souleyez 2.43.29__py3-none-any.whl → 3.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of souleyez might be problematic. Click here for more details.
- souleyez/__init__.py +1 -2
- souleyez/ai/__init__.py +21 -15
- souleyez/ai/action_mapper.py +249 -150
- souleyez/ai/chain_advisor.py +116 -100
- souleyez/ai/claude_provider.py +29 -28
- souleyez/ai/context_builder.py +80 -62
- souleyez/ai/executor.py +158 -117
- souleyez/ai/feedback_handler.py +136 -121
- souleyez/ai/llm_factory.py +27 -20
- souleyez/ai/llm_provider.py +4 -2
- souleyez/ai/ollama_provider.py +6 -9
- souleyez/ai/ollama_service.py +44 -37
- souleyez/ai/path_scorer.py +91 -76
- souleyez/ai/recommender.py +176 -144
- souleyez/ai/report_context.py +74 -73
- souleyez/ai/report_service.py +84 -66
- souleyez/ai/result_parser.py +222 -229
- souleyez/ai/safety.py +67 -44
- souleyez/auth/__init__.py +23 -22
- souleyez/auth/audit.py +36 -26
- souleyez/auth/engagement_access.py +65 -48
- souleyez/auth/permissions.py +14 -3
- souleyez/auth/session_manager.py +54 -37
- souleyez/auth/user_manager.py +109 -64
- souleyez/commands/audit.py +40 -43
- souleyez/commands/auth.py +35 -15
- souleyez/commands/deliverables.py +55 -50
- souleyez/commands/engagement.py +47 -28
- souleyez/commands/license.py +32 -23
- souleyez/commands/screenshots.py +36 -32
- souleyez/commands/user.py +82 -36
- souleyez/config.py +52 -44
- souleyez/core/credential_tester.py +87 -81
- souleyez/core/cve_mappings.py +179 -192
- souleyez/core/cve_matcher.py +162 -148
- souleyez/core/msf_auto_mapper.py +100 -83
- souleyez/core/msf_chain_engine.py +294 -256
- souleyez/core/msf_database.py +153 -70
- souleyez/core/msf_integration.py +679 -673
- souleyez/core/msf_rpc_client.py +40 -42
- souleyez/core/msf_rpc_manager.py +77 -79
- souleyez/core/msf_sync_manager.py +241 -181
- souleyez/core/network_utils.py +22 -15
- souleyez/core/parser_handler.py +34 -25
- souleyez/core/pending_chains.py +114 -63
- souleyez/core/templates.py +158 -107
- souleyez/core/tool_chaining.py +9564 -2881
- souleyez/core/version_utils.py +79 -94
- souleyez/core/vuln_correlation.py +136 -89
- souleyez/core/web_utils.py +33 -32
- souleyez/data/wordlists/ad_users.txt +378 -0
- souleyez/data/wordlists/api_endpoints_large.txt +769 -0
- souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
- souleyez/data/wordlists/lfi_payloads.txt +82 -0
- souleyez/data/wordlists/passwords_brute.txt +1548 -0
- souleyez/data/wordlists/passwords_crack.txt +2479 -0
- souleyez/data/wordlists/passwords_spray.txt +386 -0
- souleyez/data/wordlists/subdomains_large.txt +5057 -0
- souleyez/data/wordlists/usernames_common.txt +694 -0
- souleyez/data/wordlists/web_dirs_large.txt +4769 -0
- souleyez/detection/__init__.py +1 -1
- souleyez/detection/attack_signatures.py +12 -17
- souleyez/detection/mitre_mappings.py +61 -55
- souleyez/detection/validator.py +97 -86
- souleyez/devtools.py +23 -10
- souleyez/docs/README.md +4 -4
- souleyez/docs/api-reference/cli-commands.md +2 -2
- souleyez/docs/developer-guide/adding-new-tools.md +562 -0
- souleyez/docs/user-guide/auto-chaining.md +30 -8
- souleyez/docs/user-guide/getting-started.md +1 -1
- souleyez/docs/user-guide/installation.md +26 -3
- souleyez/docs/user-guide/metasploit-integration.md +2 -2
- souleyez/docs/user-guide/rbac.md +1 -1
- souleyez/docs/user-guide/scope-management.md +1 -1
- souleyez/docs/user-guide/siem-integration.md +1 -1
- souleyez/docs/user-guide/tools-reference.md +1 -8
- souleyez/docs/user-guide/worker-management.md +1 -1
- souleyez/engine/background.py +1239 -535
- souleyez/engine/base.py +4 -1
- souleyez/engine/job_status.py +17 -49
- souleyez/engine/log_sanitizer.py +103 -77
- souleyez/engine/manager.py +38 -7
- souleyez/engine/result_handler.py +2200 -1550
- souleyez/engine/worker_manager.py +50 -41
- souleyez/export/evidence_bundle.py +72 -62
- souleyez/feature_flags/features.py +16 -20
- souleyez/feature_flags.py +5 -9
- souleyez/handlers/__init__.py +11 -0
- souleyez/handlers/base.py +188 -0
- souleyez/handlers/bash_handler.py +277 -0
- souleyez/handlers/bloodhound_handler.py +243 -0
- souleyez/handlers/certipy_handler.py +311 -0
- souleyez/handlers/crackmapexec_handler.py +486 -0
- souleyez/handlers/dnsrecon_handler.py +344 -0
- souleyez/handlers/enum4linux_handler.py +400 -0
- souleyez/handlers/evil_winrm_handler.py +493 -0
- souleyez/handlers/ffuf_handler.py +815 -0
- souleyez/handlers/gobuster_handler.py +1114 -0
- souleyez/handlers/gpp_extract_handler.py +334 -0
- souleyez/handlers/hashcat_handler.py +444 -0
- souleyez/handlers/hydra_handler.py +564 -0
- souleyez/handlers/impacket_getuserspns_handler.py +343 -0
- souleyez/handlers/impacket_psexec_handler.py +222 -0
- souleyez/handlers/impacket_secretsdump_handler.py +426 -0
- souleyez/handlers/john_handler.py +286 -0
- souleyez/handlers/katana_handler.py +425 -0
- souleyez/handlers/kerbrute_handler.py +298 -0
- souleyez/handlers/ldapsearch_handler.py +636 -0
- souleyez/handlers/lfi_extract_handler.py +464 -0
- souleyez/handlers/msf_auxiliary_handler.py +409 -0
- souleyez/handlers/msf_exploit_handler.py +380 -0
- souleyez/handlers/nikto_handler.py +413 -0
- souleyez/handlers/nmap_handler.py +821 -0
- souleyez/handlers/nuclei_handler.py +359 -0
- souleyez/handlers/nxc_handler.py +417 -0
- souleyez/handlers/rdp_sec_check_handler.py +353 -0
- souleyez/handlers/registry.py +292 -0
- souleyez/handlers/responder_handler.py +232 -0
- souleyez/handlers/service_explorer_handler.py +434 -0
- souleyez/handlers/smbclient_handler.py +344 -0
- souleyez/handlers/smbmap_handler.py +510 -0
- souleyez/handlers/smbpasswd_handler.py +296 -0
- souleyez/handlers/sqlmap_handler.py +1116 -0
- souleyez/handlers/theharvester_handler.py +601 -0
- souleyez/handlers/web_login_test_handler.py +327 -0
- souleyez/handlers/whois_handler.py +277 -0
- souleyez/handlers/wpscan_handler.py +554 -0
- souleyez/history.py +32 -16
- souleyez/importers/msf_importer.py +106 -75
- souleyez/importers/smart_importer.py +208 -147
- souleyez/integrations/siem/__init__.py +10 -10
- souleyez/integrations/siem/base.py +17 -18
- souleyez/integrations/siem/elastic.py +108 -122
- souleyez/integrations/siem/factory.py +207 -80
- souleyez/integrations/siem/googlesecops.py +146 -154
- souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
- souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
- souleyez/integrations/siem/sentinel.py +107 -109
- souleyez/integrations/siem/splunk.py +246 -212
- souleyez/integrations/siem/wazuh.py +65 -71
- souleyez/integrations/wazuh/__init__.py +5 -5
- souleyez/integrations/wazuh/client.py +70 -93
- souleyez/integrations/wazuh/config.py +85 -57
- souleyez/integrations/wazuh/host_mapper.py +28 -36
- souleyez/integrations/wazuh/sync.py +78 -68
- souleyez/intelligence/__init__.py +4 -5
- souleyez/intelligence/correlation_analyzer.py +309 -295
- souleyez/intelligence/exploit_knowledge.py +661 -623
- souleyez/intelligence/exploit_suggestions.py +159 -139
- souleyez/intelligence/gap_analyzer.py +132 -97
- souleyez/intelligence/gap_detector.py +251 -214
- souleyez/intelligence/sensitive_tables.py +266 -129
- souleyez/intelligence/service_parser.py +137 -123
- souleyez/intelligence/surface_analyzer.py +407 -268
- souleyez/intelligence/target_parser.py +159 -162
- souleyez/licensing/__init__.py +6 -6
- souleyez/licensing/validator.py +17 -19
- souleyez/log_config.py +79 -54
- souleyez/main.py +1505 -687
- souleyez/migrations/fix_job_counter.py +16 -14
- souleyez/parsers/bloodhound_parser.py +41 -39
- souleyez/parsers/crackmapexec_parser.py +178 -111
- souleyez/parsers/dalfox_parser.py +72 -77
- souleyez/parsers/dnsrecon_parser.py +103 -91
- souleyez/parsers/enum4linux_parser.py +183 -153
- souleyez/parsers/ffuf_parser.py +29 -25
- souleyez/parsers/gobuster_parser.py +301 -41
- souleyez/parsers/hashcat_parser.py +324 -79
- souleyez/parsers/http_fingerprint_parser.py +350 -103
- souleyez/parsers/hydra_parser.py +131 -111
- souleyez/parsers/impacket_parser.py +231 -178
- souleyez/parsers/john_parser.py +98 -86
- souleyez/parsers/katana_parser.py +316 -0
- souleyez/parsers/msf_parser.py +943 -498
- souleyez/parsers/nikto_parser.py +346 -65
- souleyez/parsers/nmap_parser.py +262 -174
- souleyez/parsers/nuclei_parser.py +40 -44
- souleyez/parsers/responder_parser.py +26 -26
- souleyez/parsers/searchsploit_parser.py +74 -74
- souleyez/parsers/service_explorer_parser.py +279 -0
- souleyez/parsers/smbmap_parser.py +180 -124
- souleyez/parsers/sqlmap_parser.py +434 -308
- souleyez/parsers/theharvester_parser.py +75 -57
- souleyez/parsers/whois_parser.py +135 -94
- souleyez/parsers/wpscan_parser.py +278 -190
- souleyez/plugins/afp.py +44 -36
- souleyez/plugins/afp_brute.py +114 -46
- souleyez/plugins/ard.py +48 -37
- souleyez/plugins/bloodhound.py +95 -61
- souleyez/plugins/certipy.py +303 -0
- souleyez/plugins/crackmapexec.py +186 -85
- souleyez/plugins/dalfox.py +120 -59
- souleyez/plugins/dns_hijack.py +146 -41
- souleyez/plugins/dnsrecon.py +97 -61
- souleyez/plugins/enum4linux.py +91 -66
- souleyez/plugins/evil_winrm.py +291 -0
- souleyez/plugins/ffuf.py +166 -90
- souleyez/plugins/firmware_extract.py +133 -29
- souleyez/plugins/gobuster.py +387 -190
- souleyez/plugins/gpp_extract.py +393 -0
- souleyez/plugins/hashcat.py +100 -73
- souleyez/plugins/http_fingerprint.py +913 -267
- souleyez/plugins/hydra.py +566 -200
- souleyez/plugins/impacket_getnpusers.py +117 -69
- souleyez/plugins/impacket_psexec.py +84 -64
- souleyez/plugins/impacket_secretsdump.py +103 -69
- souleyez/plugins/impacket_smbclient.py +89 -75
- souleyez/plugins/john.py +86 -69
- souleyez/plugins/katana.py +313 -0
- souleyez/plugins/kerbrute.py +237 -0
- souleyez/plugins/lfi_extract.py +541 -0
- souleyez/plugins/macos_ssh.py +117 -48
- souleyez/plugins/mdns.py +35 -30
- souleyez/plugins/msf_auxiliary.py +253 -130
- souleyez/plugins/msf_exploit.py +239 -161
- souleyez/plugins/nikto.py +134 -78
- souleyez/plugins/nmap.py +275 -91
- souleyez/plugins/nuclei.py +180 -89
- souleyez/plugins/nxc.py +285 -0
- souleyez/plugins/plugin_base.py +35 -36
- souleyez/plugins/plugin_template.py +13 -5
- souleyez/plugins/rdp_sec_check.py +130 -0
- souleyez/plugins/responder.py +112 -71
- souleyez/plugins/router_http_brute.py +76 -65
- souleyez/plugins/router_ssh_brute.py +118 -41
- souleyez/plugins/router_telnet_brute.py +124 -42
- souleyez/plugins/routersploit.py +91 -59
- souleyez/plugins/routersploit_exploit.py +77 -55
- souleyez/plugins/searchsploit.py +91 -77
- souleyez/plugins/service_explorer.py +1160 -0
- souleyez/plugins/smbmap.py +122 -72
- souleyez/plugins/smbpasswd.py +215 -0
- souleyez/plugins/sqlmap.py +301 -113
- souleyez/plugins/theharvester.py +127 -75
- souleyez/plugins/tr069.py +79 -57
- souleyez/plugins/upnp.py +65 -47
- souleyez/plugins/upnp_abuse.py +73 -55
- souleyez/plugins/vnc_access.py +129 -42
- souleyez/plugins/vnc_brute.py +109 -38
- souleyez/plugins/web_login_test.py +417 -0
- souleyez/plugins/whois.py +77 -58
- souleyez/plugins/wpscan.py +219 -69
- souleyez/reporting/__init__.py +2 -1
- souleyez/reporting/attack_chain.py +411 -346
- souleyez/reporting/charts.py +436 -501
- souleyez/reporting/compliance_mappings.py +334 -201
- souleyez/reporting/detection_report.py +126 -125
- souleyez/reporting/formatters.py +828 -591
- souleyez/reporting/generator.py +386 -302
- souleyez/reporting/metrics.py +72 -75
- souleyez/scanner.py +35 -29
- souleyez/security/__init__.py +37 -11
- souleyez/security/scope_validator.py +175 -106
- souleyez/security/validation.py +237 -149
- souleyez/security.py +22 -6
- souleyez/storage/credentials.py +247 -186
- souleyez/storage/crypto.py +296 -129
- souleyez/storage/database.py +73 -50
- souleyez/storage/db.py +58 -36
- souleyez/storage/deliverable_evidence.py +177 -128
- souleyez/storage/deliverable_exporter.py +282 -246
- souleyez/storage/deliverable_templates.py +134 -116
- souleyez/storage/deliverables.py +135 -130
- souleyez/storage/engagements.py +109 -56
- souleyez/storage/evidence.py +181 -152
- souleyez/storage/execution_log.py +31 -17
- souleyez/storage/exploit_attempts.py +93 -57
- souleyez/storage/exploits.py +67 -36
- souleyez/storage/findings.py +48 -61
- souleyez/storage/hosts.py +176 -144
- souleyez/storage/migrate_to_engagements.py +43 -19
- souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
- souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
- souleyez/storage/migrations/_003_add_execution_log.py +14 -8
- souleyez/storage/migrations/_005_screenshots.py +13 -5
- souleyez/storage/migrations/_006_deliverables.py +13 -5
- souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
- souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
- souleyez/storage/migrations/_010_evidence_linking.py +17 -10
- souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
- souleyez/storage/migrations/_012_team_collaboration.py +34 -21
- souleyez/storage/migrations/_013_add_host_tags.py +12 -6
- souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
- souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
- souleyez/storage/migrations/_016_add_domain_field.py +10 -4
- souleyez/storage/migrations/_017_msf_sessions.py +16 -8
- souleyez/storage/migrations/_018_add_osint_target.py +10 -6
- souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
- souleyez/storage/migrations/_020_add_rbac.py +36 -15
- souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
- souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
- souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
- souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
- souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
- souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
- souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
- souleyez/storage/migrations/__init__.py +26 -26
- souleyez/storage/migrations/migration_manager.py +19 -19
- souleyez/storage/msf_sessions.py +100 -65
- souleyez/storage/osint.py +17 -24
- souleyez/storage/recommendation_engine.py +269 -235
- souleyez/storage/screenshots.py +33 -32
- souleyez/storage/smb_shares.py +136 -92
- souleyez/storage/sqlmap_data.py +183 -128
- souleyez/storage/team_collaboration.py +135 -141
- souleyez/storage/timeline_tracker.py +122 -94
- souleyez/storage/wazuh_vulns.py +64 -66
- souleyez/storage/web_paths.py +33 -37
- souleyez/testing/credential_tester.py +221 -205
- souleyez/ui/__init__.py +1 -1
- souleyez/ui/ai_quotes.py +12 -12
- souleyez/ui/attack_surface.py +2439 -1516
- souleyez/ui/chain_rules_view.py +914 -382
- souleyez/ui/correlation_view.py +312 -230
- souleyez/ui/dashboard.py +2382 -1130
- souleyez/ui/deliverables_view.py +148 -62
- souleyez/ui/design_system.py +13 -13
- souleyez/ui/errors.py +49 -49
- souleyez/ui/evidence_linking_view.py +284 -179
- souleyez/ui/evidence_vault.py +393 -285
- souleyez/ui/exploit_suggestions_view.py +555 -349
- souleyez/ui/export_view.py +100 -66
- souleyez/ui/gap_analysis_view.py +315 -171
- souleyez/ui/help_system.py +105 -97
- souleyez/ui/intelligence_view.py +436 -293
- souleyez/ui/interactive.py +23034 -10679
- souleyez/ui/interactive_selector.py +75 -68
- souleyez/ui/log_formatter.py +47 -39
- souleyez/ui/menu_components.py +22 -13
- souleyez/ui/msf_auxiliary_menu.py +184 -133
- souleyez/ui/pending_chains_view.py +336 -172
- souleyez/ui/progress_indicators.py +5 -3
- souleyez/ui/recommendations_view.py +195 -137
- souleyez/ui/rule_builder.py +343 -225
- souleyez/ui/setup_wizard.py +678 -284
- souleyez/ui/shortcuts.py +217 -165
- souleyez/ui/splunk_gap_analysis_view.py +452 -270
- souleyez/ui/splunk_vulns_view.py +139 -86
- souleyez/ui/team_dashboard.py +498 -335
- souleyez/ui/template_selector.py +196 -105
- souleyez/ui/terminal.py +6 -6
- souleyez/ui/timeline_view.py +198 -127
- souleyez/ui/tool_setup.py +264 -164
- souleyez/ui/tutorial.py +202 -72
- souleyez/ui/tutorial_state.py +40 -40
- souleyez/ui/wazuh_vulns_view.py +235 -141
- souleyez/ui/wordlist_browser.py +260 -107
- souleyez/ui.py +464 -312
- souleyez/utils/tool_checker.py +427 -367
- souleyez/utils.py +33 -29
- souleyez/wordlists.py +134 -167
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/METADATA +2 -2
- souleyez-3.0.0.dist-info/RECORD +443 -0
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/WHEEL +1 -1
- souleyez-2.43.29.dist-info/RECORD +0 -379
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/entry_points.txt +0 -0
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/licenses/LICENSE +0 -0
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,232 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
"""
|
|
3
|
+
Responder handler.
|
|
4
|
+
|
|
5
|
+
Consolidates parsing and display logic for Responder credential capture jobs.
|
|
6
|
+
"""
|
|
7
|
+
import logging
|
|
8
|
+
import os
|
|
9
|
+
from typing import Any, Dict, Optional
|
|
10
|
+
|
|
11
|
+
import click
|
|
12
|
+
|
|
13
|
+
from souleyez.engine.job_status import STATUS_DONE, STATUS_NO_RESULTS
|
|
14
|
+
from souleyez.handlers.base import BaseToolHandler
|
|
15
|
+
|
|
16
|
+
logger = logging.getLogger(__name__)
|
|
17
|
+
|
|
18
|
+
|
|
19
|
+
class ResponderHandler(BaseToolHandler):
|
|
20
|
+
"""Handler for Responder credential capture jobs."""
|
|
21
|
+
|
|
22
|
+
tool_name = "responder"
|
|
23
|
+
display_name = "Responder"
|
|
24
|
+
|
|
25
|
+
# All handlers enabled
|
|
26
|
+
has_error_handler = True
|
|
27
|
+
has_warning_handler = True
|
|
28
|
+
has_no_results_handler = True
|
|
29
|
+
has_done_handler = True
|
|
30
|
+
|
|
31
|
+
def parse_job(
|
|
32
|
+
self,
|
|
33
|
+
engagement_id: int,
|
|
34
|
+
log_path: str,
|
|
35
|
+
job: Dict[str, Any],
|
|
36
|
+
host_manager: Optional[Any] = None,
|
|
37
|
+
findings_manager: Optional[Any] = None,
|
|
38
|
+
credentials_manager: Optional[Any] = None,
|
|
39
|
+
) -> Dict[str, Any]:
|
|
40
|
+
"""
|
|
41
|
+
Parse Responder job results.
|
|
42
|
+
|
|
43
|
+
Extracts captured NTLMv2 hashes and stores them.
|
|
44
|
+
"""
|
|
45
|
+
try:
|
|
46
|
+
from souleyez.parsers.responder_parser import (
|
|
47
|
+
parse_responder,
|
|
48
|
+
store_responder_results,
|
|
49
|
+
)
|
|
50
|
+
|
|
51
|
+
target = job.get("target", "")
|
|
52
|
+
parsed = parse_responder(log_path, target)
|
|
53
|
+
|
|
54
|
+
job_id = job.get("id")
|
|
55
|
+
store_responder_results(parsed, engagement_id, job_id)
|
|
56
|
+
|
|
57
|
+
return {
|
|
58
|
+
"tool": "responder",
|
|
59
|
+
"status": (
|
|
60
|
+
STATUS_DONE
|
|
61
|
+
if parsed.get("credentials_captured", 0) > 0
|
|
62
|
+
else STATUS_NO_RESULTS
|
|
63
|
+
),
|
|
64
|
+
"interface": target,
|
|
65
|
+
"credentials_captured": parsed.get("credentials_captured", 0),
|
|
66
|
+
"hash_files": parsed.get("hash_files", []), # For chaining to hashcat
|
|
67
|
+
"summary": parsed.get("summary", "No results"),
|
|
68
|
+
}
|
|
69
|
+
|
|
70
|
+
except Exception as e:
|
|
71
|
+
logger.error(f"Error parsing responder job: {e}")
|
|
72
|
+
return {"error": str(e)}
|
|
73
|
+
|
|
74
|
+
def display_done(
|
|
75
|
+
self,
|
|
76
|
+
job: Dict[str, Any],
|
|
77
|
+
log_path: str,
|
|
78
|
+
show_all: bool = False,
|
|
79
|
+
show_passwords: bool = False,
|
|
80
|
+
) -> None:
|
|
81
|
+
"""Display successful Responder results."""
|
|
82
|
+
try:
|
|
83
|
+
from souleyez.parsers.responder_parser import parse_responder
|
|
84
|
+
|
|
85
|
+
if not log_path or not os.path.exists(log_path):
|
|
86
|
+
return
|
|
87
|
+
|
|
88
|
+
interface = job.get("args", {}).get(
|
|
89
|
+
"interface", job.get("target", "unknown")
|
|
90
|
+
)
|
|
91
|
+
parsed = parse_responder(log_path, interface)
|
|
92
|
+
|
|
93
|
+
credentials = parsed.get("credentials", [])
|
|
94
|
+
summary = parsed.get("summary", "")
|
|
95
|
+
|
|
96
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
97
|
+
click.echo(click.style("RESPONDER RESULTS", bold=True, fg="green"))
|
|
98
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
99
|
+
click.echo()
|
|
100
|
+
|
|
101
|
+
# Summary
|
|
102
|
+
click.echo(click.style("Summary:", bold=True))
|
|
103
|
+
click.echo(f" {summary}")
|
|
104
|
+
click.echo()
|
|
105
|
+
|
|
106
|
+
# Show captured credentials
|
|
107
|
+
if credentials:
|
|
108
|
+
click.echo(
|
|
109
|
+
click.style(
|
|
110
|
+
f"Captured NTLMv2 Hashes ({len(credentials)}):",
|
|
111
|
+
bold=True,
|
|
112
|
+
fg="green",
|
|
113
|
+
)
|
|
114
|
+
)
|
|
115
|
+
max_show = None if show_all else 10
|
|
116
|
+
display_creds = (
|
|
117
|
+
credentials if max_show is None else credentials[:max_show]
|
|
118
|
+
)
|
|
119
|
+
for c in display_creds:
|
|
120
|
+
domain = c.get("domain", "")
|
|
121
|
+
username = c.get("username", "?")
|
|
122
|
+
protocol = c.get("protocol", "?")
|
|
123
|
+
if domain:
|
|
124
|
+
click.echo(
|
|
125
|
+
click.style(
|
|
126
|
+
f" [{protocol}] {domain}\\{username}", fg="green"
|
|
127
|
+
)
|
|
128
|
+
)
|
|
129
|
+
else:
|
|
130
|
+
click.echo(
|
|
131
|
+
click.style(f" [{protocol}] {username}", fg="green")
|
|
132
|
+
)
|
|
133
|
+
if max_show and len(credentials) > max_show:
|
|
134
|
+
click.echo(
|
|
135
|
+
click.style(
|
|
136
|
+
f" ... and {len(credentials) - max_show} more", dim=True
|
|
137
|
+
)
|
|
138
|
+
)
|
|
139
|
+
click.echo()
|
|
140
|
+
click.echo(
|
|
141
|
+
click.style(
|
|
142
|
+
" Tip: Crack these hashes with hashcat -m 5600", fg="cyan"
|
|
143
|
+
)
|
|
144
|
+
)
|
|
145
|
+
else:
|
|
146
|
+
click.echo(click.style(" No credentials captured.", fg="yellow"))
|
|
147
|
+
|
|
148
|
+
click.echo()
|
|
149
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
150
|
+
click.echo()
|
|
151
|
+
|
|
152
|
+
except Exception as e:
|
|
153
|
+
logger.debug(f"Error in display_done: {e}")
|
|
154
|
+
|
|
155
|
+
def display_warning(
|
|
156
|
+
self,
|
|
157
|
+
job: Dict[str, Any],
|
|
158
|
+
log_path: str,
|
|
159
|
+
log_content: Optional[str] = None,
|
|
160
|
+
) -> None:
|
|
161
|
+
"""Display warning status for Responder."""
|
|
162
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
163
|
+
click.echo(click.style("[WARNING] RESPONDER", bold=True, fg="yellow"))
|
|
164
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
165
|
+
click.echo()
|
|
166
|
+
click.echo(" Responder completed with warnings.")
|
|
167
|
+
click.echo(" Check raw logs for details (press 'r').")
|
|
168
|
+
click.echo()
|
|
169
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
170
|
+
click.echo()
|
|
171
|
+
|
|
172
|
+
def display_error(
|
|
173
|
+
self,
|
|
174
|
+
job: Dict[str, Any],
|
|
175
|
+
log_path: str,
|
|
176
|
+
log_content: Optional[str] = None,
|
|
177
|
+
) -> None:
|
|
178
|
+
"""Display error status for Responder."""
|
|
179
|
+
# Read log if not provided
|
|
180
|
+
if log_content is None and log_path and os.path.exists(log_path):
|
|
181
|
+
try:
|
|
182
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
183
|
+
log_content = f.read()
|
|
184
|
+
except Exception:
|
|
185
|
+
log_content = ""
|
|
186
|
+
|
|
187
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
188
|
+
click.echo(click.style("[ERROR] RESPONDER FAILED", bold=True, fg="red"))
|
|
189
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
190
|
+
click.echo()
|
|
191
|
+
|
|
192
|
+
# Check for common responder errors
|
|
193
|
+
error_msg = None
|
|
194
|
+
if log_content:
|
|
195
|
+
if "Permission denied" in log_content or "root" in log_content.lower():
|
|
196
|
+
error_msg = "Permission denied - Responder requires root privileges"
|
|
197
|
+
elif "Address already in use" in log_content:
|
|
198
|
+
error_msg = "Port already in use - another service may be running"
|
|
199
|
+
elif "No such device" in log_content or "Interface" in log_content:
|
|
200
|
+
error_msg = "Invalid network interface - check interface name"
|
|
201
|
+
elif "cannot bind" in log_content.lower():
|
|
202
|
+
error_msg = "Cannot bind to port - check if ports are available"
|
|
203
|
+
|
|
204
|
+
if error_msg:
|
|
205
|
+
click.echo(f" {error_msg}")
|
|
206
|
+
else:
|
|
207
|
+
click.echo(" Responder failed - check raw logs for details (press 'r')")
|
|
208
|
+
|
|
209
|
+
click.echo()
|
|
210
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
211
|
+
click.echo()
|
|
212
|
+
|
|
213
|
+
def display_no_results(
|
|
214
|
+
self,
|
|
215
|
+
job: Dict[str, Any],
|
|
216
|
+
log_path: str,
|
|
217
|
+
) -> None:
|
|
218
|
+
"""Display no_results status for Responder."""
|
|
219
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
220
|
+
click.echo(click.style("RESPONDER RESULTS", bold=True, fg="yellow"))
|
|
221
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
222
|
+
click.echo()
|
|
223
|
+
click.echo(" No credentials captured.")
|
|
224
|
+
click.echo()
|
|
225
|
+
click.echo(click.style("Possible reasons:", dim=True))
|
|
226
|
+
click.echo(" - No LLMNR/NBT-NS/mDNS traffic on network")
|
|
227
|
+
click.echo(" - Network is using proper DNS infrastructure")
|
|
228
|
+
click.echo(" - Firewall blocking broadcast traffic")
|
|
229
|
+
click.echo(" - Try running for longer or during peak hours")
|
|
230
|
+
click.echo()
|
|
231
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
232
|
+
click.echo()
|
|
@@ -0,0 +1,434 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
"""
|
|
3
|
+
Service Explorer handler.
|
|
4
|
+
|
|
5
|
+
Consolidates parsing and display logic for Service Explorer jobs.
|
|
6
|
+
"""
|
|
7
|
+
import logging
|
|
8
|
+
import os
|
|
9
|
+
import re
|
|
10
|
+
from typing import Any, Dict, Optional
|
|
11
|
+
|
|
12
|
+
import click
|
|
13
|
+
|
|
14
|
+
from souleyez.engine.job_status import STATUS_DONE, STATUS_ERROR, STATUS_NO_RESULTS
|
|
15
|
+
from souleyez.handlers.base import BaseToolHandler
|
|
16
|
+
|
|
17
|
+
logger = logging.getLogger(__name__)
|
|
18
|
+
|
|
19
|
+
|
|
20
|
+
class ServiceExplorerHandler(BaseToolHandler):
|
|
21
|
+
"""Handler for Service Explorer file/data browser jobs."""
|
|
22
|
+
|
|
23
|
+
tool_name = "service_explorer"
|
|
24
|
+
display_name = "Service Explorer"
|
|
25
|
+
|
|
26
|
+
# All handlers enabled
|
|
27
|
+
has_error_handler = True
|
|
28
|
+
has_warning_handler = True
|
|
29
|
+
has_no_results_handler = True
|
|
30
|
+
has_done_handler = True
|
|
31
|
+
|
|
32
|
+
def parse_job(
|
|
33
|
+
self,
|
|
34
|
+
engagement_id: int,
|
|
35
|
+
log_path: str,
|
|
36
|
+
job: Dict[str, Any],
|
|
37
|
+
host_manager: Optional[Any] = None,
|
|
38
|
+
findings_manager: Optional[Any] = None,
|
|
39
|
+
credentials_manager: Optional[Any] = None,
|
|
40
|
+
) -> Dict[str, Any]:
|
|
41
|
+
"""
|
|
42
|
+
Parse Service Explorer job results.
|
|
43
|
+
|
|
44
|
+
Extracts files/data discovered and stores findings.
|
|
45
|
+
"""
|
|
46
|
+
try:
|
|
47
|
+
from souleyez.parsers.service_explorer_parser import (
|
|
48
|
+
parse_service_explorer_output,
|
|
49
|
+
extract_findings,
|
|
50
|
+
)
|
|
51
|
+
|
|
52
|
+
# Import managers if not provided
|
|
53
|
+
if host_manager is None:
|
|
54
|
+
from souleyez.storage.hosts import HostManager
|
|
55
|
+
|
|
56
|
+
host_manager = HostManager()
|
|
57
|
+
if findings_manager is None:
|
|
58
|
+
from souleyez.storage.findings import FindingsManager
|
|
59
|
+
|
|
60
|
+
findings_manager = FindingsManager()
|
|
61
|
+
|
|
62
|
+
target = job.get("target", "")
|
|
63
|
+
|
|
64
|
+
# Read log file
|
|
65
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
66
|
+
output = f.read()
|
|
67
|
+
|
|
68
|
+
parsed = parse_service_explorer_output(output, target)
|
|
69
|
+
|
|
70
|
+
# Get or create host from target
|
|
71
|
+
host_id = None
|
|
72
|
+
host_target = parsed.get("target") or target
|
|
73
|
+
if host_target:
|
|
74
|
+
# Extract IP from URL if needed
|
|
75
|
+
if "://" in host_target:
|
|
76
|
+
from urllib.parse import urlparse
|
|
77
|
+
|
|
78
|
+
parsed_url = urlparse(host_target)
|
|
79
|
+
host_target = parsed_url.hostname or host_target
|
|
80
|
+
|
|
81
|
+
is_ip = re.match(r"^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$", host_target)
|
|
82
|
+
|
|
83
|
+
if is_ip:
|
|
84
|
+
host = host_manager.get_host_by_ip(engagement_id, host_target)
|
|
85
|
+
if host:
|
|
86
|
+
host_id = host["id"]
|
|
87
|
+
else:
|
|
88
|
+
host_id = host_manager.add_or_update_host(
|
|
89
|
+
engagement_id, {"ip": host_target, "status": "up"}
|
|
90
|
+
)
|
|
91
|
+
|
|
92
|
+
# Extract and store findings
|
|
93
|
+
findings_added = 0
|
|
94
|
+
if host_id:
|
|
95
|
+
findings = extract_findings(parsed)
|
|
96
|
+
protocol = parsed.get("protocol", "unknown")
|
|
97
|
+
|
|
98
|
+
for finding in findings:
|
|
99
|
+
findings_manager.add_finding(
|
|
100
|
+
engagement_id=engagement_id,
|
|
101
|
+
host_id=host_id,
|
|
102
|
+
finding_type=f"{protocol}_access",
|
|
103
|
+
severity=finding.get("severity"),
|
|
104
|
+
title=finding.get("title"),
|
|
105
|
+
description=finding.get("description"),
|
|
106
|
+
evidence=finding.get("evidence"),
|
|
107
|
+
tool="service_explorer",
|
|
108
|
+
)
|
|
109
|
+
findings_added += 1
|
|
110
|
+
|
|
111
|
+
# Determine status
|
|
112
|
+
if parsed.get("error"):
|
|
113
|
+
status = STATUS_ERROR
|
|
114
|
+
elif parsed.get("files_found", 0) > 0 or findings_added > 0:
|
|
115
|
+
status = STATUS_DONE
|
|
116
|
+
else:
|
|
117
|
+
status = STATUS_NO_RESULTS
|
|
118
|
+
|
|
119
|
+
return {
|
|
120
|
+
"tool": "service_explorer",
|
|
121
|
+
"status": status,
|
|
122
|
+
"protocol": parsed.get("protocol"),
|
|
123
|
+
"host": parsed.get("target"),
|
|
124
|
+
"files_found": parsed.get("files_found", 0),
|
|
125
|
+
"interesting_files": parsed.get("interesting_count", 0),
|
|
126
|
+
"downloaded_files": parsed.get("downloaded_count", 0),
|
|
127
|
+
"findings_added": findings_added,
|
|
128
|
+
"errors": parsed.get("errors", []),
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
except Exception as e:
|
|
132
|
+
logger.error(f"Error parsing service_explorer job: {e}")
|
|
133
|
+
return {"error": str(e)}
|
|
134
|
+
|
|
135
|
+
def display_done(
|
|
136
|
+
self,
|
|
137
|
+
job: Dict[str, Any],
|
|
138
|
+
log_path: str,
|
|
139
|
+
show_all: bool = False,
|
|
140
|
+
show_passwords: bool = False,
|
|
141
|
+
) -> None:
|
|
142
|
+
"""Display successful Service Explorer results."""
|
|
143
|
+
try:
|
|
144
|
+
from souleyez.parsers.service_explorer_parser import (
|
|
145
|
+
parse_service_explorer_output,
|
|
146
|
+
)
|
|
147
|
+
|
|
148
|
+
if not log_path or not os.path.exists(log_path):
|
|
149
|
+
return
|
|
150
|
+
|
|
151
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
152
|
+
log_content = f.read()
|
|
153
|
+
parsed = parse_service_explorer_output(log_content, job.get("target", ""))
|
|
154
|
+
|
|
155
|
+
protocol = (parsed.get("protocol") or "SERVICE").upper()
|
|
156
|
+
files = parsed.get("files", [])
|
|
157
|
+
interesting = parsed.get("interesting_files", [])
|
|
158
|
+
downloaded = parsed.get("downloaded_files", [])
|
|
159
|
+
|
|
160
|
+
# Header
|
|
161
|
+
click.echo(click.style("=" * 70, fg="cyan"))
|
|
162
|
+
click.echo(
|
|
163
|
+
click.style(f"{protocol} SERVICE EXPLORATION", bold=True, fg="cyan")
|
|
164
|
+
)
|
|
165
|
+
click.echo(click.style("=" * 70, fg="cyan"))
|
|
166
|
+
click.echo()
|
|
167
|
+
|
|
168
|
+
# Connection info
|
|
169
|
+
if parsed.get("target"):
|
|
170
|
+
click.echo(click.style(f"Target: {parsed['target']}", bold=True))
|
|
171
|
+
if parsed.get("port"):
|
|
172
|
+
click.echo(f"Port: {parsed['port']}")
|
|
173
|
+
if parsed.get("username"):
|
|
174
|
+
click.echo(f"Username: {parsed['username']}")
|
|
175
|
+
click.echo()
|
|
176
|
+
|
|
177
|
+
# Server info (Redis/MongoDB)
|
|
178
|
+
if parsed.get("server_info"):
|
|
179
|
+
click.echo(click.style("Server Information:", bold=True, fg="blue"))
|
|
180
|
+
for key, value in parsed["server_info"].items():
|
|
181
|
+
if value is not None:
|
|
182
|
+
click.echo(f" {key}: {value}")
|
|
183
|
+
click.echo()
|
|
184
|
+
|
|
185
|
+
if not files and not interesting:
|
|
186
|
+
self.display_no_results(job, log_path)
|
|
187
|
+
return
|
|
188
|
+
|
|
189
|
+
# Summary
|
|
190
|
+
click.echo(click.style("Summary:", bold=True))
|
|
191
|
+
click.echo(f" Total Items: {parsed.get('files_found', len(files))}")
|
|
192
|
+
click.echo(
|
|
193
|
+
f" Interesting Files: {parsed.get('interesting_count', len(interesting))}"
|
|
194
|
+
)
|
|
195
|
+
click.echo(
|
|
196
|
+
f" Downloaded: {parsed.get('downloaded_count', len(downloaded))}"
|
|
197
|
+
)
|
|
198
|
+
click.echo()
|
|
199
|
+
|
|
200
|
+
# Interesting files (HIGH PRIORITY)
|
|
201
|
+
if interesting:
|
|
202
|
+
click.echo(
|
|
203
|
+
click.style(
|
|
204
|
+
f"Interesting Files ({len(interesting)}):", bold=True, fg="red"
|
|
205
|
+
)
|
|
206
|
+
)
|
|
207
|
+
max_show = None if show_all else 15
|
|
208
|
+
for item in (
|
|
209
|
+
interesting if max_show is None else interesting[:max_show]
|
|
210
|
+
):
|
|
211
|
+
path = item.get("full_path", item.get("name", "?"))
|
|
212
|
+
size = item.get("size", 0)
|
|
213
|
+
size_str = self._format_size(size)
|
|
214
|
+
click.echo(f" {click.style(path, fg='yellow')} ({size_str})")
|
|
215
|
+
if max_show and len(interesting) > max_show:
|
|
216
|
+
click.echo(f" ... and {len(interesting) - max_show} more")
|
|
217
|
+
click.echo()
|
|
218
|
+
|
|
219
|
+
# Downloaded files
|
|
220
|
+
if downloaded:
|
|
221
|
+
click.echo(
|
|
222
|
+
click.style(
|
|
223
|
+
f"Downloaded Files ({len(downloaded)}):", bold=True, fg="green"
|
|
224
|
+
)
|
|
225
|
+
)
|
|
226
|
+
# Build evidence path
|
|
227
|
+
target_host = parsed.get("target", job.get("target", "unknown"))
|
|
228
|
+
proto = (parsed.get("protocol") or "files").lower()
|
|
229
|
+
evidence_dir = os.path.expanduser(
|
|
230
|
+
f"~/.souleyez/evidence/{target_host}/{proto}"
|
|
231
|
+
)
|
|
232
|
+
for path in downloaded[:10]:
|
|
233
|
+
filename = os.path.basename(path)
|
|
234
|
+
local_path = os.path.join(evidence_dir, filename)
|
|
235
|
+
click.echo(f" - {path}")
|
|
236
|
+
click.echo(f" → {click.style(local_path, fg='cyan')}")
|
|
237
|
+
if len(downloaded) > 10:
|
|
238
|
+
click.echo(f" ... and {len(downloaded) - 10} more")
|
|
239
|
+
click.echo()
|
|
240
|
+
|
|
241
|
+
# File tree (if show_all or limited)
|
|
242
|
+
if files and (show_all or len(files) <= 30):
|
|
243
|
+
click.echo(click.style("File Listing:", bold=True))
|
|
244
|
+
self._display_file_tree(files, show_all)
|
|
245
|
+
click.echo()
|
|
246
|
+
|
|
247
|
+
# Errors
|
|
248
|
+
if parsed.get("errors"):
|
|
249
|
+
click.echo(
|
|
250
|
+
click.style(
|
|
251
|
+
f"Errors ({len(parsed['errors'])}):", bold=True, fg="yellow"
|
|
252
|
+
)
|
|
253
|
+
)
|
|
254
|
+
for error in parsed["errors"][:5]:
|
|
255
|
+
click.echo(f" - {error[:100]}")
|
|
256
|
+
click.echo()
|
|
257
|
+
|
|
258
|
+
click.echo(click.style("=" * 70, fg="cyan"))
|
|
259
|
+
click.echo()
|
|
260
|
+
|
|
261
|
+
except Exception as e:
|
|
262
|
+
logger.debug(f"Error in display_done: {e}")
|
|
263
|
+
|
|
264
|
+
def _display_file_tree(self, files: list, show_all: bool = False) -> None:
|
|
265
|
+
"""Display files in a tree-like structure."""
|
|
266
|
+
# Group by directory
|
|
267
|
+
dirs = {}
|
|
268
|
+
for item in files:
|
|
269
|
+
path = item.get("path", "/")
|
|
270
|
+
if path not in dirs:
|
|
271
|
+
dirs[path] = []
|
|
272
|
+
dirs[path].append(item)
|
|
273
|
+
|
|
274
|
+
max_dirs = None if show_all else 10
|
|
275
|
+
max_files_per_dir = None if show_all else 5
|
|
276
|
+
dirs_shown = 0
|
|
277
|
+
|
|
278
|
+
for dir_path, items in sorted(dirs.items()):
|
|
279
|
+
if max_dirs and dirs_shown >= max_dirs:
|
|
280
|
+
click.echo(f" ... and {len(dirs) - max_dirs} more directories")
|
|
281
|
+
break
|
|
282
|
+
|
|
283
|
+
click.echo(f" {click.style(dir_path, fg='blue')}/ ({len(items)} items)")
|
|
284
|
+
files_shown = 0
|
|
285
|
+
|
|
286
|
+
for item in items:
|
|
287
|
+
if max_files_per_dir and files_shown >= max_files_per_dir:
|
|
288
|
+
click.echo(f" ... and {len(items) - max_files_per_dir} more")
|
|
289
|
+
break
|
|
290
|
+
|
|
291
|
+
name = item.get("name", "?")
|
|
292
|
+
item_type = item.get("type", "file")
|
|
293
|
+
size = item.get("size", 0)
|
|
294
|
+
is_interesting = item.get("interesting", False)
|
|
295
|
+
|
|
296
|
+
if item_type == "directory":
|
|
297
|
+
click.echo(f" {click.style(name + '/', fg='blue')}")
|
|
298
|
+
elif is_interesting:
|
|
299
|
+
click.echo(
|
|
300
|
+
f" {click.style(name, fg='yellow')} ({self._format_size(size)})"
|
|
301
|
+
)
|
|
302
|
+
else:
|
|
303
|
+
click.echo(f" {name} ({self._format_size(size)})")
|
|
304
|
+
|
|
305
|
+
files_shown += 1
|
|
306
|
+
|
|
307
|
+
dirs_shown += 1
|
|
308
|
+
|
|
309
|
+
def _format_size(self, size: int) -> str:
|
|
310
|
+
"""Format file size in human-readable form."""
|
|
311
|
+
if size < 1024:
|
|
312
|
+
return f"{size} B"
|
|
313
|
+
elif size < 1024 * 1024:
|
|
314
|
+
return f"{size / 1024:.1f} KB"
|
|
315
|
+
elif size < 1024 * 1024 * 1024:
|
|
316
|
+
return f"{size / (1024 * 1024):.1f} MB"
|
|
317
|
+
else:
|
|
318
|
+
return f"{size / (1024 * 1024 * 1024):.1f} GB"
|
|
319
|
+
|
|
320
|
+
def display_warning(
|
|
321
|
+
self,
|
|
322
|
+
job: Dict[str, Any],
|
|
323
|
+
log_path: str,
|
|
324
|
+
log_content: Optional[str] = None,
|
|
325
|
+
) -> None:
|
|
326
|
+
"""Display warning status for Service Explorer."""
|
|
327
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
328
|
+
click.echo(click.style("[WARNING] SERVICE EXPLORER", bold=True, fg="yellow"))
|
|
329
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
330
|
+
click.echo()
|
|
331
|
+
click.echo(" Exploration completed with warnings. Check raw logs for details.")
|
|
332
|
+
click.echo(" Press [r] to view raw logs.")
|
|
333
|
+
click.echo()
|
|
334
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
335
|
+
click.echo()
|
|
336
|
+
|
|
337
|
+
def display_error(
|
|
338
|
+
self,
|
|
339
|
+
job: Dict[str, Any],
|
|
340
|
+
log_path: str,
|
|
341
|
+
log_content: Optional[str] = None,
|
|
342
|
+
) -> None:
|
|
343
|
+
"""Display error status for Service Explorer."""
|
|
344
|
+
# Read log if not provided
|
|
345
|
+
if log_content is None and log_path and os.path.exists(log_path):
|
|
346
|
+
try:
|
|
347
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
348
|
+
log_content = f.read()
|
|
349
|
+
except Exception:
|
|
350
|
+
log_content = ""
|
|
351
|
+
|
|
352
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
353
|
+
click.echo(click.style("[ERROR] SERVICE EXPLORER FAILED", bold=True, fg="red"))
|
|
354
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
355
|
+
click.echo()
|
|
356
|
+
|
|
357
|
+
# Check for common errors
|
|
358
|
+
error_msg = None
|
|
359
|
+
if log_content:
|
|
360
|
+
if (
|
|
361
|
+
"Connection refused" in log_content
|
|
362
|
+
or "connection failed" in log_content.lower()
|
|
363
|
+
):
|
|
364
|
+
error_msg = "Connection refused - service may be down"
|
|
365
|
+
elif "timed out" in log_content.lower() or "timeout" in log_content.lower():
|
|
366
|
+
error_msg = "Connection timed out - target may be slow or filtering"
|
|
367
|
+
elif "not installed" in log_content.lower():
|
|
368
|
+
# Extract which package
|
|
369
|
+
match = re.search(r"(\w+)\s+not installed", log_content, re.IGNORECASE)
|
|
370
|
+
if match:
|
|
371
|
+
error_msg = f"Required package not installed: {match.group(1)}"
|
|
372
|
+
else:
|
|
373
|
+
error_msg = "Required package not installed"
|
|
374
|
+
elif (
|
|
375
|
+
"authentication" in log_content.lower()
|
|
376
|
+
or "login failed" in log_content.lower()
|
|
377
|
+
):
|
|
378
|
+
error_msg = "Authentication failed - invalid credentials"
|
|
379
|
+
elif '"error"' in log_content:
|
|
380
|
+
# Try to extract JSON error
|
|
381
|
+
import json
|
|
382
|
+
|
|
383
|
+
try:
|
|
384
|
+
json_start = log_content.find("{")
|
|
385
|
+
if json_start >= 0:
|
|
386
|
+
data = json.loads(log_content[json_start:])
|
|
387
|
+
if data.get("error"):
|
|
388
|
+
error_msg = data["error"]
|
|
389
|
+
except Exception:
|
|
390
|
+
pass
|
|
391
|
+
|
|
392
|
+
if error_msg:
|
|
393
|
+
click.echo(f" {error_msg}")
|
|
394
|
+
else:
|
|
395
|
+
click.echo(" Exploration failed - see raw logs for details (press 'r')")
|
|
396
|
+
|
|
397
|
+
click.echo()
|
|
398
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
399
|
+
click.echo()
|
|
400
|
+
|
|
401
|
+
def display_no_results(
|
|
402
|
+
self,
|
|
403
|
+
job: Dict[str, Any],
|
|
404
|
+
log_path: str,
|
|
405
|
+
) -> None:
|
|
406
|
+
"""Display no_results status for Service Explorer."""
|
|
407
|
+
# Try to get protocol from job target
|
|
408
|
+
protocol = "SERVICE"
|
|
409
|
+
target = job.get("target", "")
|
|
410
|
+
if "://" in target:
|
|
411
|
+
protocol = target.split("://")[0].upper()
|
|
412
|
+
|
|
413
|
+
click.echo(click.style("=" * 70, fg="cyan"))
|
|
414
|
+
click.echo(click.style(f"{protocol} SERVICE EXPLORATION", bold=True, fg="cyan"))
|
|
415
|
+
click.echo(click.style("=" * 70, fg="cyan"))
|
|
416
|
+
click.echo()
|
|
417
|
+
|
|
418
|
+
if target:
|
|
419
|
+
click.echo(click.style(f"Target: {target}", bold=True))
|
|
420
|
+
click.echo()
|
|
421
|
+
|
|
422
|
+
click.echo(
|
|
423
|
+
click.style("Result: No files or data found", fg="yellow", bold=True)
|
|
424
|
+
)
|
|
425
|
+
click.echo()
|
|
426
|
+
click.echo(" The service was accessible but no files or data were found.")
|
|
427
|
+
click.echo()
|
|
428
|
+
click.echo(click.style("Tips:", dim=True))
|
|
429
|
+
click.echo(" - Try with credentials if available")
|
|
430
|
+
click.echo(" - Increase depth with --depth 5")
|
|
431
|
+
click.echo(" - Check if service requires specific paths")
|
|
432
|
+
click.echo()
|
|
433
|
+
click.echo(click.style("=" * 70, fg="cyan"))
|
|
434
|
+
click.echo()
|