ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT.
Its goal is to scan several endpoints and identify exposition of services/files/folders through the webroot. Checks/Signatures are declared in a config file (by default: chopchop.yml
), fully configurable, and especially by developers.
"Chop chop" is a phrase rooted in Cantonese. "Chop chop" means "hurry" and suggests that something should be done now and without delay.
Building
We tried to make the build process painless and hopefully, it should be as easy as:
$ go mod download
$ go build .
There should be a resulting gochopchop
binary in the folder.
Using Docker
Thanks to Github Container Registry, we are able to provide you some freshly-build Docker images!
docker run ghcr.io/michelin/gochopchop scan https://foobar.com -v debug
But if you prefer, you can also build it locally, see below:
Build locally
docker build -t gochopchop .
Usage
We are continuously trying to make goChopChop
as easy as possible. Scanning a host with this utility is as simple as :
$ ./gochopchop scan https://foobar.com
Using Docker
docker run gochopchop scan https://foobar.com
Custom configuration file
docker run -v ./:/app chopchop scan -c /app/chopchop.yml https://foobar.com
What's next
The Golang rewrite took place a couple of months ago but there's so much to do, still. Here are some features we are planning to integrate : [x] Threading for better performance [x] Ability to specify the number of concurrent threads [x] Colors and better formatting [x] Ability to filter checks/signatures to search for [x] Mock and unit tests [x] Github CI And much more!
Testing
To quickly end-to-end test chopchop, we provided a web-server in tests/server.go
. To try it, please run go run tests/server.go
then run chopchop with the following command ./gochopchop scan http://localhost:8000 --verbosity Debug
. ChopChop should print "no vulnerabilities found".
There are also unit test that you can launch with go test -v ./...
. These tests are integrated in the github CI workflow.
Available flags
You can find the available flags available for the scan
command :
Flag | Full flag | Description |
---|---|---|
-h | --help | Help wizard |
-v | --verbosity | Verbose level of logging |
-c | --signature | Path of custom signature file |
-k | --insecure | Disable SSL Verification |
-u | --url-file | Path to a specified file containing urls to test |
-b | --max-severity | Block the CI pipeline if severity is over or equal specified flag |
-e | --export | Export type of the output (csv and/or json) |
--export-filename | Specify the filename for the export file(s) | |
-t | --timeout | Timeout for the HTTP requests |
--severity-filter | Filter Plugins by severity | |
--plugin-filter | Filter Plugins by name of plugin | |
--threads | Number of concurrent threads |
Advanced usage
Here is a list of advanced usage that you might be interested in. Note: Redirectors like >
for post processing can be used.
- Ability to scan and disable SSL verification
$ ./gochopchop scan https://foobar.com --insecure
- Ability to scan with a custom configuration file (including custom plugins)
$ ./gochopchop scan https://foobar.com --insecure --signature test_config.yml
- Ability to list all the plugins or by severity :
plugins
orplugins --severity High
$ ./gochopchop plugins --severity High
- Ability to specify number of concurrent threads :
--threads 4
for 4 workers
$ ./gochopchop plugins --threads 4
- Ability to block the CI pipeline by severity level (equal or over specified severity) :
--max-severity Medium
$ ./gochopchop scan https://foobar.com --max-severity Medium
- Ability to specify specific signatures to be checked
./gochopchop scan https://foobar.com --timeout 1 --verbosity --export=csv,json --export-filename boo --plugin-filters=Git,Zimbra,Jenkins
- Ability to list all the plugins
$ ./gochopchop plugins
- List High severity plugins
$ ./gochopchop plugins --severity High
- Set a list or URLs located in a file
$ ./gochopchop scan --url-file url_file.txt
- Export GoChopChop results in CSV and JSON format
$ ./gochopchop scan https://foobar.com --export=csv,json --export-filename results
Creating a new check
Writing a new check is as simple as :
- endpoint: "/.git/config"
checks:
- name: Git exposed
match:
- "[branch"
remediation: Do not deploy .git folder on production servers
description: Verifies that the GIT repository is accessible from the site
severity: "High"
An endpoint (eg. /.git/config
) is mapped to multiple checks which avoids sending X requests for X checks. Multiple checks can be done through a single HTTP request. Each check needs those fields:
Attribute | Type | Description | Optional ? | Example |
---|---|---|---|---|
name | string | Name of the check | No | Git exposed |
description | string | A small description for the check | No | Ensure .git repository is not accessible from the webroot |
remediation | string | Give a remediation for this specific "issue" | No | Do not deploy .git folder on production servers |
severity | Enum("High", "Medium", "Low", "Informational") | Rate the criticity if it triggers in your environment | No | High |
status_code | integer | The HTTP status code that should be returned | Yes | 200 |
headers | List of string | List of headers there should be in the HTTP response | Yes | N/A |
no_headers | List of string | List of headers there should NOT be in the HTTP response | Yes | N/A |
match | List of string | List the strings there should be in the HTTP response | Yes | "[branch" |
no_match | List of string | List the strings there should NOT be in the HTTP response | Yes | N/A |
query_string | GET parameters that have to be passed to the endpoint | String | Yes | query_string: "id=FOO-chopchoptest" |
External Libraries
Library Name | Link | License |
---|---|---|
Viper | https://github.com/spf13/viper | MIT License |
Go-pretty | https://github.com/jedib0t/go-pretty | MIT License |
Cobra | https://github.com/spf13/cobra | Apache License 2.0 |
strfmt | https://github.com/go-openapi/strfmt | Apache License 2.0 |
Go-homedir | https://github.com/mitchellh/go-homedir | MIT License |
pkg-errors | https://github.com/pkg/errors | BSD 2 (Simplified License) |
Go-runewidth | https://github.com/mattn/go-runewidth | MIT License |
Please, refer to the third-party.txt
file for further information.
