souleyez 2.43.26__py3-none-any.whl → 2.43.34__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of souleyez might be problematic. Click here for more details.

Files changed (358) hide show
  1. souleyez/__init__.py +1 -2
  2. souleyez/ai/__init__.py +21 -15
  3. souleyez/ai/action_mapper.py +249 -150
  4. souleyez/ai/chain_advisor.py +116 -100
  5. souleyez/ai/claude_provider.py +29 -28
  6. souleyez/ai/context_builder.py +80 -62
  7. souleyez/ai/executor.py +158 -117
  8. souleyez/ai/feedback_handler.py +136 -121
  9. souleyez/ai/llm_factory.py +27 -20
  10. souleyez/ai/llm_provider.py +4 -2
  11. souleyez/ai/ollama_provider.py +6 -9
  12. souleyez/ai/ollama_service.py +44 -37
  13. souleyez/ai/path_scorer.py +91 -76
  14. souleyez/ai/recommender.py +176 -144
  15. souleyez/ai/report_context.py +74 -73
  16. souleyez/ai/report_service.py +84 -66
  17. souleyez/ai/result_parser.py +222 -229
  18. souleyez/ai/safety.py +67 -44
  19. souleyez/auth/__init__.py +23 -22
  20. souleyez/auth/audit.py +36 -26
  21. souleyez/auth/engagement_access.py +65 -48
  22. souleyez/auth/permissions.py +14 -3
  23. souleyez/auth/session_manager.py +54 -37
  24. souleyez/auth/user_manager.py +109 -64
  25. souleyez/commands/audit.py +40 -43
  26. souleyez/commands/auth.py +35 -15
  27. souleyez/commands/deliverables.py +55 -50
  28. souleyez/commands/engagement.py +47 -28
  29. souleyez/commands/license.py +32 -23
  30. souleyez/commands/screenshots.py +36 -32
  31. souleyez/commands/user.py +82 -36
  32. souleyez/config.py +52 -44
  33. souleyez/core/credential_tester.py +87 -81
  34. souleyez/core/cve_mappings.py +179 -192
  35. souleyez/core/cve_matcher.py +162 -148
  36. souleyez/core/msf_auto_mapper.py +100 -83
  37. souleyez/core/msf_chain_engine.py +294 -256
  38. souleyez/core/msf_database.py +153 -70
  39. souleyez/core/msf_integration.py +679 -673
  40. souleyez/core/msf_rpc_client.py +40 -42
  41. souleyez/core/msf_rpc_manager.py +77 -79
  42. souleyez/core/msf_sync_manager.py +241 -181
  43. souleyez/core/network_utils.py +22 -15
  44. souleyez/core/parser_handler.py +34 -25
  45. souleyez/core/pending_chains.py +114 -63
  46. souleyez/core/templates.py +158 -107
  47. souleyez/core/tool_chaining.py +9526 -2879
  48. souleyez/core/version_utils.py +79 -94
  49. souleyez/core/vuln_correlation.py +136 -89
  50. souleyez/core/web_utils.py +33 -32
  51. souleyez/data/wordlists/ad_users.txt +378 -0
  52. souleyez/data/wordlists/api_endpoints_large.txt +769 -0
  53. souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
  54. souleyez/data/wordlists/lfi_payloads.txt +82 -0
  55. souleyez/data/wordlists/passwords_brute.txt +1548 -0
  56. souleyez/data/wordlists/passwords_crack.txt +2479 -0
  57. souleyez/data/wordlists/passwords_spray.txt +386 -0
  58. souleyez/data/wordlists/subdomains_large.txt +5057 -0
  59. souleyez/data/wordlists/usernames_common.txt +694 -0
  60. souleyez/data/wordlists/web_dirs_large.txt +4769 -0
  61. souleyez/detection/__init__.py +1 -1
  62. souleyez/detection/attack_signatures.py +12 -17
  63. souleyez/detection/mitre_mappings.py +61 -55
  64. souleyez/detection/validator.py +97 -86
  65. souleyez/devtools.py +23 -10
  66. souleyez/docs/README.md +4 -4
  67. souleyez/docs/api-reference/cli-commands.md +2 -2
  68. souleyez/docs/developer-guide/adding-new-tools.md +562 -0
  69. souleyez/docs/user-guide/auto-chaining.md +30 -8
  70. souleyez/docs/user-guide/getting-started.md +1 -1
  71. souleyez/docs/user-guide/installation.md +26 -3
  72. souleyez/docs/user-guide/metasploit-integration.md +2 -2
  73. souleyez/docs/user-guide/rbac.md +1 -1
  74. souleyez/docs/user-guide/scope-management.md +1 -1
  75. souleyez/docs/user-guide/siem-integration.md +1 -1
  76. souleyez/docs/user-guide/tools-reference.md +1 -8
  77. souleyez/docs/user-guide/worker-management.md +1 -1
  78. souleyez/engine/background.py +1239 -535
  79. souleyez/engine/base.py +4 -1
  80. souleyez/engine/job_status.py +17 -49
  81. souleyez/engine/log_sanitizer.py +103 -77
  82. souleyez/engine/manager.py +38 -7
  83. souleyez/engine/result_handler.py +2200 -1550
  84. souleyez/engine/worker_manager.py +50 -41
  85. souleyez/export/evidence_bundle.py +72 -62
  86. souleyez/feature_flags/features.py +16 -20
  87. souleyez/feature_flags.py +5 -9
  88. souleyez/handlers/__init__.py +11 -0
  89. souleyez/handlers/base.py +188 -0
  90. souleyez/handlers/bash_handler.py +277 -0
  91. souleyez/handlers/bloodhound_handler.py +243 -0
  92. souleyez/handlers/certipy_handler.py +311 -0
  93. souleyez/handlers/crackmapexec_handler.py +486 -0
  94. souleyez/handlers/dnsrecon_handler.py +344 -0
  95. souleyez/handlers/enum4linux_handler.py +400 -0
  96. souleyez/handlers/evil_winrm_handler.py +493 -0
  97. souleyez/handlers/ffuf_handler.py +815 -0
  98. souleyez/handlers/gobuster_handler.py +1114 -0
