How to Install and Use Spiderfoot in Ubuntu

To Install and Use Spiderfoot in Ubuntu

Spiderfoot is a free source testing tool to analyse any vulnerabilities/malicious functions on the server to reduce the attacks by the hackers. It is also known as a footprint tool and is written in Python language. Installation of spiderfoot is explained in this article.

Features

  • It supports Linux and windows machines and can be collaborated with GitHub.
  • Supports GUI.
  • Highly composed.
  • It deploys SQLite in backend and stores the result in SQLite DB.

To install Spiderfoot

Utilise the following command to install the dependency packages.

root@linuxhelp:~# apt-get install git python-dev python-pip python-m2crypto python-netaddr python-pypdf python-stem python-lxml -y
Reading package lists... Done
Building dependency tree       
Reading state information... Done
python-lxml is already the newest version.
python-lxml set to manually installed.
The following extra packages will be installed:
  git-man ieee-data liberror-perl libexpat1 libexpat1-dev libpython-dev libpython2.7-dev python-colorama python-distlib python-ndg-httpsclient python-requests
  python-setuptools python-urllib3 python-wheel python2.7-dev
.
.
.
Setting up python-urllib3 (1.11-1) ...
Setting up python-requests (2.7.0-3) ...
Setting up python-setuptools (18.4-1) ...
Setting up python-pip (1.5.6-7ubuntu1.2) ...
Setting up python-pypdf (1:1.13-3) ...
Setting up python-stem (1.4.1b-1) ...
Setting up python-wheel (0.26.0-1) ...
Processing triggers for libc-bin (2.21-0ubuntu4) ...

Run the following command to install cherrypy and mako

root@linuxhelp:~# pip install cherrypy
Downloading/unpacking cherrypy
  Downloading CherryPy-7.1.0.tar.gz (416kB): 416kB downloaded
  Running setup.py (path:/tmp/pip-build-x2vGzY/cherrypy/setup.py) egg_info for package cherrypy
    
Requirement already satisfied (use --upgrade to upgrade): six in /usr/lib/python2.7/dist-packages (from cherrypy)
Installing collected packages: cherrypy
  Running setup.py install for cherrypy
    changing mode of build/scripts-2.7/cherryd from 644 to 755
    
    changing mode of /usr/local/bin/cherryd to 755
Successfully installed cherrypy
Cleaning up...
root@linuxhelp:~# pip install mako
Downloading/unpacking mako
  Downloading Mako-1.0.4.tar.gz (574kB): 574kB downloaded
  Running setup.py (path:/tmp/pip-build-fqiiY8/mako/setup.py) egg_info for package mako
    
    warning: no files found matching ' *.xml'  under directory ' examples' 
    warning: no files found matching ' *.mako'  under directory ' examples' 
    warning: no files found matching ' distribute_setup.py' 
.
.
.
building ' markupsafe._speedups'  extension
    x86_64-linux-gnu-gcc -pthread -DNDEBUG -g -fwrapv -O2 -Wall -Wstrict-prototypes -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -g -fstack-protector-strong -Wformat -Werror=format-security -fPIC -I/usr/include/python2.7 -c markupsafe/_speedups.c -o build/temp.linux-x86_64-2.7/markupsafe/_speedups.o
    x86_64-linux-gnu-gcc -pthread -shared -Wl,-O1 -Wl,-Bsymbolic-functions -Wl,-Bsymbolic-functions -Wl,-z,relro -fno-strict-aliasing -DNDEBUG -g -fwrapv -O2 -Wall -Wstrict-prototypes -D_FORTIFY_SOURCE=2 -g -fstack-protector-strong -Wformat -Werror=format-security -Wl,-Bsymbolic-functions -Wl,-z,relro -D_FORTIFY_SOURCE=2 -g -fstack-protector-strong -Wformat -Werror=format-security build/temp.linux-x86_64-2.7/markupsafe/_speedups.o -o build/lib.linux-x86_64-2.7/markupsafe/_speedups.so
Successfully installed mako MarkupSafe
Cleaning up...

