Red Team Arsenal
Red Team Arsenal is a web/network security scanner which has the capability to scan all company's online facing assets and provide an holistic security view of any security anomalies. It's a closely linked collections of security engines to conduct/simulate attacks and monitor public facing assets for anomalies and leaks.
It's an intelligent scanner detecting security anomalies in all layer 7 assets and gives a detailed report with integration support with nessus. As companies continue to expand their footprint on INTERNET via various acquisitions and geographical expansions, human driven security engineering is not scalable, hence, companies need feedback driven automated systems to stay put.
RTA has been tested both on Ubuntu/Debian (apt-get based distros) and as well as Mac OS. It should ideally work with any linux based distributions with mongo and python installed (install required python libraries from
There are a few packages which are necessary before proceeding with the installation:
- Git client:
sudo apt-get install git
- Python 2.7, which is installed by default in most systems
- Python pip:
sudo apt-get install python-pip
- MongoDB: Read the official installation guide to install it on your machine.
There are also optional packages/tools you can install (highly recommended):
Integrating Nessus into Red Team Arsenal can be done is simple 3 steps:
Download and install Nessus community edition (if you don’t have a paid edition). If you already have an installation (it can be remote installation as well), then go to step (2).
configfile (present on the root directory of RTA) with Nessus URL, username and password.
Create a nessus policy where you can configure the type of scans and plugins to run and name it RTA (Case sensitive - use full uppercase).
Once the config file has the correct Nessus information (url, username, password), use the flag
--nessuswhile running RTA to launch nessus scan over the entire subdomains gathered by RTA (one single scan initiated with all the subdomains gathered).
|Short Form||Long Form||Description|
|-u||--url||Domain URL to scan|
|-v||--verbose||Enable the verbose mode and display results in realtime|
|-n||--nessus||Launch a Nessus scan with all the subdomains|
|-s||--scraper||Run scraper based on config keywords|
|-h||--help||show the help message and exit|
a0xnirudh@exploitbox /RTA (master*) $ python rta.py --url "0daylabs.com" -v -s ____ _ _____ _ _ | _ \ ___ __| | |_ _|__ __ _ _ __ ___ / \ _ __ ___ ___ _ __ __ _| | | |_) / _ \/ _` | | |/ _ \/ _` | '_ ` _ \ / _ \ | '__/ __|/ _ \ '_ \ / _` | | | _ < __/ (_| | | | __/ (_| | | | | | | / ___ \| | \__ \ __/ | | | (_| | | |_| \_\___|\__,_| |_|\___|\__,_|_| |_| |_| /_/ \_\_| |___/\___|_| |_|\__,_|_| [i] Checking for Zonetransfer [i] Zone Transfer is not enabled [i] Checking for SPF records [+] SPF record lookups is good. Current value is: 9 [-] Enumerating subdomains now for 0daylabs.com [-] Searching now in Baidu.. [-] Searching now in Yahoo.. [-] Searching now in Google.. [-] Searching now in Bing.. [-] Searching now in Ask.. [-] Searching now in Netcraft.. [-] Searching now in DNSdumpster.. [-] Searching now in Virustotal.. [-] Searching now in ThreatCrowd.. [-] Searching now in SSL Certificates.. [-] Searching now in PassiveDNS.. [-] Total Unique Subdomains Found: 3 blog.0daylabs.com www.0daylabs.com test.0daylabs.com [+] Verifying Subdomains and takeover options [+] Possible subdomain takeovers (Manual verification required): test.0daylabs.com [i] Verified and Analyzed Subdomains: [i] URL: blog.0daylabs.com [i] Wappalyzer: [u'jQuery', u'Varnish', u'Font Awesome', u'Twitter Bootstrap', u'Google Analytics', u'Google Font API', u'Disqus', u'Google AdSense'] [i] Scraper Results [+] Shodan Hostname: test.0daylabs.com IP: 188.8.131.52 Ports: 179 Hostname: test.0daylabs.com IP: 184.108.40.206 Ports: 179 [+] Twitter URL: https://twitter.com/tweetrpersonal9/status/832624003751694340 search string: 0daylabs URL: https://twitter.com/ratokeshi/status/823957535564644355 search string: 0daylabs
RTA can also do push notifications to
slack which includes the main scan highlight along with Nessus and other integrated scanner reports divided on the basis of severity.
In your slack, create an incoming webhook and point it to the channel where you need the RTA to send the report. You can read more about creating incoming webhooks on slack documentation.
In the config file, update the URL in the slack section with full URL (including https://) for the incoming webhook.
Once slack is configured, you will automatically start getting reports on your configured slack channel
Here are couple of ideas which we have in mind to do going ahead with RTA. If you have any ideas/feature requests which is not listed below, feel free to raise an issue in github.
Email the results once the scan is completed.
Extend the current RTA API so that we can launch custom scans with required options via the API.
Launch custom scans based on Wappalyzer results (eg: wpscan if wordpress is detected)
Investigate and integrate more web security scanners including but not limited to Arachni, Wapiti, Skipfish and others !
JSON/XML output formatting for the RTA scan result.
Improving the logic for Subdomain takeover.
Multi threading support for faster scan comple.
Awesome people who built this project:
Anirudh Anand (@a0xnirudh)