  99. souleyez/handlers/gpp_extract_handler.py +334 -0
  100. souleyez/handlers/hashcat_handler.py +444 -0
  101. souleyez/handlers/hydra_handler.py +563 -0
  102. souleyez/handlers/impacket_getuserspns_handler.py +343 -0
  103. souleyez/handlers/impacket_psexec_handler.py +222 -0
  104. souleyez/handlers/impacket_secretsdump_handler.py +426 -0
  105. souleyez/handlers/john_handler.py +286 -0
  106. souleyez/handlers/katana_handler.py +425 -0
  107. souleyez/handlers/kerbrute_handler.py +298 -0
  108. souleyez/handlers/ldapsearch_handler.py +636 -0
  109. souleyez/handlers/lfi_extract_handler.py +464 -0
  110. souleyez/handlers/msf_auxiliary_handler.py +408 -0
  111. souleyez/handlers/msf_exploit_handler.py +380 -0
  112. souleyez/handlers/nikto_handler.py +413 -0
  113. souleyez/handlers/nmap_handler.py +821 -0
  114. souleyez/handlers/nuclei_handler.py +359 -0
  115. souleyez/handlers/nxc_handler.py +371 -0
  116. souleyez/handlers/rdp_sec_check_handler.py +353 -0
  117. souleyez/handlers/registry.py +292 -0
  118. souleyez/handlers/responder_handler.py +232 -0
  119. souleyez/handlers/service_explorer_handler.py +434 -0
  120. souleyez/handlers/smbclient_handler.py +344 -0
  121. souleyez/handlers/smbmap_handler.py +510 -0
  122. souleyez/handlers/smbpasswd_handler.py +296 -0
  123. souleyez/handlers/sqlmap_handler.py +1116 -0
  124. souleyez/handlers/theharvester_handler.py +601 -0
  125. souleyez/handlers/web_login_test_handler.py +327 -0
  126. souleyez/handlers/whois_handler.py +277 -0
  127. souleyez/handlers/wpscan_handler.py +554 -0
  128. souleyez/history.py +32 -16
  129. souleyez/importers/msf_importer.py +106 -75
  130. souleyez/importers/smart_importer.py +208 -147
  131. souleyez/integrations/siem/__init__.py +10 -10
  132. souleyez/integrations/siem/base.py +17 -18
  133. souleyez/integrations/siem/elastic.py +108 -122
  134. souleyez/integrations/siem/factory.py +207 -80
  135. souleyez/integrations/siem/googlesecops.py +146 -154
  136. souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
  137. souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
  138. souleyez/integrations/siem/sentinel.py +107 -109
  139. souleyez/integrations/siem/splunk.py +246 -212
  140. souleyez/integrations/siem/wazuh.py +65 -71
  141. souleyez/integrations/wazuh/__init__.py +5 -5
  142. souleyez/integrations/wazuh/client.py +70 -93
  143. souleyez/integrations/wazuh/config.py +85 -57
  144. souleyez/integrations/wazuh/host_mapper.py +28 -36
  145. souleyez/integrations/wazuh/sync.py +78 -68
  146. souleyez/intelligence/__init__.py +4 -5
  147. souleyez/intelligence/correlation_analyzer.py +309 -295
  148. souleyez/intelligence/exploit_knowledge.py +661 -623
  149. souleyez/intelligence/exploit_suggestions.py +159 -139
  150. souleyez/intelligence/gap_analyzer.py +132 -97
  151. souleyez/intelligence/gap_detector.py +251 -214
  152. souleyez/intelligence/sensitive_tables.py +266 -129
  153. souleyez/intelligence/service_parser.py +137 -123
  154. souleyez/intelligence/surface_analyzer.py +407 -268
  155. souleyez/intelligence/target_parser.py +159 -162
  156. souleyez/licensing/__init__.py +6 -6
  157. souleyez/licensing/validator.py +17 -19
  158. souleyez/log_config.py +79 -54
  159. souleyez/main.py +1505 -687
  160. souleyez/migrations/fix_job_counter.py +16 -14
  161. souleyez/parsers/bloodhound_parser.py +41 -39
  162. souleyez/parsers/crackmapexec_parser.py +178 -111
  163. souleyez/parsers/dalfox_parser.py +72 -77
  164. souleyez/parsers/dnsrecon_parser.py +103 -91
  165. souleyez/parsers/enum4linux_parser.py +183 -153
  166. souleyez/parsers/ffuf_parser.py +29 -25
  167. souleyez/parsers/gobuster_parser.py +301 -41
  168. souleyez/parsers/hashcat_parser.py +324 -79
  169. souleyez/parsers/http_fingerprint_parser.py +350 -103
  170. souleyez/parsers/hydra_parser.py +131 -111
  171. souleyez/parsers/impacket_parser.py +231 -178
  172. souleyez/parsers/john_parser.py +98 -86
  173. souleyez/parsers/katana_parser.py +316 -0
  174. souleyez/parsers/msf_parser.py +943 -498
  175. souleyez/parsers/nikto_parser.py +346 -65
  176. souleyez/parsers/nmap_parser.py +262 -174
  177. souleyez/parsers/nuclei_parser.py +40 -44
  178. souleyez/parsers/responder_parser.py +26 -26
  179. souleyez/parsers/searchsploit_parser.py +74 -74
  180. souleyez/parsers/service_explorer_parser.py +279 -0
  181. souleyez/parsers/smbmap_parser.py +180 -124
  182. souleyez/parsers/sqlmap_parser.py +434 -308
  183. souleyez/parsers/theharvester_parser.py +75 -57
  184. souleyez/parsers/whois_parser.py +135 -94
  185. souleyez/parsers/wpscan_parser.py +278 -190
  186. souleyez/plugins/afp.py +44 -36
  187. souleyez/plugins/afp_brute.py +114 -46
  188. souleyez/plugins/ard.py +48 -37
  189. souleyez/plugins/bloodhound.py +95 -61
  190. souleyez/plugins/certipy.py +303 -0