Download the spiderfoot package by using wget command.

root@linuxhelp:~# wget http://downloads.sourceforge.net/project/spiderfoot/spiderfoot-2.6.1-src.tar.gz
--2016-07-28 09:46:30--  http://downloads.sourceforge.net/project/spiderfoot/spiderfoot-2.6.1-src.tar.gz
Resolving downloads.sourceforge.net (downloads.sourceforge.net)... 216.34.181.59
Connecting to downloads.sourceforge.net (downloads.sourceforge.net)|216.34.181.59|:80... connected.
HTTP request sent, awaiting response... 302 Found
Location: http://liquidtelecom.dl.sourceforge.net/project/spiderfoot/spiderfoot-2.6.1-src.tar.gz [following]
--2016-07-28 09:46:30--  http://liquidtelecom.dl.sourceforge.net/project/spiderfoot/spiderfoot-2.6.1-src.tar.gz
Resolving liquidtelecom.dl.sourceforge.net (liquidtelecom.dl.sourceforge.net)... 197.155.77.8
Connecting to liquidtelecom.dl.sourceforge.net (liquidtelecom.dl.sourceforge.net)|197.155.77.8|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1460517 (1.4M) [application/x-gzip]
Saving to: ‘ spiderfoot-2.6.1-src.tar.gz’ 

spiderfoot-2.6.1-src.tar.gz                100%[==========================================================================================> ]   1.39M  61.7KB/s   in 41s    

2016-07-28 09:47:17 (34.8 KB/s) - ‘ spiderfoot-2.6.1-src.tar.gz’  saved [1460517/1460517]

Extract the downloaded file by using the following command.

root@linuxhelp:~# tar -xzvf spiderfoot-2.6.1-src.tar.gz
spiderfoot-2.6.1/
spiderfoot-2.6.1/sfdb.py
spiderfoot-2.6.1/cache/
spiderfoot-2.6.1/cache/95c5dab788d19e124540cb1e96e6277f0871c648f4b3f2526fa1f765
spiderfoot-2.6.1/modules/
spiderfoot-2.6.1/modules/sfp_darksearch.py
spiderfoot-2.6.1/modules/sfp_sharedip.py
spiderfoot-2.6.1/modules/sfp_webframework.py
spiderfoot-2.6.1/modules/sfp_accounts.py
spiderfoot-2.6.1/modules/sfp_vuln.py
.
.
.
spiderfoot-2.6.1/ext/stem/interpreter/arguments.py
spiderfoot-2.6.1/ext/stem/interpreter/autocomplete.py
spiderfoot-2.6.1/ext/gexf/
spiderfoot-2.6.1/ext/gexf/_gexf.py
spiderfoot-2.6.1/ext/gexf/__init__.py
spiderfoot-2.6.1/LICENSE
spiderfoot-2.6.1/sfwebui.py
spiderfoot-2.6.1/LICENSE.tp

Run the python script located in the extracted directory.

root@linuxhelp:~# cd spiderfoot-2.6.1/
root@linuxhelp:~/spiderfoot-2.6.1# ls
cache  Dockerfile  dyn  ext  LICENSE  LICENSE.tp  modules  README.md  sfdb.py  sflib.py  sf.py  sfscan.py  sfwebui.py  static  THANKYOU  VERSION
root@linuxhelp:~/spiderfoot-2.6.1# ./sf.py
Starting web server at http://127.0.0.1:5001 ...

*************************************************************
 Use SpiderFoot by starting your web browser of choice and
 browse to http://127.0.0.1:5001
*************************************************************

[28/Jul/2016:09:48:28] ENGINE Listening for SIGHUP.
[28/Jul/2016:09:48:28] ENGINE Listening for SIGTERM.
[28/Jul/2016:09:48:28] ENGINE Listening for SIGUSR1.
[28/Jul/2016:09:48:28] ENGINE Bus STARTING
[28/Jul/2016:09:48:28] ENGINE Started monitor thread ' _TimeoutMonitor' .
[28/Jul/2016:09:48:28] ENGINE Serving on http://127.0.0.1:5001
[28/Jul/2016:09:48:28] ENGINE Bus STARTED

Open the browser and navigate to http://< IP_address> :5001


Click New Scan to start a scan.

Enter the scan name and target server and then click Run Scan.

To view the status of the scan click Status tab.

IP Address

Malicious IP Address

Open TCP Port

Open TCP Port Banner

Raw Data from RIRs

Click Browse to see all Data Elements.

To view the Log, click log tab

FAQ
Q
What is SpiderFoot?
A
Spiderfoot is a tool written by Steve Micallef that automates the whole OSINT process.

As there are tons of data available on the web on different services, networks, and protocols... gathering all this information from every single place and one at the time becomes a pretty time-consuming task.
Q
I need similar alternatives
A
try the following OSINT Framework, OSINT-SPY, GasMask
Q
Is there any offical link for this tool?
A
refer this link, http://www.spiderfoot.net/
Q
give me download link
A
You can get it from here, http://www.spiderfoot.net/download/
Q
Can I install it on Windows?
A
Yes, you can download the package here, http://www.spiderfoot.net/files/SpiderFoot-2.12-w32.zip