Bile-suite
The BiLE suite includes a number of PERL scripts that can be used by a
Penetration Tester to aid in the enumeration phase of a test. BiLE
itself stands for Bi-directional Link Extraction utilities. The suite of
tools essentially can be used in the footprinting process to find both
obvious and non-obvious relationships between disparate. With this
information a Pen Tester may then decide to try and access sites with
close realtionships to the target as a means of a stepping stone into
the target network.
Note: - This process depends on the fact that the linked sites you plan
to attack to get thru to your target are actually owned by the target
company and are in the scope of the test.
The BiLE suite is available from
here.
Installation.
There is one requirement to enable the suite of perl scripts to function
correctly and that is httrack, the website copying application which is
available from
here.
To install httrack:
tar -zxvf httrack-3.40-2.tar.gz
./configure
make make install
To install BiLE:
tar -zxvf BilePublic.gz
tar -zxvf BiLE-suite.gz
Execution:
To identify links between sites we use the BiLE.pl script:
Usage BiLE.pl <site> <outfile> root@hacker Bile]# perl
BiLE.pl www.blackhat.com blackhat
This produces 2 text files
blackhat.mine and blackhat.walrus. The latter file details just
the links between the sites in the format target_site:linked_site i.e.
www.blackhat.com:blogs.technet.com
www.blackhat.com:taosecurity.blogspot.com
www.blackhat.com:abcnews.go.com
www.blackhat.com:blogs.washingtonpost.com
www.blackhat.com:www.eweek.com
www.blackhat.com:www.securityfocus.com
www.blackhat.com:www.infoworld.com www.blackhat.com:blackhat.com
www.blackhat.com:www.informationweek.com
www.blackhat.com:biz.yahoo.com www.blackhat.com:cnet.com.au
www.blackhat.com:technology.guardian.co.uk
www.blackhat.com:www.wired.com
www.blackhat.com:cfp.blackhat.com www.blackhat.com:www.gcn.com
www.blackhat.com:www.pcworld.com
www.blackhat.com:www.feedforall.com blackhat.com:www.tsok.net blackhat.com:cfp.blackhat.com blackhat.com:www.blackhat.com blackhat.com:blackhat.com
blackhat.com:www.securecomputing.com
blogs.washingtonpost.com:www.projecthopeharmony.org
blogs.washingtonpost.com:media.washingtonpost.com
The former details sites that
links from:
====> Link
from: [abcnews.go.com] ====> Link
from: [biz.yahoo.com] ====> Link
from: [blackhat.com] ====> Link
from: [blogs.technet.com] ====> Link
from: [blogs.washingtonpost.com] ====> Link
from: [cfp.blackhat.com] ====> Link
from: [cnet.com.au] ====> Link
from: [taosecurity.blogspot.com] ====> Link
from: [technology.guardian.co.uk]
With this information we can then try and determine the weight of the
link between sites, utilising BiLE-weigh.pl:
Usage: perl BiLE-weigh.pl
domain.com output.file.from.bile.mine root@hacker Bile]# perl
BiLE-weigh.pl www.blackhat.com blackhat.mine
The file blackhat.mine.sorted is then created:
www.blackhat.com:332.0625 blackhat.com:204.375 cfp.blackhat.com:68.4375 www.tsok.net:49.6875
www.securecomputing.com:49.6875 www.wired.com:18.75 www.securityfocus.com:18.75 www.pcworld.com:18.75 www.infoworld.com:18.75 www.informationweek.com:18.75 www.gcn.com:18.75 www.feedforall.com:18.75 www.eweek.com:18.75
technology.guardian.co.uk:18.75
taosecurity.blogspot.com:18.75 cnet.com.au:18.75
blogs.washingtonpost.com:18.75 blogs.technet.com:18.75 abcnews.go.com:18.75
ad.doubleclick.net:9.43627450980392 www.cnet.com.au:9.375 cgi2.cnet.com.au:9.375
w1.buysub.com:8.33333333333333 www.taosecurity.com:6.25 www.blogger.com:6.25 purl.org:6.25 feeds.wired.com:6.25
blogs.msdn.com:5.79044117647059 www.ziffdavis.com:4.6875 www.zdmcirc.com:4.6875
www.windowsclusters.org:4.6875 www.gapingvoid.com:4.6875 virtualteched.com:4.6875
rssnewsapps.ziffdavis.com:4.6875
common.ziffdavisinternet.com:4.6875
www.washingtonpost.com:4.56730769230769
Obviously the higher the number the more of a link between each sites
and hence the relationship.
Other tools that come in this suite include:
vet-IPrange.pl
This script performs DNS lookups for a set of DNS names. The IP
addresses obtained are stored and a DNS lookup is performed on a second
set of DNS names. If the IP addresses returned match any from the
first query they are written to file. This tool is very useful for
determining the use of virtual hosting and grouping of domains.
Usage: perl vet-IPrange.pl [input file] [true domain file] [output
file] <range>
vet-mx.pl
As vet-IPrange, this script queries mx records to interpret if any
relationships between domains can be detected.
Usage: perl vet-mx.pl [input file] [true domain file] [output
file]
exp-tld.pl
This script takes a given list of domain names and tries to determine if
any are valid in other TLD's.
Usage: perl exp-tld.pl [input file] [output file]
|