  191. souleyez/plugins/crackmapexec.py +186 -85
  192. souleyez/plugins/dalfox.py +120 -59
  193. souleyez/plugins/dns_hijack.py +146 -41
  194. souleyez/plugins/dnsrecon.py +97 -61
  195. souleyez/plugins/enum4linux.py +91 -66
  196. souleyez/plugins/evil_winrm.py +291 -0
  197. souleyez/plugins/ffuf.py +166 -90
  198. souleyez/plugins/firmware_extract.py +133 -29
  199. souleyez/plugins/gobuster.py +387 -190
  200. souleyez/plugins/gpp_extract.py +393 -0
  201. souleyez/plugins/hashcat.py +100 -73
  202. souleyez/plugins/http_fingerprint.py +854 -267
  203. souleyez/plugins/hydra.py +566 -200
  204. souleyez/plugins/impacket_getnpusers.py +117 -69
  205. souleyez/plugins/impacket_psexec.py +84 -64
  206. souleyez/plugins/impacket_secretsdump.py +103 -69
  207. souleyez/plugins/impacket_smbclient.py +89 -75
  208. souleyez/plugins/john.py +86 -69
  209. souleyez/plugins/katana.py +313 -0
  210. souleyez/plugins/kerbrute.py +237 -0
  211. souleyez/plugins/lfi_extract.py +541 -0
  212. souleyez/plugins/macos_ssh.py +117 -48
  213. souleyez/plugins/mdns.py +35 -30
  214. souleyez/plugins/msf_auxiliary.py +253 -130
  215. souleyez/plugins/msf_exploit.py +239 -161
  216. souleyez/plugins/nikto.py +134 -78
  217. souleyez/plugins/nmap.py +275 -91
  218. souleyez/plugins/nuclei.py +180 -89
  219. souleyez/plugins/nxc.py +285 -0
  220. souleyez/plugins/plugin_base.py +35 -36
  221. souleyez/plugins/plugin_template.py +13 -5
  222. souleyez/plugins/rdp_sec_check.py +130 -0
  223. souleyez/plugins/responder.py +112 -71
  224. souleyez/plugins/router_http_brute.py +76 -65
  225. souleyez/plugins/router_ssh_brute.py +118 -41
  226. souleyez/plugins/router_telnet_brute.py +124 -42
  227. souleyez/plugins/routersploit.py +91 -59
  228. souleyez/plugins/routersploit_exploit.py +77 -55
  229. souleyez/plugins/searchsploit.py +91 -77
  230. souleyez/plugins/service_explorer.py +1160 -0
  231. souleyez/plugins/smbmap.py +122 -72
  232. souleyez/plugins/smbpasswd.py +215 -0
  233. souleyez/plugins/sqlmap.py +301 -113
  234. souleyez/plugins/theharvester.py +127 -75
  235. souleyez/plugins/tr069.py +79 -57
  236. souleyez/plugins/upnp.py +65 -47
  237. souleyez/plugins/upnp_abuse.py +73 -55
  238. souleyez/plugins/vnc_access.py +129 -42
  239. souleyez/plugins/vnc_brute.py +109 -38
  240. souleyez/plugins/web_login_test.py +417 -0
  241. souleyez/plugins/whois.py +77 -58
  242. souleyez/plugins/wpscan.py +173 -69
  243. souleyez/reporting/__init__.py +2 -1
  244. souleyez/reporting/attack_chain.py +411 -346
  245. souleyez/reporting/charts.py +436 -501
  246. souleyez/reporting/compliance_mappings.py +334 -201
  247. souleyez/reporting/detection_report.py +126 -125
  248. souleyez/reporting/formatters.py +828 -591
  249. souleyez/reporting/generator.py +386 -302
  250. souleyez/reporting/metrics.py +72 -75
  251. souleyez/scanner.py +35 -29
  252. souleyez/security/__init__.py +37 -11
  253. souleyez/security/scope_validator.py +175 -106
  254. souleyez/security/validation.py +223 -149
  255. souleyez/security.py +22 -6
  256. souleyez/storage/credentials.py +247 -186
  257. souleyez/storage/crypto.py +296 -129
  258. souleyez/storage/database.py +73 -50
  259. souleyez/storage/db.py +58 -36
  260. souleyez/storage/deliverable_evidence.py +177 -128
  261. souleyez/storage/deliverable_exporter.py +282 -246
  262. souleyez/storage/deliverable_templates.py +134 -116
  263. souleyez/storage/deliverables.py +135 -130
  264. souleyez/storage/engagements.py +109 -56
  265. souleyez/storage/evidence.py +181 -152
  266. souleyez/storage/execution_log.py +31 -17
  267. souleyez/storage/exploit_attempts.py +93 -57
  268. souleyez/storage/exploits.py +67 -36
  269. souleyez/storage/findings.py +48 -61
  270. souleyez/storage/hosts.py +176 -144
  271. souleyez/storage/migrate_to_engagements.py +43 -19
  272. souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
  273. souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
  274. souleyez/storage/migrations/_003_add_execution_log.py +14 -8
  275. souleyez/storage/migrations/_005_screenshots.py +13 -5
  276. souleyez/storage/migrations/_006_deliverables.py +13 -5
  277. souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
  278. souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
  279. souleyez/storage/migrations/_010_evidence_linking.py +17 -10
  280. souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
  281. souleyez/storage/migrations/_012_team_collaboration.py +34 -21
  282. souleyez/storage/migrations/_013_add_host_tags.py +12 -6
  283. souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
  284. souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
  285. souleyez/storage/migrations/_016_add_domain_field.py +10 -4
  286. souleyez/storage/migrations/_017_msf_sessions.py +16 -8
