Categories: Kali Linux

SIPI – Simple IP Information Tools for Reputation Data Analysis

SIPI tool is aimed for Incident Response Team and anyone what’s want to know the behaviour of the “suspicious” IP Address. The tools do search looking for reputation info from a set of open threat intelligence sources. Information about this IP like malware activity, malicious activity, blacklist, spam and botnet activity.

Also Read Idisagree – Control Remote Computers Using Discord Bot & Python 3

Depedencies:
  • request
  • shodan
Installation:
pip install requests & easy_install shodan
git clone "repositori"
config API token into config.json
try: $> python sipi.py any_ip -A

SIPI Descripcion

Simple IP Information Tool

sIPi - is a free reconnaissance tool for obtain IP Address Information from
 many Open Sources: cymon.io | shoda.io | ipinfo.io

Julian J. Gonzalez Caracuel

It is a tool that analyzes an IP or IP list, obtaining as a result information about:

       - reputación / actividad
 - nivel de exposición 
 - geolocalización

Reputation / detection of the IP in blacklists according to the following categories:

 Source: cymon.io - Cymon is the largest open tracker of malware, phishing, botnets, spam, and more
   
           ['malware',
    'botnet',
    'spam',
    'phishing',
    'malicious activity',
    'blacklist',
    'dnsbl']

Nivel de exposición:

Source: shodan.io - Shodan is the world's first search engine for Internet-connected devices.
 
Obtiene información toda la dirección IP que tiene SHODAN sobre la dirección IP, dependiendo del nivel de acceso al motor SHODAN 
se podra obtener información con mayor cantidad de datos (número de puertos, banner, geolocalización)
 
Geolocalización:

Source: ipinfo.io
Obtiene información simple de la dirección IP, geolocalización e información sobre el ASN, permite un ratio de 1000/day

Installation Requirements

cymon.io  - Necesita token de autenticación - usuario registrado ratio: 1000/days
shodan.io - Necesita token de autenticación - usuario registrado limite 100 resultados, puertos limitados

The configuration of the tokens is entered in File: config.json, which must be in the directory where sipi.py is executed << API token from all service is setting up into a “config.json” filename place in the root directory >>

Dependencias

requests

pip install requests

shodan

easy_install shodan

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

10 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

10 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago