn't need to performed if the asset's not compatible
  • avoid portscan waf, because the result will be deceptive anyway

Current cloud/waf provider supported for check are

  • GCP
  • AWS
  • Azure
  • AliCloud
  • DO
  • Linode
  • Vultr
  • Cloudflare
  • Sucuri
  • Imperva

Requirement

Python3 with standard lib

Usage

python3 offpremise.py 129.186.0.1

Notes

An IP can categorize more than once in cloud provider's subnet list, the first one come out in the subnet list will be the one printed It do not accept domain as input, you can utilize dnsx to find the domain's IP.

python3 offpremise.py  $(echo https://github.com/ | dnsx -ns -a  -resp-only -silent)

Todo

  • list IP as input
  • update subnet list byscript
  • loadbalancer IP??