  287. souleyez/storage/migrations/_018_add_osint_target.py +10 -6
  288. souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
  289. souleyez/storage/migrations/_020_add_rbac.py +36 -15
  290. souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
  291. souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
  292. souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
  293. souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
  294. souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
  295. souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
  296. souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
  297. souleyez/storage/migrations/__init__.py +26 -26
  298. souleyez/storage/migrations/migration_manager.py +19 -19
  299. souleyez/storage/msf_sessions.py +100 -65
  300. souleyez/storage/osint.py +17 -24
  301. souleyez/storage/recommendation_engine.py +269 -235
  302. souleyez/storage/screenshots.py +33 -32
  303. souleyez/storage/smb_shares.py +136 -92
  304. souleyez/storage/sqlmap_data.py +183 -128
  305. souleyez/storage/team_collaboration.py +135 -141
  306. souleyez/storage/timeline_tracker.py +122 -94
  307. souleyez/storage/wazuh_vulns.py +64 -66
  308. souleyez/storage/web_paths.py +33 -37
  309. souleyez/testing/credential_tester.py +221 -205
  310. souleyez/ui/__init__.py +1 -1
  311. souleyez/ui/ai_quotes.py +12 -12
  312. souleyez/ui/attack_surface.py +2439 -1516
  313. souleyez/ui/chain_rules_view.py +914 -382
  314. souleyez/ui/correlation_view.py +312 -230
  315. souleyez/ui/dashboard.py +2382 -1130
  316. souleyez/ui/deliverables_view.py +148 -62
  317. souleyez/ui/design_system.py +13 -13
  318. souleyez/ui/errors.py +49 -49
  319. souleyez/ui/evidence_linking_view.py +284 -179
  320. souleyez/ui/evidence_vault.py +393 -285
  321. souleyez/ui/exploit_suggestions_view.py +555 -349
  322. souleyez/ui/export_view.py +100 -66
  323. souleyez/ui/gap_analysis_view.py +315 -171
  324. souleyez/ui/help_system.py +105 -97
  325. souleyez/ui/intelligence_view.py +436 -293
  326. souleyez/ui/interactive.py +23434 -10286
  327. souleyez/ui/interactive_selector.py +75 -68
  328. souleyez/ui/log_formatter.py +47 -39
  329. souleyez/ui/menu_components.py +22 -13
  330. souleyez/ui/msf_auxiliary_menu.py +184 -133
  331. souleyez/ui/pending_chains_view.py +336 -172
  332. souleyez/ui/progress_indicators.py +5 -3
  333. souleyez/ui/recommendations_view.py +195 -137
  334. souleyez/ui/rule_builder.py +343 -225
  335. souleyez/ui/setup_wizard.py +678 -284
  336. souleyez/ui/shortcuts.py +217 -165
  337. souleyez/ui/splunk_gap_analysis_view.py +452 -270
  338. souleyez/ui/splunk_vulns_view.py +139 -86
  339. souleyez/ui/team_dashboard.py +498 -335
  340. souleyez/ui/template_selector.py +196 -105
  341. souleyez/ui/terminal.py +6 -6
  342. souleyez/ui/timeline_view.py +198 -127
  343. souleyez/ui/tool_setup.py +264 -164
  344. souleyez/ui/tutorial.py +202 -72
  345. souleyez/ui/tutorial_state.py +40 -40
  346. souleyez/ui/wazuh_vulns_view.py +235 -141
  347. souleyez/ui/wordlist_browser.py +260 -107
  348. souleyez/ui.py +464 -312
  349. souleyez/utils/tool_checker.py +427 -367
  350. souleyez/utils.py +33 -29
  351. souleyez/wordlists.py +134 -167
  352. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/METADATA +1 -1
  353. souleyez-2.43.34.dist-info/RECORD +443 -0
  354. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/WHEEL +1 -1
  355. souleyez-2.43.26.dist-info/RECORD +0 -379
  356. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/entry_points.txt +0 -0
  357. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/licenses/LICENSE +0 -0
  358. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,232 @@
1
+ #!/usr/bin/env python3
2
+ """
3
+ Responder handler.
4
+
5
+ Consolidates parsing and display logic for Responder credential capture jobs.
6
+ """
7
+ import logging
8
+ import os
9
+ from typing import Any, Dict, Optional
10
+
11
+ import click
12
+
13
+ from souleyez.engine.job_status import STATUS_DONE, STATUS_NO_RESULTS
14
+ from souleyez.handlers.base import BaseToolHandler
15
+
16
+ logger = logging.getLogger(__name__)
17
+
18
+
19
+ class ResponderHandler(BaseToolHandler):
20
+ """Handler for Responder credential capture jobs."""
21
+
22
+ tool_name = "responder"
23
+ display_name = "Responder"
24
+
25
+ # All handlers enabled
26
+ has_error_handler = True
27
+ has_warning_handler = True
28
+ has_no_results_handler = True
29
+ has_done_handler = True
30
+
31
+ def parse_job(
32
+ self,
33
+ engagement_id: int,
34
+ log_path: str,
35
+ job: Dict[str, Any],
36
+ host_manager: Optional[Any] = None,
37
+ findings_manager: Optional[Any] = None,
38
+ credentials_manager: Optional[Any] = None,
39
+ ) -> Dict[str, Any]:
40
+ """
41
+ Parse Responder job results.
42
+
43
+ Extracts captured NTLMv2 hashes and stores them.
44
+ """
45
+ try:
46
+ from souleyez.parsers.responder_parser import (
47
+ parse_responder,
48
+ store_responder_results,
49
+ )
50
+
51
+ target = job.get("target", "")
52
+ parsed = parse_responder(log_path, target)
53
+
54
+ job_id = job.get("id")
55
+ store_responder_results(parsed, engagement_id, job_id)
56
+
57
+ return {
58
+ "tool": "responder",
59
+ "status": (
60
+ STATUS_DONE
61
+ if parsed.get("credentials_captured", 0) > 0
62
+ else STATUS_NO_RESULTS
63
+ ),
64
+ "interface": target,
65
+ "credentials_captured": parsed.get("credentials_captured", 0),
66
+ "hash_files": parsed.get("hash_files", []), # For chaining to hashcat
67
+ "summary": parsed.get("summary", "No results"),
68
+ }
69
+
70
+ except Exception as e:
71
+ logger.error(f"Error parsing responder job: {e}")
72
+ return {"error": str(e)}
73
+
74
+ def display_done(
75
+ self,
76
+ job: Dict[str, Any],
77
+ log_path: str,
78
+ show_all: bool = False,
79
+ show_passwords: bool = False,
80
+ ) -> None:
81
+ """Display successful Responder results."""
82
+ try:
83
+ from souleyez.parsers.responder_parser import parse_responder
84
+
85
+ if not log_path or not os.path.exists(log_path):
86
+ return
87
+
88
+ interface = job.get("args", {}).get(
89
+ "interface", job.get("target", "unknown")
90
+ )
91
+ parsed = parse_responder(log_path, interface)
92
+
93
+ credentials = parsed.get("credentials", [])
94
+ summary = parsed.get("summary", "")
95
+
96
+ click.echo(click.style("=" * 70, fg="green"))
97
+ click.echo(click.style("RESPONDER RESULTS", bold=True, fg="green"))
98
+ click.echo(click.style("=" * 70, fg="green"))
99
+ click.echo()
100
+
101
+ # Summary
102
+ click.echo(click.style("Summary:", bold=True))
103
+ click.echo(f" {summary}")
104
+ click.echo()
105
+
106
+ # Show captured credentials
107
+ if credentials:
108
+ click.echo(
109
+ click.style(
110
+ f"Captured NTLMv2 Hashes ({len(credentials)}):",
111
+ bold=True,
112
+ fg="green",
113
+ )
114
+ )
115
+ max_show = None if show_all else 10
116
+ display_creds = (
117
+ credentials if max_show is None else credentials[:max_show]
118
+ )
119
+ for c in display_creds:
120
+ domain = c.get("domain", "")
121
+ username = c.get("username", "?")
122
+ protocol = c.get("protocol", "?")
123
+ if domain:
124
+ click.echo(
125
+ click.style(
126
+ f" [{protocol}] {domain}\\{username}", fg="green"
127
+ )
128
+ )
129
+ else:
130
+ click.echo(
131
+ click.style(f" [{protocol}] {username}", fg="green")
132
+ )
133
+ if max_show and len(credentials) > max_show:
134
+ click.echo(
135
+ click.style(
136
+ f" ... and {len(credentials) - max_show} more", dim=True
137
+ )
138
+ )
139
+ click.echo()
140
+ click.echo(
141
+ click.style(
142
+ " Tip: Crack these hashes with hashcat -m 5600", fg="cyan"
143
+ )
144
+ )
145
+ else:
146
+ click.echo(click.style(" No credentials captured.", fg="yellow"))
147
+
148
+ click.echo()
149
+ click.echo(click.style("=" * 70, fg="green"))
150
+ click.echo()
151
+
152
+ except Exception as e:
153
+ logger.debug(f"Error in display_done: {e}")
154
+
155
+ def display_warning(
156
+ self,
157
+ job: Dict[str, Any],
158
+ log_path: str,
159
+ log_content: Optional[str] = None,
160
+ ) -> None:
161
+ """Display warning status for Responder."""
162
+ click.echo(click.style("=" * 70, fg="yellow"))
163
+ click.echo(click.style("[WARNING] RESPONDER", bold=True, fg="yellow"))
164
+ click.echo(click.style("=" * 70, fg="yellow"))
165
+ click.echo()
166
+ click.echo(" Responder completed with warnings.")
167
+ click.echo(" Check raw logs for details (press 'r').")
168
+ click.echo()
169
+ click.echo(click.style("=" * 70, fg="yellow"))
170
+ click.echo()
171
+
172
+ def display_error(
173
+ self,
174
+ job: Dict[str, Any],
175
+ log_path: str,
176
+ log_content: Optional[str] = None,
177
+ ) -> None:
178
+ """Display error status for Responder."""
179
+ # Read log if not provided
180
+ if log_content is None and log_path and os.path.exists(log_path):
181
+ try:
182
+ with open(log_path, "r", encoding="utf-8", errors="replace") as f:
183
+ log_content = f.read()
184
+ except Exception:
185
+ log_content = ""
186
+
187
+ click.echo(click.style("=" * 70, fg="red"))
188
+ click.echo(click.style("[ERROR] RESPONDER FAILED", bold=True, fg="red"))
189
+ click.echo(click.style("=" * 70, fg="red"))
190
+ click.echo()
191
+
192
+ # Check for common responder errors
193
+ error_msg = None
194
+ if log_content:
195
+ if "Permission denied" in log_content or "root" in log_content.lower():
196
+ error_msg = "Permission denied - Responder requires root privileges"
197
+ elif "Address already in use" in log_content:
198
+ error_msg = "Port already in use - another service may be running"
199
+ elif "No such device" in log_content or "Interface" in log_content:
200
+ error_msg = "Invalid network interface - check interface name"
201
+ elif "cannot bind" in log_content.lower():
202
+ error_msg = "Cannot bind to port - check if ports are available"
203
+
204
+ if error_msg:
205
+ click.echo(f" {error_msg}")
206
+ else:
207
+ click.echo(" Responder failed - check raw logs for details (press 'r')")
208
+
209
+ click.echo()
210
+ click.echo(click.style("=" * 70, fg="red"))
211
+ click.echo()
212
+
213
+ def display_no_results(
214
+ self,
215
+ job: Dict[str, Any],
216
+ log_path: str,
217
+ ) -> None:
218
+ """Display no_results status for Responder."""
219
+ click.echo(click.style("=" * 70, fg="yellow"))
220
+ click.echo(click.style("RESPONDER RESULTS", bold=True, fg="yellow"))
221
+ click.echo(click.style("=" * 70, fg="yellow"))
222
+ click.echo()
223
+ click.echo(" No credentials captured.")
224
+ click.echo()
225
+ click.echo(click.style("Possible reasons:", dim=True))
226
+ click.echo(" - No LLMNR/NBT-NS/mDNS traffic on network")
227
+ click.echo(" - Network is using proper DNS infrastructure")
228
+ click.echo(" - Firewall blocking broadcast traffic")
229
+ click.echo(" - Try running for longer or during peak hours")
230
+ click.echo()
231
+ click.echo(click.style("=" * 70, fg="yellow"))
232
+ click.echo()
@@ -0,0 +1,434 @@
1
+ #!/usr/bin/env python3
2
+ """
3
+ Service Explorer handler.
4
+
5
+ Consolidates parsing and display logic for Service Explorer jobs.
6
+ """
7
+ import logging
8
+ import os
9
+ import re
10
+ from typing import Any, Dict, Optional
11
+
12
+ import click
13
+
14
+ from souleyez.engine.job_status import STATUS_DONE, STATUS_ERROR, STATUS_NO_RESULTS
15
+ from souleyez.handlers.base import BaseToolHandler
16
+
17
+ logger = logging.getLogger(__name__)
18
+
19
+
20
+ class ServiceExplorerHandler(BaseToolHandler):
21
+ """Handler for Service Explorer file/data browser jobs."""
22
+
23
+ tool_name = "service_explorer"
24
+ display_name = "Service Explorer"
25
+
26
+ # All handlers enabled
27
+ has_error_handler = True
28
+ has_warning_handler = True
29
+ has_no_results_handler = True
30
+ has_done_handler = True
31
+
32
+ def parse_job(
33
+ self,
34
+ engagement_id: int,
35
+ log_path: str,
36
+ job: Dict[str, Any],
37
+ host_manager: Optional[Any] = None,
38
+ findings_manager: Optional[Any] = None,
39
+ credentials_manager: Optional[Any] = None,
40
+ ) -> Dict[str, Any]:
41
+ """
42
+ Parse Service Explorer job results.
43
+
44
+ Extracts files/data discovered and stores findings.
45
+ """
46
+ try:
47
+ from souleyez.parsers.service_explorer_parser import (
48
+ parse_service_explorer_output,
49
+ extract_findings,
50
+ )
51
+
52
+ # Import managers if not provided
53
+ if host_manager is None:
54
+ from souleyez.storage.hosts import HostManager
55
+
56
+ host_manager = HostManager()
57
+ if findings_manager is None:
58
+ from souleyez.storage.findings import FindingsManager
59
+
60
+ findings_manager = FindingsManager()
61
+
62
+ target = job.get("target", "")
63
+
64
+ # Read log file
65
+ with open(log_path, "r", encoding="utf-8", errors="replace") as f:
66
+ output = f.read()
67
+
68
+ parsed = parse_service_explorer_output(output, target)
69
+
70
+ # Get or create host from target
71
+ host_id = None
72
+ host_target = parsed.get("target") or target
73
+ if host_target:
74
+ # Extract IP from URL if needed
75
+ if "://" in host_target:
76
+ from urllib.parse import urlparse
77
+
78
+ parsed_url = urlparse(host_target)
79
+ host_target = parsed_url.hostname or host_target
80
+
81
+ is_ip = re.match(r"^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$", host_target)
82
+
83
+ if is_ip:
84
+ host = host_manager.get_host_by_ip(engagement_id, host_target)
85
+ if host:
86
+ host_id = host["id"]
87
+ else:
88
+ host_id = host_manager.add_or_update_host(
89
+ engagement_id, {"ip": host_target, "status": "up"}
90
+ )
91
+
92
+ # Extract and store findings
93
+ findings_added = 0
94
+ if host_id:
95
+ findings = extract_findings(parsed)
96
+ protocol = parsed.get("protocol", "unknown")
97
+
98
+ for finding in findings:
99
+ findings_manager.add_finding(
100
+ engagement_id=engagement_id,
101
+ host_id=host_id,
102
+ finding_type=f"{protocol}_access",
103
+ severity=finding.get("severity"),
104
+ title=finding.get("title"),
105
+ description=finding.get("description"),
106
+ evidence=finding.get("evidence"),
107
+ tool="service_explorer",
108
+ )
109
+ findings_added += 1
110
+
111
+ # Determine status
112
+ if parsed.get("error"):
113
+ status = STATUS_ERROR
114
+ elif parsed.get("files_found", 0) > 0 or findings_added > 0:
115
+ status = STATUS_DONE
116
+ else:
117
+ status = STATUS_NO_RESULTS
118
+
119
+ return {
120
+ "tool": "service_explorer",
121
+ "status": status,
122
+ "protocol": parsed.get("protocol"),
123
+ "host": parsed.get("target"),
124
+ "files_found": parsed.get("files_found", 0),
125
+ "interesting_files": parsed.get("interesting_count", 0),
126
+ "downloaded_files": parsed.get("downloaded_count", 0),
127
+ "findings_added": findings_added,
128
+ "errors": parsed.get("errors", []),
129
+ }
130
+
131
+ except Exception as e:
132
+ logger.error(f"Error parsing service_explorer job: {e}")
133
+ return {"error": str(e)}
134
+
135
+ def display_done(
136
+ self,
137
+ job: Dict[str, Any],
138
+ log_path: str,
139
+ show_all: bool = False,
140
+ show_passwords: bool = False,
141
+ ) -> None:
142
+ """Display successful Service Explorer results."""
