Thanks to visit codestin.com
Credit goes to github.com

Skip to content
This repository was archived by the owner on Sep 4, 2025. It is now read-only.
/ l9explore Public archive

l9explore - Digs the dirt

License

LeakIX/l9explore

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

63 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

l9explore

GitHub Release Follow on Twitter

l9explore is a plugin based tool doing deep exploration on a wide range of protocols. It can be used to expose leaks, misconfigurations and vulnerabilities on any IP network.

It is the last layer in the l9 tool suite.

Disclaimer & Responsible Use Agreement

This software is an open-source security scanning tool provided "as is," without any warranty of any kind, express or implied. The developers and contributors of this project disclaim all liability and responsibility for any damage, direct or indirect, resulting from the use or misuse of this software.

Permitted Use & User Responsibility

This tool is intended for security professionals, researchers, and system administrators to identify vulnerabilities and assess the security posture of systems that they own or have explicit, written permission to test.

By downloading, installing, or using this software, you agree to the following terms:

  • Authorization is Required: You will only use this tool to scan networks, applications, and systems for which you have obtained prior, explicit, and verifiable authorization from the system owner.

  • Legal Compliance: You will use this software in strict compliance with all applicable local, state, national, and international laws and regulations.

  • No Malicious Intent: You will not use this software for any malicious or illegal purposes, including but not limited to, unauthorized access, data exfiltration, disruption of services, or any other activity that could be considered a cybercrime.

Unauthorized scanning of computer systems is illegal and can lead to severe civil and criminal penalties. The developers and contributors of this project do not condone any illegal use of this software and will not be held responsible for your actions.

Your use of this software is your own responsibility and at your own risk. If you do not agree to these terms, you are not permitted to use this software.

Features

  • Deep protocol exploration
  • Plugin based system
  • Low memory/CPU footprint
  • Multistage (WIP)

Current plugins

Plugin Protocols Stage Description Author
apachestatus_http http http Checks for apache status pages
configjson_http http http Scans for valid config.json files
dotenv_http http http Scans for valid .env files
gitconfig_http http http Scans for valid .git/config files
idxconfig_http http http Scans for /idx_config directories with text files
laraveltelescope_http http http Scans for open Laravel debuggers
phpinfo_http http http Scans for valid /phpinfo.php files
mysql_open mysql open Connects and checks for default credentials
mysql_explore mysql explore Connects and list databases, sizes
mongo_open mongo open Connects and checks for open instance
mongo_explore mongo explore Connects and list collections, sizes
elasticsearch_open elasticsearch,kibana open Connects and checks for open instance
elasticsearch_explore elasticsearch,kibana explore Connects and list index, sizes
redis_open redis open Connects and checks for open instance
kafka_open kafka} open Connects and lists topics
couchdb_open couchdb open Connects and list databases, sizes
firebase_http firebase open Connects to firebase and checks for .json files @phretor
confluence_version http http Scans confluence for vulnerable versions @HaboubiAnis
jira_plugin http http Scans Jira for vulnerable versions @HaboubiAnis
apache_traversal http http Scan servers for Apache LFI @HaboubiAnis
wpenum_http http http Enumerates Wordpress users from CVE-2017-5487
dotdsstore_open http open Reads .DS_Store to enumerate files and directories on target
metabase_http http open Checks metabase instances for CVE-2021-41277 @kaizensecurity

Usage

Explore services

l9explore service -h

Displays help for the list command.

Flag Description
--max-threads Maximum number of threads
--only-leak Only display leaks and discard service events
--explore-timeout Timeout for each plugin
--debug Displays developer information
--disable-explore-stage Disable explore stage plugins ( schema or file list/content)
--exfiltrate-stage Enable exfiltrate stage plugins ( dumps data to disk )
--option Use -o 'redis_password=test;...' to pass options to plugins, check each plugin's documentation for details

Installation Instructions

From Binary

The installation is easy. You can download the pre-built binaries for your platform from the Releases page.

This version has our stock plugins embedded.

▶ chmod +x l9explore-linux-64
▶ mv l9explore-linux-64 /usr/local/bin/l9explore

From Source

▶ GO111MODULE=on go get -u -v github.com/LeakIX/l9explore/cmd/l9explore
▶ ${GOPATH}/bin/l9explore -h

Running l9explore

l9explore speaks l9format. It reads from stdin and outputs results on stdout.

An usual pipeline would be to use it with l9tcpid to identify the protocols to explore.

$ ulimit -n 4096 
$ sudo ip4scout random -r 25000 -p 27017,9200|l9tcpid service --deep-http --max-threads=2048|tee services.json|l9explore service --explore-timeout 5s -t 2048 -l|tee leaks.json|l9filter transform -i l9 -o human
2020/12/15 01:28:56 selected input : l9
2020/12/15 01:28:56 selected output :  human
2020/12/15 01:28:56 Recommended blacklist loaded
2020/12/15 01:28:56 30 networks in blacklist
2020/12/15 01:28:56 Loaded 2 ports to scan
2020/12/15 01:28:56 Using source port 7427
2020/12/15 01:28:56 Listening!
EVENT: leak IP: 200.104.19.66, PORT:9200, PROTO:elasticsearch, SSL:false
HTTP/1.1 200 OK
content-type: application/json; charset=UTF-8
content-length: 493

NoAuth
Cluster info:
...
EVENT: leak IP: 201.71.22.54, PORT:27017, PROTO:mongo, SSL:false
HTTP/1.0 200 OK
Connection: close
Content-Type: text/plain
Content-Length: 85
It looks like you are trying to access MongoDB over HTTP on the native driver port.
Found 1 collections:
Found collection "system.version"

EVENT: leak IP: 202.65.137.161, PORT:9200, PROTO:elasticsearch, SSL:false
HTTP/1.1 200 OK
content-type: application/json; charset=UTF-8
content-length: 493
NoAuth
Cluster info:
....

will :

  • Run ip4scout to get a list of 9200,27017 open ports
  • Run l9tcpid to identify "real" elasticsearch and mongodb servers
    • And save that output to services.json
  • Run l9explore and use each plugin against its protocol to output leak events.
    • And save that output to leaks.json
  • Use l9filter to translate l9format in a comprehensible output

Creating plugins

Checkout the l9plugin documentation on how to create your plugins.

Packages

No packages published

Languages