lodash 中文文档 lodash 中文文档
英文官网 (opens new window)
GitHub (opens new window)
英文官网 (opens new window)
GitHub (opens new window)
  • 简介
  • 数组
  • 集合
  • 函数
  • 语言
  • 数学
  • 数字
  • 对象
  • Seq
  • 字符串
  • 实用函数
  • Properties

AQUATONE


Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface.

Installation


Install Google Chrome or Chromium browser -- Note:Google Chrome is currently giving unreliable results when running in headlessmode, so it is recommended to install Chromium for the best results.
Download the latest release of Aquatone for your operating system.
Uncompress the zip file and move the aquatone binary to your desired location. You probably want to move it to a location in your $PATH for easier use.

Compiling the source code


If you for some reason don't trust the pre-compiled binaries, you can also compile the code yourself. You are on your own if you want to do this. I do not support compiling problems. Good luck with it!

Usage


Command-line options:


  1. ``` sh
  2.   -chrome-path string
  3.      Full path to the Chrome/Chromium executable to use. By default, aquatone will search for Chrome or Chromium
  4.   -debug
  5.      Print debugging information
  6.   -http-timeout int
  7.      Timeout in miliseconds for HTTP requests (default 3000)
  8.   -nmap
  9.      Parse input as Nmap/Masscan XML
  10.   -out string
  11.      Directory to write files to (default ".")
  12.   -ports string
  13.      Ports to scan on hosts. Supported list aliases: small, medium, large, xlarge (default "80,443,8000,8080,8443")
  14.   -proxy string
  15.      Proxy to use for HTTP requests
  16.   -resolution string
  17.      screenshot resolution (default "1440,900")
  18.   -save-body
  19.      Save response bodies to files (default true)
  20.   -scan-timeout int
  21.      Timeout in miliseconds for port scans (default 100)
  22.   -screenshot-timeout int
  23.      Timeout in miliseconds for screenshots (default 30000)
  24.   -session string
  25.      Load Aquatone session file and generate HTML report
  26.   -silent
  27.      Suppress all output except for errors
  28.   -template-path string
  29.      Path to HTML template to use for report
  30.   -threads int
  31.      Number of concurrent threads (default number of logical CPUs)
  32.   -version
  33.      Print current Aquatone version

  34. ```

Giving Aquatone data


Aquatone is designed to be as easy to use as possible and to integrate with your existing toolset with no or minimal glue. Aquatone is started by piping output of a command into the tool. It doesn't really care how the piped data looks as URLs, domains, and IP addresses will be extracted with regular expression pattern matching. This means that you can pretty much give it output of any tool you use for host discovery.

IPs, hostnames and domain names in the data will undergo scanning for ports that are typically used for web services and transformed to URLs with correct scheme.  If the data contains URLs, they are assumed to be alive and do not undergo port scanning.

Example:

  1. ``` sh
  2. $ cat targets.txt | aquatone

  3. ```

Output


When Aquatone is done processing the target hosts, it has created a bunch of files and folders in the current directory:

aquatone_report.html: An HTML report to open in a browser that displays all the collected screenshots and response headers clustered by similarity.
aquatone_urls.txt: A file containing all responsive URLs. Useful for feeding into other tools.
aquatone_session.json: A file containing statistics and page data. Useful for automation.
headers/: A folder with files containing raw response headers from processed targets
html/: A folder with files containing the raw response bodies from processed targets. If you are processing a large amount of hosts, and don't need this for further analysis, you can disable this with the -save-body=false flag to save some disk space.
screenshots/: A folder with PNG screenshots of the processed targets

The output can easily be zipped up and shared with others or archived.

Changing the output destination


If you don't want Aquatone to create files in the current working directory, you can specify a different location with the -out flag:

  1. ``` sh
  2. $ cat hosts.txt | aquatone -out ~/aquatone/example.com

  3. ```

It is also possible to set a permanent default output destination by defining an environment variable:

  1. ``` sh
  2. export AQUATONE_OUT_PATH="~/aquatone"

  3. ```

Specifying ports to scan


Be default, Aquatone will scan target hosts with a small list of commonly used HTTP ports: 80, 443, 8000, 8080 and 8443. You can change this to your own list of ports with the -ports flag:

  1. ``` sh
  2. $ cat hosts.txt | aquatone -ports 80,443,3000,3001

  3. ```

Aquatone also supports aliases of built-in port lists to make it easier for you:

small: 80, 443
medium: 80, 443, 8000, 8080, 8443 (same as default)
large: 80, 81, 443, 591, 2082, 2087, 2095, 2096, 3000, 8000, 8001, 8008, 8080, 8083, 8443, 8834, 8888
xlarge: 80, 81, 300, 443, 591, 593, 832, 981, 1010, 1311, 2082, 2087, 2095, 2096, 2480, 3000, 3128, 3333, 4243, 4567, 4711, 4712, 4993, 5000, 5104, 5108, 5800, 6543, 7000, 7396, 7474, 8000, 8001, 8008, 8014, 8042, 8069, 8080, 8081, 8088, 8090, 8091, 8118, 8123, 8172, 8222, 8243, 8280, 8281, 8333, 8443, 8500, 8834, 8880, 8888, 8983, 9000, 9043, 9060, 9080, 9090, 9091, 9200, 9443, 9800, 9981, 12443, 16080, 18091, 18092, 20720, 28017

Example:

  1. ``` sh
  2. $ cat hosts.txt | aquatone -ports large

  3. ```

Usage examples


Aquatone is designed to play nicely with all kinds of tools. Here's some examples:

Amass DNS enumeration


Amass is currently my preferred tool for enumerating DNS. It uses a bunch of OSINT sources as well as active brute-forcing and clever permutations to quickly identify hundreds, if not thousands, of subdomains on a  domain:

  1. ``` shell
  2. $ amass -active -brute -o hosts.txt -d yahoo.com
  3. alerts.yahoo.com
  4. ads.yahoo.com
  5. am.yahoo.com
  6. - - - SNIP - - -
  7. prd-vipui-01.infra.corp.gq1.yahoo.com
  8. cp103.mail.ir2.yahoo.com
  9. prd-vipui-01.infra.corp.bf1.yahoo.com
  10. $ cat hosts.txt | aquatone
  11. ```

There are plenty of other DNS enumeration tools out there and Aquatone should work just as well with any other tool:

Sublist3r
Subfinder
Knock
Fierce
Gobuster

Nmap or Masscan


Aquatone can make a report on hosts scanned with the Nmap or Masscan portscanner. Simply feed Aquatone the XML output and give it the -nmap flag to tell it to parse the input as Nmap/Masscan XML:

  1. ``` sh
  2. $ cat scan.xml | aquatone -nmap

  3. ```

Credits


Thanks to EdOverflow for the can-i-take-over-xyz project which Aquatone's domain takeover capability is based on.
Thanks to Elbert Alias for the Wappalyzer project's technology fingerprints which Aquatone's technology fingerprinting capability is based on.
Last Updated: 2023-07-07 08:37:56