143
+ try:
144
+ from souleyez.parsers.service_explorer_parser import (
145
+ parse_service_explorer_output,
146
+ )
147
+
148
+ if not log_path or not os.path.exists(log_path):
149
+ return
150
+
151
+ with open(log_path, "r", encoding="utf-8", errors="replace") as f:
152
+ log_content = f.read()
153
+ parsed = parse_service_explorer_output(log_content, job.get("target", ""))
154
+
155
+ protocol = (parsed.get("protocol") or "SERVICE").upper()
156
+ files = parsed.get("files", [])
157
+ interesting = parsed.get("interesting_files", [])
158
+ downloaded = parsed.get("downloaded_files", [])
159
+
160
+ # Header
161
+ click.echo(click.style("=" * 70, fg="cyan"))
162
+ click.echo(
163
+ click.style(f"{protocol} SERVICE EXPLORATION", bold=True, fg="cyan")
164
+ )
165
+ click.echo(click.style("=" * 70, fg="cyan"))
166
+ click.echo()
167
+
168
+ # Connection info
169
+ if parsed.get("target"):
170
+ click.echo(click.style(f"Target: {parsed['target']}", bold=True))
171
+ if parsed.get("port"):
172
+ click.echo(f"Port: {parsed['port']}")
173
+ if parsed.get("username"):
174
+ click.echo(f"Username: {parsed['username']}")
175
+ click.echo()
176
+
177
+ # Server info (Redis/MongoDB)
178
+ if parsed.get("server_info"):
179
+ click.echo(click.style("Server Information:", bold=True, fg="blue"))
180
+ for key, value in parsed["server_info"].items():
181
+ if value is not None:
182
+ click.echo(f" {key}: {value}")
183
+ click.echo()
184
+
185
+ if not files and not interesting:
186
+ self.display_no_results(job, log_path)
187
+ return
188
+
189
+ # Summary
190
+ click.echo(click.style("Summary:", bold=True))
191
+ click.echo(f" Total Items: {parsed.get('files_found', len(files))}")
192
+ click.echo(
193
+ f" Interesting Files: {parsed.get('interesting_count', len(interesting))}"
194
+ )
195
+ click.echo(
196
+ f" Downloaded: {parsed.get('downloaded_count', len(downloaded))}"
197
+ )
198
+ click.echo()
199
+
200
+ # Interesting files (HIGH PRIORITY)
201
+ if interesting:
202
+ click.echo(
203
+ click.style(
204
+ f"Interesting Files ({len(interesting)}):", bold=True, fg="red"
205
+ )
206
+ )
207
+ max_show = None if show_all else 15
208
+ for item in (
209
+ interesting if max_show is None else interesting[:max_show]
210
+ ):
211
+ path = item.get("full_path", item.get("name", "?"))
212
+ size = item.get("size", 0)
213
+ size_str = self._format_size(size)
214
+ click.echo(f" {click.style(path, fg='yellow')} ({size_str})")
215
+ if max_show and len(interesting) > max_show:
216
+ click.echo(f" ... and {len(interesting) - max_show} more")
217
+ click.echo()
218
+
219
+ # Downloaded files
220
+ if downloaded:
221
+ click.echo(
222
+ click.style(
223
+ f"Downloaded Files ({len(downloaded)}):", bold=True, fg="green"
224
+ )
225
+ )
226
+ # Build evidence path
227
+ target_host = parsed.get("target", job.get("target", "unknown"))
228
+ proto = (parsed.get("protocol") or "files").lower()
229
+ evidence_dir = os.path.expanduser(
230
+ f"~/.souleyez/evidence/{target_host}/{proto}"
231
+ )
232
+ for path in downloaded[:10]:
233
+ filename = os.path.basename(path)
234
+ local_path = os.path.join(evidence_dir, filename)
235
+ click.echo(f" - {path}")
236
+ click.echo(f" → {click.style(local_path, fg='cyan')}")
237
+ if len(downloaded) > 10:
238
+ click.echo(f" ... and {len(downloaded) - 10} more")
239
+ click.echo()
240
+
241
+ # File tree (if show_all or limited)
242
+ if files and (show_all or len(files) <= 30):
243
+ click.echo(click.style("File Listing:", bold=True))
244
+ self._display_file_tree(files, show_all)
245
+ click.echo()
246
+
247
+ # Errors
248
+ if parsed.get("errors"):
249
+ click.echo(
250
+ click.style(
251
+ f"Errors ({len(parsed['errors'])}):", bold=True, fg="yellow"
252
+ )
253
+ )
254
+ for error in parsed["errors"][:5]:
255
+ click.echo(f" - {error[:100]}")
256
+ click.echo()
257
+
258
+ click.echo(click.style("=" * 70, fg="cyan"))
259
+ click.echo()
260
+
261
+ except Exception as e:
262
+ logger.debug(f"Error in display_done: {e}")
263
+
264
+ def _display_file_tree(self, files: list, show_all: bool = False) -> None:
265
+ """Display files in a tree-like structure."""
266
+ # Group by directory
267
+ dirs = {}
268
+ for item in files:
269
+ path = item.get("path", "/")
270
+ if path not in dirs:
271
+ dirs[path] = []
272
+ dirs[path].append(item)
273
+
274
+ max_dirs = None if show_all else 10
275
+ max_files_per_dir = None if show_all else 5
276
+ dirs_shown = 0
277
+
278
+ for dir_path, items in sorted(dirs.items()):
279
+ if max_dirs and dirs_shown >= max_dirs:
280
+ click.echo(f" ... and {len(dirs) - max_dirs} more directories")
281
+ break
282
+
283
+ click.echo(f" {click.style(dir_path, fg='blue')}/ ({len(items)} items)")
284
+ files_shown = 0
285
+
286
+ for item in items:
287
+ if max_files_per_dir and files_shown >= max_files_per_dir:
288
+ click.echo(f" ... and {len(items) - max_files_per_dir} more")
289
+ break
290
+
291
+ name = item.get("name", "?")
