Sabtu, 27 Januari 2024

ChopChop - ChopChop Is A CLI To Help Developers Scanning Endpoints And Identifying Exposition Of Sensitive Services/Files/Folders


ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT.

Its goal is to scan several endpoints and identify exposition of services/files/folders through the webroot. Checks/Signatures are declared in a config file (by default: chopchop.yml), fully configurable, and especially by developers.



"Chop chop" is a phrase rooted in Cantonese. "Chop chop" means "hurry" and suggests that something should be done now and without delay.


Building

We tried to make the build process painless and hopefully, it should be as easy as:

$ go mod download
$ go build .

There should be a resulting gochopchop binary in the folder.


Using Docker

Thanks to Github Container Registry, we are able to provide you some freshly-build Docker images!

docker run ghcr.io/michelin/gochopchop scan https://foobar.com -v debug

But if you prefer, you can also build it locally, see below:


Build locally
docker build -t gochopchop .

Usage

We are continuously trying to make goChopChop as easy as possible. Scanning a host with this utility is as simple as :

$ ./gochopchop scan https://foobar.com

Using Docker
docker run gochopchop scan https://foobar.com

Custom configuration file
docker run -v ./:/app chopchop scan -c /app/chopchop.yml https://foobar.com

What's next

The Golang rewrite took place a couple of months ago but there's so much to do, still. Here are some features we are planning to integrate : [x] Threading for better performance [x] Ability to specify the number of concurrent threads [x] Colors and better formatting [x] Ability to filter checks/signatures to search for [x] Mock and unit tests [x] Github CI And much more!


Testing

To quickly end-to-end test chopchop, we provided a web-server in tests/server.go. To try it, please run go run tests/server.go then run chopchop with the following command ./gochopchop scan http://localhost:8000 --verbosity Debug. ChopChop should print "no vulnerabilities found".

There are also unit test that you can launch with go test -v ./.... These tests are integrated in the github CI workflow.


Available flags

You can find the available flags available for the scan command :

Flag Full flag Description
-h --help Help wizard
-v --verbosity Verbose level of logging
-c --signature Path of custom signature file
-k --insecure Disable SSL Verification
-u --url-file Path to a specified file containing urls to test
-b --max-severity Block the CI pipeline if severity is over or equal specified flag
-e --export Export type of the output (csv and/or json)
--export-filename Specify the filename for the export file(s)
-t --timeout Timeout for the HTTP requests
--severity-filter Filter Plugins by severity
--plugin-filter Filter Plugins by name of plugin
--threads Number of concurrent threads

Advanced usage

Here is a list of advanced usage that you might be interested in. Note: Redirectors like > for post processing can be used.

  • Ability to scan and disable SSL verification
$ ./gochopchop scan https://foobar.com --insecure
  • Ability to scan with a custom configuration file (including custom plugins)
$ ./gochopchop scan https://foobar.com --insecure --signature test_config.yml
  • Ability to list all the plugins or by severity : plugins or plugins --severity High
$ ./gochopchop plugins --severity High
  • Ability to specify number of concurrent threads : --threads 4 for 4 workers
$ ./gochopchop plugins --threads 4
  • Ability to block the CI pipeline by severity level (equal or over specified severity) : --max-severity Medium
$ ./gochopchop scan https://foobar.com --max-severity Medium
  • Ability to specify specific signatures to be checked
./gochopchop scan https://foobar.com --timeout 1 --verbosity --export=csv,json --export-filename boo --plugin-filters=Git,Zimbra,Jenkins
  • Ability to list all the plugins
$ ./gochopchop plugins
  • List High severity plugins
$ ./gochopchop plugins --severity High
  • Set a list or URLs located in a file
$ ./gochopchop scan --url-file url_file.txt
  • Export GoChopChop results in CSV and JSON format
$ ./gochopchop scan https://foobar.com  --export=csv,json --export-filename results

Creating a new check

Writing a new check is as simple as :

  - endpoint: "/.git/config"
checks:
- name: Git exposed
match:
- "[branch"
remediation: Do not deploy .git folder on production servers
description: Verifies that the GIT repository is accessible from the site
severity: "High"

An endpoint (eg. /.git/config) is mapped to multiple checks which avoids sending X requests for X checks. Multiple checks can be done through a single HTTP request. Each check needs those fields:

Attribute Type Description Optional ? Example
name string Name of the check No Git exposed
description string A small description for the check No Ensure .git repository is not accessible from the webroot
remediation string Give a remediation for this specific "issue" No Do not deploy .git folder on production servers
severity Enum("High", "Medium", "Low", "Informational") Rate the criticity if it triggers in your environment No High
status_code integer The HTTP status code that should be returned Yes 200
headers List of string List of headers there should be in the HTTP response Yes N/A
no_headers List of string List of headers there should NOT be in the HTTP response Yes N/A
match List of string List the strings there should be in the HTTP response Yes "[branch"
no_match List of string List the strings there should NOT be in the HTTP response Yes N/A
query_string GET parameters that have to be passed to the endpoint String Yes query_string: "id=FOO-chopchoptest"

External Libraries
Library Name Link License
Viper https://github.com/spf13/viper MIT License
Go-pretty https://github.com/jedib0t/go-pretty MIT License
Cobra https://github.com/spf13/cobra Apache License 2.0
strfmt https://github.com/go-openapi/strfmt Apache License 2.0
Go-homedir https://github.com/mitchellh/go-homedir MIT License
pkg-errors https://github.com/pkg/errors BSD 2 (Simplified License)
Go-runewidth https://github.com/mattn/go-runewidth MIT License

Please, refer to the third-party.txt file for further information.


Talks

License

ChopChop has been released under Apache License 2.0. Please, refer to the LICENSE file for further information.


Authors
  • Paul A.
  • David R. (For the Python version)
  • Stanislas M. (For the Golang version)


More articles

  1. How To Install Pentest Tools In Ubuntu
  2. Hacking Apps
  3. Hacker Tools Github
  4. Black Hat Hacker Tools
  5. Hacker Tools Mac
  6. Game Hacking
  7. Bluetooth Hacking Tools Kali
  8. Pentest Tools List
  9. Nsa Hacker Tools
  10. Hacking Tools Mac
  11. Wifi Hacker Tools For Windows
  12. Hack Tools
  13. Pentest Tools Url Fuzzer
  14. Hack App
  15. Pentest Tools Alternative
  16. Pentest Tools Tcp Port Scanner
  17. What Is Hacking Tools
  18. Pentest Tools Url Fuzzer
  19. Hack Tool Apk
  20. Hacker Tools Free Download
  21. Usb Pentest Tools
  22. Hacking Tools For Mac
  23. New Hacker Tools
  24. Pentest Tools Website Vulnerability
  25. Hacking Tools Usb
  26. Hack Tools For Pc
  27. Hacking Tools 2020
  28. Hacks And Tools
  29. Hacking Tools For Mac
  30. What Is Hacking Tools
  31. Hacking Tools Mac
  32. Hacking Tools Kit
  33. Hacking Tools Download
  34. Hacking Tools Online
  35. How To Install Pentest Tools In Ubuntu
  36. Black Hat Hacker Tools
  37. Nsa Hack Tools
  38. Hacker Tools Free Download
  39. Hack Rom Tools
  40. Hack Tools Pc
  41. What Is Hacking Tools
  42. World No 1 Hacker Software
  43. Termux Hacking Tools 2019
  44. Hacking Tools Mac
  45. Hacker Tool Kit
  46. Underground Hacker Sites
  47. Hacking Tools
  48. Usb Pentest Tools
  49. Pentest Tools
  50. How To Install Pentest Tools In Ubuntu
  51. Hacking Tools For Games
  52. Pentest Tools Website
  53. Ethical Hacker Tools
  54. Hacker Tools List
  55. Hack Tool Apk No Root
  56. Pentest Tools Download
  57. Pentest Tools Linux
  58. Hack Tools For Windows
  59. Pentest Tools Subdomain
  60. Hacking Tools For Pc
  61. Hacker Tools For Mac
  62. Pentest Tools Bluekeep
  63. Pentest Tools Kali Linux
  64. Hacks And Tools
  65. How To Hack
  66. Pentest Tools For Android
  67. Hackrf Tools
  68. Pentest Tools Nmap
  69. Hacker Tools For Mac
  70. Hacking Tools And Software
  71. Hack Tools For Mac
  72. Pentest Tools Open Source
  73. Hacker Tools Hardware
  74. Hack And Tools
  75. Hacker Tools 2020
  76. Pentest Tools For Windows
  77. Pentest Tools Url Fuzzer
  78. Pentest Tools Github
  79. Hacker Tools 2020
  80. New Hacker Tools
  81. Hacks And Tools
  82. Pentest Tools Free
  83. Hack Tools
  84. Hak5 Tools
  85. Android Hack Tools Github
  86. Hacker Search Tools
  87. Hacking Tools Hardware
  88. Pentest Box Tools Download
  89. Hack Tools 2019
  90. Hacking App
  91. Pentest Tools Open Source
  92. Hack Rom Tools
  93. Hacker Tools Github
  94. Growth Hacker Tools
  95. Hacker Tools Free
  96. Pentest Tools List
  97. Pentest Tools Port Scanner
  98. Pentest Tools Framework
  99. Hacker Hardware Tools
  100. Pentest Tools Nmap
  101. Pentest Tools For Android
  102. Hacking Tools Github
  103. Pentest Tools
  104. Hacking Tools Windows 10
  105. Hack Tools Online
  106. Pentest Tools Find Subdomains
  107. Pentest Tools Port Scanner
  108. Pentest Tools Tcp Port Scanner
  109. Hacker Tools For Pc
  110. Hacking Tools
  111. Hacking Tools For Windows 7
  112. Kik Hack Tools
  113. Growth Hacker Tools
  114. Pentest Tools Website Vulnerability
  115. Hacking Tools Pc
  116. Pentest Tools Download
  117. Hacking Tools
  118. Hack Tools Pc
  119. Hacker Tools 2019
  120. Usb Pentest Tools
  121. Hacking Tools 2020
  122. Hacks And Tools
  123. Hacker Search Tools
  124. Tools 4 Hack
  125. Hacking Tools Windows
  126. Hacking Tools For Pc
  127. Pentest Box Tools Download
  128. Pentest Tools Tcp Port Scanner
  129. Hacker Tools Software
  130. Hacker
  131. Hacking Tools Windows
  132. Hacker Tools Software
  133. Hack Tools Github
  134. Pentest Tools Website Vulnerability
  135. World No 1 Hacker Software
  136. Hacker Security Tools
  137. Hacker Tools Hardware
  138. Hack Tools Mac
  139. Blackhat Hacker Tools

Tidak ada komentar:

Posting Komentar