Talks
- PyCon FR 2019 (The tool was initially developed in Python) - https://docs.google.com/presentation/d/1uVXGUpt7tC7zQ1HWegoBbEg2LHamABIqfDfiD9MWsD8/edit
- DEFCON AppSec Village 2020 "Turning offsec mindset to developer's toolset" - https://drive.google.com/file/d/15P8eSarIohwCVW-tR3FN78KJPGbpAtR1/view
License
ChopChop has been released under Apache License 2.0. Please, refer to the LICENSE
file for further information.
Authors
- Paul A.
- David R. (For the Python version)
- Stanislas M. (For the Golang version)
More articles
- How To Install Pentest Tools In Ubuntu
- Hacking Apps
- Hacker Tools Github
- Black Hat Hacker Tools
- Hacker Tools Mac
- Game Hacking
- Bluetooth Hacking Tools Kali
- Pentest Tools List
- Nsa Hacker Tools
- Hacking Tools Mac
- Wifi Hacker Tools For Windows
- Hack Tools
- Pentest Tools Url Fuzzer
- Hack App
- Pentest Tools Alternative
- Pentest Tools Tcp Port Scanner
- What Is Hacking Tools
- Pentest Tools Url Fuzzer
- Hack Tool Apk
- Hacker Tools Free Download
- Usb Pentest Tools
- Hacking Tools For Mac
- New Hacker Tools
- Pentest Tools Website Vulnerability
- Hacking Tools Usb
- Hack Tools For Pc
- Hacking Tools 2020
- Hacks And Tools
- Hacking Tools For Mac
- What Is Hacking Tools
- Hacking Tools Mac
- Hacking Tools Kit
- Hacking Tools Download
- Hacking Tools Online
- How To Install Pentest Tools In Ubuntu
- Black Hat Hacker Tools
- Nsa Hack Tools
- Hacker Tools Free Download
- Hack Rom Tools
- Hack Tools Pc
- What Is Hacking Tools
- World No 1 Hacker Software
- Termux Hacking Tools 2019
- Hacking Tools Mac
- Hacker Tool Kit
- Underground Hacker Sites
- Hacking Tools
- Usb Pentest Tools
- Pentest Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Games
- Pentest Tools Website
- Ethical Hacker Tools
- Hacker Tools List
- Hack Tool Apk No Root
- Pentest Tools Download
- Pentest Tools Linux
- Hack Tools For Windows
- Pentest Tools Subdomain
- Hacking Tools For Pc
- Hacker Tools For Mac
- Pentest Tools Bluekeep
- Pentest Tools Kali Linux
- Hacks And Tools
- How To Hack
- Pentest Tools For Android
- Hackrf Tools
- Pentest Tools Nmap
- Hacker Tools For Mac
- Hacking Tools And Software
- Hack Tools For Mac
- Pentest Tools Open Source
- Hacker Tools Hardware
- Hack And Tools
- Hacker Tools 2020
- Pentest Tools For Windows
- Pentest Tools Url Fuzzer
- Pentest Tools Github
- Hacker Tools 2020
- New Hacker Tools
- Hacks And Tools
- Pentest Tools Free
- Hack Tools
- Hak5 Tools
- Android Hack Tools Github
- Hacker Search Tools
- Hacking Tools Hardware
- Pentest Box Tools Download
- Hack Tools 2019
- Hacking App
- Pentest Tools Open Source
- Hack Rom Tools
- Hacker Tools Github
- Growth Hacker Tools
- Hacker Tools Free
- Pentest Tools List
- Pentest Tools Port Scanner
- Pentest Tools Framework
- Hacker Hardware Tools
- Pentest Tools Nmap
- Pentest Tools For Android
- Hacking Tools Github
- Pentest Tools
- Hacking Tools Windows 10
- Hack Tools Online
- Pentest Tools Find Subdomains
- Pentest Tools Port Scanner
- Pentest Tools Tcp Port Scanner
- Hacker Tools For Pc
- Hacking Tools
- Hacking Tools For Windows 7
- Kik Hack Tools
- Growth Hacker Tools
- Pentest Tools Website Vulnerability
- Hacking Tools Pc
- Pentest Tools Download
- Hacking Tools
- Hack Tools Pc
- Hacker Tools 2019
- Usb Pentest Tools
- Hacking Tools 2020
- Hacks And Tools
- Hacker Search Tools
- Tools 4 Hack
- Hacking Tools Windows
- Hacking Tools For Pc
- Pentest Box Tools Download
- Pentest Tools Tcp Port Scanner
- Hacker Tools Software
- Hacker
- Hacking Tools Windows
- Hacker Tools Software
- Hack Tools Github
- Pentest Tools Website Vulnerability
- World No 1 Hacker Software
- Hacker Security Tools
- Hacker Tools Hardware
- Hack Tools Mac
- Blackhat Hacker Tools
Tidak ada komentar:
Posting Komentar