292
+ item_type = item.get("type", "file")
293
+ size = item.get("size", 0)
294
+ is_interesting = item.get("interesting", False)
295
+
296
+ if item_type == "directory":
297
+ click.echo(f" {click.style(name + '/', fg='blue')}")
298
+ elif is_interesting:
299
+ click.echo(
300
+ f" {click.style(name, fg='yellow')} ({self._format_size(size)})"
301
+ )
302
+ else:
303
+ click.echo(f" {name} ({self._format_size(size)})")
304
+
305
+ files_shown += 1
306
+
307
+ dirs_shown += 1
308
+
309
+ def _format_size(self, size: int) -> str:
310
+ """Format file size in human-readable form."""
311
+ if size < 1024:
312
+ return f"{size} B"
313
+ elif size < 1024 * 1024:
314
+ return f"{size / 1024:.1f} KB"
315
+ elif size < 1024 * 1024 * 1024:
316
+ return f"{size / (1024 * 1024):.1f} MB"
317
+ else:
318
+ return f"{size / (1024 * 1024 * 1024):.1f} GB"
319
+
320
+ def display_warning(
321
+ self,
322
+ job: Dict[str, Any],
323
+ log_path: str,
324
+ log_content: Optional[str] = None,
325
+ ) -> None:
326
+ """Display warning status for Service Explorer."""
327
+ click.echo(click.style("=" * 70, fg="yellow"))
328
+ click.echo(click.style("[WARNING] SERVICE EXPLORER", bold=True, fg="yellow"))
329
+ click.echo(click.style("=" * 70, fg="yellow"))
330
+ click.echo()
331
+ click.echo(" Exploration completed with warnings. Check raw logs for details.")
332
+ click.echo(" Press [r] to view raw logs.")
333
+ click.echo()
334
+ click.echo(click.style("=" * 70, fg="yellow"))
335
+ click.echo()
336
+
337
+ def display_error(
338
+ self,
339
+ job: Dict[str, Any],
340
+ log_path: str,
341
+ log_content: Optional[str] = None,
342
+ ) -> None:
343
+ """Display error status for Service Explorer."""
344
+ # Read log if not provided
345
+ if log_content is None and log_path and os.path.exists(log_path):
346
+ try:
347
+ with open(log_path, "r", encoding="utf-8", errors="replace") as f:
348
+ log_content = f.read()
349
+ except Exception:
350
+ log_content = ""
351
+
352
+ click.echo(click.style("=" * 70, fg="red"))
353
+ click.echo(click.style("[ERROR] SERVICE EXPLORER FAILED", bold=True, fg="red"))
354
+ click.echo(click.style("=" * 70, fg="red"))
355
+ click.echo()
356
+
357
+ # Check for common errors
358
+ error_msg = None
359
+ if log_content:
360
+ if (
361
+ "Connection refused" in log_content
362
+ or "connection failed" in log_content.lower()
363
+ ):
364
+ error_msg = "Connection refused - service may be down"
365
+ elif "timed out" in log_content.lower() or "timeout" in log_content.lower():
366
+ error_msg = "Connection timed out - target may be slow or filtering"
367
+ elif "not installed" in log_content.lower():
368
+ # Extract which package
369
+ match = re.search(r"(\w+)\s+not installed", log_content, re.IGNORECASE)
370
+ if match:
371
+ error_msg = f"Required package not installed: {match.group(1)}"
372
+ else:
373
+ error_msg = "Required package not installed"
374
+ elif (
375
+ "authentication" in log_content.lower()
376
+ or "login failed" in log_content.lower()
377
+ ):
378
+ error_msg = "Authentication failed - invalid credentials"
379
+ elif '"error"' in log_content:
380
+ # Try to extract JSON error
381
+ import json
382
+
383
+ try:
384
+ json_start = log_content.find("{")
385
+ if json_start >= 0:
386
+ data = json.loads(log_content[json_start:])
387
+ if data.get("error"):
388
+ error_msg = data["error"]
389
+ except Exception:
390
+ pass
391
+
392
+ if error_msg:
393
+ click.echo(f" {error_msg}")
394
+ else:
395
+ click.echo(" Exploration failed - see raw logs for details (press 'r')")
396
+
397
+ click.echo()
398
+ click.echo(click.style("=" * 70, fg="red"))
399
+ click.echo()
400
+
401
+ def display_no_results(
402
+ self,
403
+ job: Dict[str, Any],
404
+ log_path: str,
405
+ ) -> None:
406
+ """Display no_results status for Service Explorer."""
407
+ # Try to get protocol from job target
408
+ protocol = "SERVICE"
409
+ target = job.get("target", "")
410
+ if "://" in target:
411
+ protocol = target.split("://")[0].upper()
412
+
413
+ click.echo(click.style("=" * 70, fg="cyan"))
414
+ click.echo(click.style(f"{protocol} SERVICE EXPLORATION", bold=True, fg="cyan"))
415
+ click.echo(click.style("=" * 70, fg="cyan"))
416
+ click.echo()
417
+
418
+ if target:
419
+ click.echo(click.style(f"Target: {target}", bold=True))
420
+ click.echo()
421
+
422
+ click.echo(
423
+ click.style("Result: No files or data found", fg="yellow", bold=True)
424
+ )
425
+ click.echo()
426
+ click.echo(" The service was accessible but no files or data were found.")
427
+ click.echo()
428
+ click.echo(click.style("Tips:", dim=True))
429
+ click.echo(" - Try with credentials if available")
430
+ click.echo(" - Increase depth with --depth 5")
431
+ click.echo(" - Check if service requires specific paths")
432
+ click.echo()
433
+ click.echo(click.style("=" * 70, fg="cyan"))
434
+ click.echo()