l0gan/domainCat

API troubles

qurbat opened this issue · 0 comments

Hi,

This seems like an exciting project. I tried to use it several times, with different services, but to no avail.

think@pad:~/domainCat$ python domainCat.py --service <service> --domain-list list -o out

Bluecoat WebPulse

[*] Targeting Bluecoat WebPulse
[*] Checking category for 0123moviehub.com
[-] An error occurred
list index out of range
[*] Targeting Bluecoat WebPulse
[*] Checking category for 0123movies.com
[-] An error occurred

Cisco Talos

[*] Targeting Cisco Talos
[*] Checking category for 0123moviehub.com
[-] An error occurred
Expecting value: line 1 column 1 (char 0)
[*] Targeting Cisco Talos
[*] Checking category for 0123movies.com
[-] An error occurred
Expecting value: line 1 column 1 (char 0)

Fortiguard

[*] Targeting Fortiguard
[*] Checking category for 0123moviehub.com
Traceback (most recent call last):
  File "domainCat.py", line 197, in <module>
    dc.run(domain.rstrip(), service, args.output)
  File "domainCat.py", line 31, in run
    dc.writeOutput(fname, "fortiguard", domain, self.fortiguardCheck(domain))
  File "domainCat.py", line 113, in fortiguardCheck
    return xf.check_category(domain)
  File "/home/think/domainCat/modules/fortiguard.py", line 19, in check_category
    response = urllib.request.urlopen(request)
  File "/usr/lib/python3.8/urllib/request.py", line 222, in urlopen
    return opener.open(url, data, timeout)
  File "/usr/lib/python3.8/urllib/request.py", line 531, in open
    response = meth(req, response)
  File "/usr/lib/python3.8/urllib/request.py", line 640, in http_response
    response = self.parent.error(
  File "/usr/lib/python3.8/urllib/request.py", line 563, in error
    result = self._call_chain(*args)
  File "/usr/lib/python3.8/urllib/request.py", line 502, in _call_chain
    result = func(*args)
  File "/usr/lib/python3.8/urllib/request.py", line 755, in http_error_302
    return self.parent.open(new, timeout=req.timeout)
  File "/usr/lib/python3.8/urllib/request.py", line 531, in open
    response = meth(req, response)
  File "/usr/lib/python3.8/urllib/request.py", line 640, in http_response
    response = self.parent.error(
  File "/usr/lib/python3.8/urllib/request.py", line 569, in error
    return self._call_chain(*args)
  File "/usr/lib/python3.8/urllib/request.py", line 502, in _call_chain
    result = func(*args)
  File "/usr/lib/python3.8/urllib/request.py", line 649, in http_error_default
    raise HTTPError(req.full_url, code, msg, hdrs, fp)
urllib.error.HTTPError: HTTP Error 422: Unprocessable Entity

IBM Xforce

[*] Targeting IBM Xforce
[*] IBM xForce Check: 0123moviehub.com
[-] Error retrieving IBM x-Force reputation!
[*] Targeting IBM Xforce
[*] IBM xForce Check: 0123movies.com
[-] Error retrieving IBM x-Force reputation!

McAfee

[*] Targeting McAfee Trustedsource
[-] Getting anti-automation tokens
Traceback (most recent call last):
  File "domainCat.py", line 197, in <module>
    dc.run(domain.rstrip(), service, args.output)
  File "domainCat.py", line 41, in run
    dc.writeOutput(fname, "mcafee", domain, self.trustedsourceCheck(domain))
  File "domainCat.py", line 98, in trustedsourceCheck
    return ts.check_category(domain)
  File "/home/think/domainCat/modules/trustedsource.py", line 21, in check_category
    e = form.find("input", {'name': 'e'}).get('value')
AttributeError: 'NoneType' object has no attribute 'find'

Websense

This is the only only service I found to still function. Their API has a limit of five queries/day per unique IPv4 address, though this has already been documented by your project. Another thing to note is that Websense falsely labelled a piracy website under the category 'hacking.' I thought this might be pertinent to share.

[*] Targeting Websense
[-] Checking if you have any requests for the day.
[-] You have 5 requests left for the day.
[*] Checking category for 0123moviehub.com
[!] Site categorized as: Hacking
[*] Targeting Websense
[-] Checking if you have any requests for the day.
[-] You have 4 requests left for the day.
[*] Checking category for 0123movies.com
[!] Site categorized as: Hacking
[*] Targeting Websense