Removed PGP source.

This commit is contained in:
Lee Baird 2019-02-14 15:35:30 -06:00
parent 381b9f7aae
commit a264ade32f
5 changed files with 6 additions and 74 deletions

View file

@ -6,7 +6,7 @@
* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | * * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| * * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
* * * *
* theHarvester 3.0.6 v282 * * theHarvester 3.0.6 v284 *
* Coded by Christian Martorella * * Coded by Christian Martorella *
* Edge-Security Research * * Edge-Security Research *
* cmartorella@edge-security.com * * cmartorella@edge-security.com *
@ -53,8 +53,6 @@ Passive:
* netcraft: Netcraft Data Mining * netcraft: Netcraft Data Mining
* pgp: PGP key server - mit.edu
* securityTrails: Security Trails search engine, the world's largest repository<br> * securityTrails: Security Trails search engine, the world's largest repository<br>
of historical DNS data (Requires API key, see below.) - www.securitytrails.com of historical DNS data (Requires API key, see below.) - www.securitytrails.com

View file

@ -2,18 +2,18 @@
'bingsearch', 'bingsearch',
'censys', 'censys',
'crtsh', 'crtsh',
'dogpilesearch', 'cymon',
'dnssearch', 'dnssearch',
'dogpilesearch',
'duckduckgosearch', 'duckduckgosearch',
'exaleadsearch', 'exaleadsearch',
'googleCSE',
'googlecertificates', 'googlecertificates',
'googleCSE',
'googlesearch', 'googlesearch',
'huntersearch', 'huntersearch',
'intelxsearch', 'intelxsearch',
'linkedinsearch', 'linkedinsearch',
'netcraft', 'netcraft',
'pgpsearch',
'port_scanner', 'port_scanner',
'securitytrailssearch', 'securitytrailssearch',
'shodansearch', 'shodansearch',

View file

@ -1,34 +0,0 @@
from lib.core import *
from parsers import myparser
import requests
class SearchPgp:
def __init__(self, word):
self.word = word
self.results = ""
self.server = 'pgp.mit.edu'
self.hostname = 'pgp.mit.edu'
def process(self):
print('\tSearching results.')
try:
url = 'http://' + self.server + '/pks/lookup?search=' + self.word + '&op=index'
headers = {
'Host': self.hostname,
'User-agent': Core.get_user_agent()
}
h = requests.get(url=url, headers=headers)
self.results = h.text
self.results += self.results
except Exception as e:
print('Unable to connect to PGP server: ', str(e))
def get_emails(self):
rawres = myparser.Parser(self.results, self.word)
return rawres.emails()
def get_hostnames(self):
rawres = myparser.Parser(self.results, self.word)
return rawres.hostnames()

View file

@ -50,7 +50,7 @@ def banner():
print("* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *") print("* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *")
print("* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *") print("* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *")
print('* *') print('* *')
print('* theHarvester 3.0.6 v282 *') print('* theHarvester 3.0.6 v284 *')
print('* Coded by Christian Martorella *') print('* Coded by Christian Martorella *')
print('* Edge-Security Research *') print('* Edge-Security Research *')
print('* cmartorella@edge-security.com *') print('* cmartorella@edge-security.com *')
@ -74,7 +74,6 @@ def get_supportedengines():
'intelx', 'intelx',
'linkedin', 'linkedin',
'netcraft', 'netcraft',
'pgp',
'securityTrails', 'securityTrails',
'threatcrowd', 'threatcrowd',
'trello', 'trello',

View file

@ -49,7 +49,7 @@ def start():
parser.add_argument('-b', '--source', help='''baidu, bing, bingapi, censys, crtsh, cymon, parser.add_argument('-b', '--source', help='''baidu, bing, bingapi, censys, crtsh, cymon,
dogpile, duckduckgo, google, googleCSE, dogpile, duckduckgo, google, googleCSE,
google-certificates, hunter, intelx, google-certificates, hunter, intelx,
linkedin, netcraft, pgp, securityTrails, threatcrowd, linkedin, netcraft, securityTrails, threatcrowd,
trello, twitter, vhost, virustotal, yahoo, all''') trello, twitter, vhost, virustotal, yahoo, all''')
args = parser.parse_args() args = parser.parse_args()
@ -287,20 +287,6 @@ def start():
db = stash.stash_manager() db = stash.stash_manager()
db.store_all(word, all_hosts, 'host', 'netcraft') db.store_all(word, all_hosts, 'host', 'netcraft')
elif engineitem == 'pgp':
print('\033[94m[*] Searching PGP key server. \033[0m')
try:
search = pgpsearch.SearchPgp(word)
search.process()
all_emails = filter(search.get_emails())
hosts = filter(search.get_hostnames())
all_hosts.extend(hosts)
db = stash.stash_manager()
db.store_all(word, all_hosts, 'host', 'pgp')
db.store_all(word, all_emails, 'email', 'pgp')
except Exception:
pass
elif engineitem == 'securityTrails': elif engineitem == 'securityTrails':
print('\033[94m[*] Searching SecurityTrails. \033[0m') print('\033[94m[*] Searching SecurityTrails. \033[0m')
from discovery import securitytrailssearch from discovery import securitytrailssearch
@ -556,23 +542,6 @@ def start():
db = stash.stash_manager() db = stash.stash_manager()
db.store_all(word, all_hosts, 'host', 'netcraft') db.store_all(word, all_hosts, 'host', 'netcraft')
print('\033[94m[*] Searching PGP key server. \033[0m')
try:
search = pgpsearch.SearchPgp(word)
search.process()
emails = filter(search.get_emails())
hosts = filter(search.get_hostnames())
sethosts = set(hosts)
uniquehosts = list(sethosts) # Remove duplicates.
all_hosts.extend(uniquehosts)
db = stash.stash_manager()
db.store_all(word, all_hosts, 'host', 'PGP')
all_emails.extend(emails)
db = stash.stash_manager()
db.store_all(word, all_emails, 'email', 'PGP')
except Exception:
pass
print('\033[94m[*] Searching SecurityTrails. \033[0m') print('\033[94m[*] Searching SecurityTrails. \033[0m')
from discovery import securitytrailssearch from discovery import securitytrailssearch
try: try: