Skip to content

cloud(aws,gcp,azure,etc) and waf(cloudflare,etc) detector

Notifications You must be signed in to change notification settings

hanhanhanz/Offpremise

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Offpremise

Offpremise perform infrastructure fingerprinting to determine type of cloud/waf provider of an IP. it works by checking input IP and compare it to lists of subnet owned by cloud provider's. The Subnet list (mostly) only contain public IP reservable by third party such as IP for ec2 or IP utilize as cloudflare WAF. This list obtained either by official publication of the cloud provider, or by fetching from ipinfo (onlly few of them publish their subnet lists). Inspired by cf-check

The script purpose of use are:

  • classify remote asset for recon proccess, so cloud recon/exploit process doesn't need to performed if the asset's not compatible
  • avoid portscan waf, because the result will be deceptive anyway

Current cloud/waf provider supported for check are

  • GCP
  • AWS
  • Azure
  • AliCloud
  • DO
  • Linode
  • Vultr
  • Cloudflare
  • Sucuri
  • Imperva

Requirement

Python3 with standard lib

Usage

python3 offpremise.py 129.186.0.1

Notes

An IP can categorize more than once in cloud provider's subnet list, the first one come out in the subnet list will be the one printed It do not accept domain as input, you can utilize dnsx to find the domain's IP.

python3 offpremise.py  $(echo https://github.com/ | dnsx -ns -a  -resp-only -silent)

Todo

  • list IP as input
  • update subnet list byscript
  • loadbalancer IP??

About

cloud(aws,gcp,azure,etc) and waf(cloudflare,etc) detector

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages