OSINT Tool: SARENKA

by | Jul 21, 2022 | Tools

Premium Content

Patreon

Subscribe to Patreon to watch this episode.

Reading Time: 4 Minutes

 

SARENKA by pawlaczyk is an Open Source Intelligence (OSINT) tool that helps you obtain and understand Attack Surface.

The main goal is gathering information from search engines for Internet-connected devices (https://censys.io/https://www.shodan.io/). It scraps data about Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE) and also has database where CVEs are mapped to CWE.

It returns data about the local machine – local installed software (from Windows Registry), local network information (python libraries, popular cmd commands). For now the application has also simple tools like hash calculator, shannon entropy calculator and very simple port scanner.

In Red-Teaming, OSINT has proven to reveal often times, lots of sensitive documents, and information that an organization/person had no idea was there, and it plays a crucial role in your Pentesting process in the early stages that will help you determine and decide the way you will conduct your attack plan.

Features

You can also:

  • calculate hashes based on user string
  • calculate shannon entropy based on user string
  • check is port open|closed (instead always use nmap if you can – it is slow)

 

 

See Also: So you want to be a hacker?
Complete Offensive Security and Ethical Hacking Course

 

 

Installation

The team has tested it on applications running on Windows 10, Kali Linux and using Python 3.8

SARENKA requires:

 
Clone repository

$ git clone https://github.com/pawlaczyk/sarenka.git

Go to application directory

$ cd ./sarenka

Create venv

$ python3 -m venv env

 
Activate venv

Powershell

$ ./env/Scripts/Activate.ps1

cmd

$ ./env/Scripts/activate.bat

Install requirements

$ pip3 install -r ./requirements.txt

Build application with sarenka.py script

$ python ./sarenka/sarenka.py

 

 

Getting started

Please create accounts on services:

Application – default http://localhost:8000/

SS

 

Add user credentials at “Settings”

SS1

 

 

 

Screenshots

SS2

 

SS3

 

SS4

 

 

 

SS5

 

SS6

 

swagger

 

Download: GitHub Link

 

Merch

Recent Tools

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This