With the recent patch released, I'll discuss new features and cool functionalities. Walkthrough will be discuss.
![](https://static.wixstatic.com/media/fcac84_a3b658d86df04a88816505fe47518a21~mv2.png/v1/fill/w_980,h_450,al_c,q_90,usm_0.66_1.00_0.01,enc_auto/fcac84_a3b658d86df04a88816505fe47518a21~mv2.png)
On the previous post, I have given the application's improvement and a bit discussion of some new features. In this post, it is time to show you the functionalities and how we apply it on our work. spd>Commands
This version is a lot different from its beta release. One big difference is the replacement of menu options, would it be so cool to have a kali or metasploit feel with it, in a way that every time a user use the application he/she will feel like a legit hacker :). Below are the commands used for operation, to access this, you can type in help on the spd prompt.
![](https://static.wixstatic.com/media/fcac84_829ea10baf7e441abf0cb5b3490dc532~mv2.jpg/v1/fill/w_797,h_502,al_c,q_85,enc_auto/fcac84_829ea10baf7e441abf0cb5b3490dc532~mv2.jpg)
spd>Nightcrawler
After fixing some bugs regarding this module, below's the before and after look.
Before
![](https://static.wixstatic.com/media/fcac84_3357f0eb7a89451189303f547e300a20~mv2.jpg/v1/fill/w_418,h_201,al_c,q_80,enc_auto/fcac84_3357f0eb7a89451189303f547e300a20~mv2.jpg)
![](https://static.wixstatic.com/media/fcac84_e3fef605bc55480bad6f8f253cb3e810~mv2.jpg/v1/fill/w_783,h_185,al_c,q_80,enc_auto/fcac84_e3fef605bc55480bad6f8f253cb3e810~mv2.jpg)
After
![](https://static.wixstatic.com/media/fcac84_a9506df3c8164b5fb988a252dc4543d0~mv2.jpg/v1/fill/w_253,h_210,al_c,q_80,enc_auto/fcac84_a9506df3c8164b5fb988a252dc4543d0~mv2.jpg)
![](https://static.wixstatic.com/media/fcac84_391c76b867b045609e699e4336a7a943~mv2.jpg/v1/fill/w_316,h_198,al_c,q_80,enc_auto/fcac84_391c76b867b045609e699e4336a7a943~mv2.jpg)
Beta version prints out some javascript syntax. Already got rid of this in version 2. Also the later is much more neat than the first, providing us the data we only need. Links are not duplicated and well ordered. And as usual, results are printed on Nightcrawler.txt.
![](https://static.wixstatic.com/media/fcac84_59591cbe3a7543cc81fcfadf92917c0e~mv2.jpg/v1/fill/w_379,h_60,al_c,q_80,enc_auto/fcac84_59591cbe3a7543cc81fcfadf92917c0e~mv2.jpg)
spd>Ctrl+f
In this version I got rid of the duplicate results. This is to avoid ambiguity and redundancies. I made this possible by adding each results in a list. Before preceding in a loop, it will first check if a certain match does not exist on newurlArray(name of the list). If it does not it wont proceed with the condition. Here's the code:
![](https://static.wixstatic.com/media/fcac84_6d9bc9756c5d4365b476c49a4b7ff420~mv2.jpg/v1/fill/w_331,h_163,al_c,q_80,enc_auto/fcac84_6d9bc9756c5d4365b476c49a4b7ff420~mv2.jpg)
spd>IsitDwn
Here are the changes for this module.
Did add some status codes for site status validation.
Obviously can now be executed by using the defined command line
Can now check the status of just a single site.(remember in the previous version it only check sites in the input file)
![](https://static.wixstatic.com/media/fcac84_09347c98c7514312a5a2478559cb4f83~mv2.jpg/v1/fill/w_364,h_65,al_c,q_80,enc_auto/fcac84_09347c98c7514312a5a2478559cb4f83~mv2.jpg)
spd>VT
This module is somehow, the thing I'll brag about on this version. Virustotal has become an essential threat intel site we check to validate threat's reputation and infos. So I managed to have this as the automated version. In this section, I'll discuss just its brief details. In the future I'll elaborate the functionalities.
*vt [-url]
This is to execute url evaluation of a single or multiple websites.
a. vt -url –-input → this evaluate sites that are in vt_input_url.txt.
URLs are identified below.
![](https://static.wixstatic.com/media/fcac84_38c20dfa26f843f981dbe67401fc30e1~mv2.jpg/v1/fill/w_455,h_167,al_c,q_80,enc_auto/fcac84_38c20dfa26f843f981dbe67401fc30e1~mv2.jpg)
Result will display engine detection ratio, date first analyzed and date last analyzed, thus below's the result.
![](https://static.wixstatic.com/media/fcac84_5b3c603c49324e18a6d0e17aa2f77e8f~mv2.jpg/v1/fill/w_591,h_566,al_c,q_80,enc_auto/fcac84_5b3c603c49324e18a6d0e17aa2f77e8f~mv2.jpg)
Output will be on output3.txt
![](https://static.wixstatic.com/media/fcac84_536a9da8b69243a19e9978290ae74301~mv2.jpg/v1/fill/w_378,h_424,al_c,q_80,enc_auto/fcac84_536a9da8b69243a19e9978290ae74301~mv2.jpg)
This is also capable of single URL check.
![](https://static.wixstatic.com/media/fcac84_7135d848be2c4740abeccfdfae683667~mv2.jpg/v1/fill/w_653,h_84,al_c,q_80,enc_auto/fcac84_7135d848be2c4740abeccfdfae683667~mv2.jpg)
b. vt -hash –-input
This checks if a certain hash is malicious or not. Input will be written on vt_input_other.txt.Again, I did not set limit for the input, so you can input unlimited amount of hashes.
![](https://static.wixstatic.com/media/fcac84_6684deee24d54c5899c48a7e4912aa7e~mv2.jpg/v1/fill/w_395,h_56,al_c,q_80,enc_auto/fcac84_6684deee24d54c5899c48a7e4912aa7e~mv2.jpg)
Executing the command, below's the result.
![](https://static.wixstatic.com/media/fcac84_10be4881fdef4e299cd9f90edb814da4~mv2.jpg/v1/fill/w_449,h_332,al_c,q_80,enc_auto/fcac84_10be4881fdef4e299cd9f90edb814da4~mv2.jpg)
![](https://static.wixstatic.com/media/fcac84_762effbfca024f29a040518ee933e620~mv2.jpg/v1/fill/w_491,h_229,al_c,q_80,enc_auto/fcac84_762effbfca024f29a040518ee933e620~mv2.jpg)
Below's for the the single input
![](https://static.wixstatic.com/media/fcac84_5515d10222dc4c4bb78e24d174f4d8b5~mv2.jpg/v1/fill/w_454,h_256,al_c,q_80,enc_auto/fcac84_5515d10222dc4c4bb78e24d174f4d8b5~mv2.jpg)
As usual output will be displayed on output.txt.
spd>Whois -ip –-i
This module is to evaluate given IP address, and apply whois method to such.
Input will be on ip-whois.txt
![](https://static.wixstatic.com/media/fcac84_aee3c8680ea94ca7a30a787da27b8e89~mv2.jpg/v1/fill/w_255,h_140,al_c,q_80,enc_auto/fcac84_aee3c8680ea94ca7a30a787da27b8e89~mv2.jpg)
Applying the complete command , below will be the output.
![](https://static.wixstatic.com/media/fcac84_a0814b3c96a747de99817980c5e45cc2~mv2.jpg/v1/fill/w_375,h_498,al_c,q_80,enc_auto/fcac84_a0814b3c96a747de99817980c5e45cc2~mv2.jpg)
![](https://static.wixstatic.com/media/fcac84_a9b6ff827a184257bd664cb4ad0a0ea9~mv2.jpg/v1/fill/w_390,h_434,al_c,q_80,enc_auto/fcac84_a9b6ff827a184257bd664cb4ad0a0ea9~mv2.jpg)
![](https://static.wixstatic.com/media/fcac84_9e61b84f94f9436b8f0e9fee667cdbe0~mv2.jpg/v1/fill/w_400,h_399,al_c,q_80,enc_auto/fcac84_9e61b84f94f9436b8f0e9fee667cdbe0~mv2.jpg)
![](https://static.wixstatic.com/media/fcac84_e3267bd4de7f4c9e96c892715b5d2b40~mv2.jpg/v1/fill/w_386,h_507,al_c,q_80,enc_auto/fcac84_e3267bd4de7f4c9e96c892715b5d2b40~mv2.jpg)
Output would be saved in output file.
![](https://static.wixstatic.com/media/fcac84_d32b0709f2eb48c48b8c1591d5154566~mv2.jpg/v1/fill/w_512,h_595,al_c,q_80,enc_auto/fcac84_d32b0709f2eb48c48b8c1591d5154566~mv2.jpg)
Can also be good with just single IP check.
![](https://static.wixstatic.com/media/fcac84_06b044c48cb54a718e2f7e1c273da551~mv2.jpg/v1/fill/w_562,h_464,al_c,q_80,enc_auto/fcac84_06b044c48cb54a718e2f7e1c273da551~mv2.jpg)
spd>whois -rep ipvoid [ipaddress]
With command whois -rep ipvoid [ipaddress], would output results coming from ipvoid threat intel site.
Just like the previous modules, evaluation from file input has no limit.
![](https://static.wixstatic.com/media/fcac84_34db2257fd0143fbb11a330e3604dc40~mv2.jpg/v1/fill/w_293,h_785,al_c,q_80,enc_auto/fcac84_34db2257fd0143fbb11a330e3604dc40~mv2.jpg)
Here's the output.
In text file:
![](https://static.wixstatic.com/media/fcac84_24512a2c7650449ea9308900e526276f~mv2.jpg/v1/fill/w_980,h_495,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/fcac84_24512a2c7650449ea9308900e526276f~mv2.jpg)
In cmd
![](https://static.wixstatic.com/media/fcac84_d42164344628404fa486e34100be86e3~mv2.jpg/v1/fill/w_908,h_646,al_c,q_85,enc_auto/fcac84_d42164344628404fa486e34100be86e3~mv2.jpg)
IP could also be checked in single input
![](https://static.wixstatic.com/media/fcac84_e25b8c4e83be42039778accd3a8b73a5~mv2.jpg/v1/fill/w_980,h_499,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/fcac84_e25b8c4e83be42039778accd3a8b73a5~mv2.jpg)
spd>Snip
This module take a snapshot with the site without the aid of a browser with the help of webdriver.phantomJS module.
snip/sc http://www.hacking-tutorial.com/hacking-tutorial/code-your-first-simple-sql-injection-checking-vulnerability-with-python/#sthash.g4OMpVWk.kpVcI755.dpbs
Below is the result
![](https://static.wixstatic.com/media/fcac84_65a92c6bf5b54fbd895f900b77075666~mv2.jpg/v1/fill/w_980,h_81,al_c,q_80,usm_0.66_1.00_0.01,enc_auto/fcac84_65a92c6bf5b54fbd895f900b77075666~mv2.jpg)
Image was saved on C: drive
![](https://static.wixstatic.com/media/fcac84_058060cd81374848a357a54c61f3695a~mv2.jpg/v1/fill/w_860,h_159,al_c,q_80,enc_auto/fcac84_058060cd81374848a357a54c61f3695a~mv2.jpg)
And we have the screenshot of the site
![](https://static.wixstatic.com/media/fcac84_fa6d3767078d461baf7faea044458171~mv2.jpg/v1/fill/w_866,h_584,al_c,q_85,enc_auto/fcac84_fa6d3767078d461baf7faea044458171~mv2.jpg)
spd>mail
Decided to have a little collaboration with the app user. That is why I put an email section where user can contact me and provide me feedback regarding my app.
![](https://static.wixstatic.com/media/fcac84_0615209e56914e45b7fb69774a3cec51~mv2.jpg/v1/fill/w_980,h_63,al_c,q_80,usm_0.66_1.00_0.01,enc_auto/fcac84_0615209e56914e45b7fb69774a3cec51~mv2.jpg)
In my mail...
![](https://static.wixstatic.com/media/fcac84_879669ce54964038a951a5ce14dfe8d3~mv2.jpg/v1/fill/w_938,h_135,al_c,q_80,enc_auto/fcac84_879669ce54964038a951a5ce14dfe8d3~mv2.jpg)
And I just had an interaction with the user, got his feedback =)
spd>cls or clear
I decided to integrate this clear screen command on this app, so background and feel is clean and classy.
spd>exit/halt/quit
Finally the last command you execute to terminate or close the program.
That would end this post, hope you enjoy, and I will keep you posted with the next patch. =)
exit
.
.
.
![](https://static.wixstatic.com/media/fcac84_4a36d8e37e9247cfbe49fd060fd17e16~mv2.jpg/v1/fill/w_258,h_71,al_c,q_80,enc_auto/fcac84_4a36d8e37e9247cfbe49fd060fd17e16~mv2.jpg)
Kommentare