|
|
- __author__ = 'Helium'
-
- '''
- Silk Road 4 Crawler (Selenium)
- '''
-
- from selenium import webdriver
- from selenium.common.exceptions import NoSuchElementException
- from selenium.webdriver.firefox.firefox_profile import FirefoxProfile
- from selenium.webdriver.firefox.firefox_binary import FirefoxBinary
- from selenium.webdriver.firefox.service import Service
- from selenium.webdriver.support.ui import WebDriverWait
- from selenium.webdriver.support import expected_conditions as EC
- from selenium.webdriver.common.by import By
-
- from PIL import Image
- import urllib.parse as urlparse
- import os, re, time
- from datetime import date
- import subprocess
- import configparser
- from bs4 import BeautifulSoup
- from MarketPlaces.Initialization.prepare_parser import new_parse
- from MarketPlaces.SilkRoad4.parser import silkroad4_links_parser
- from MarketPlaces.Utilities.utilities import cleanHTML
-
- counter = 1
- baseURL = 'http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/'
-
-
- # Opens Tor Browser, crawls the website, then parses, then closes tor
-
- #acts like the main method for the crawler, another function at the end of this code calls this function later
- def startCrawling():
- mktName = getMKTName()
- driver = getAccess()
-
- if driver != 'down':
- try:
- login(driver)
- crawlForum(driver)
- except Exception as e:
- print(driver.current_url, e)
- closeDriver(driver)
-
- new_parse(mktName, baseURL, True)
-
-
- # Returns the name of the website
- #return: name of site in string type
- def getMKTName():
- name = 'SilkRoad4'
- return name
-
-
- # Return the base link of the website
- #return: url of base site in string type
- def getFixedURL():
- url = 'http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/'
- return url
-
-
- # Closes Tor Browser
- #@param: current selenium driver
- def closeDriver(driver):
- # global pid
- # os.system("taskkill /pid " + str(pro.pid))
- # os.system("taskkill /t /f /im tor.exe")
- print('Closing Tor...')
- driver.close()
- time.sleep(3)
- return
-
-
- # Creates FireFox 'driver' and configure its 'Profile'
- # to use Tor proxy and socket
- def createFFDriver():
- from MarketPlaces.Initialization.markets_mining import config
-
- ff_binary = FirefoxBinary(config.get('TOR', 'firefox_binary_path'))
-
- ff_prof = FirefoxProfile(config.get('TOR', 'firefox_profile_path'))
- ff_prof.set_preference("places.history.enabled", False)
- ff_prof.set_preference("privacy.clearOnShutdown.offlineApps", True)
- ff_prof.set_preference("privacy.clearOnShutdown.passwords", True)
- ff_prof.set_preference("privacy.clearOnShutdown.siteSettings", True)
- ff_prof.set_preference("privacy.sanitize.sanitizeOnShutdown", True)
- ff_prof.set_preference("signon.rememberSignons", False)
- ff_prof.set_preference("network.cookie.lifetimePolicy", 2)
- ff_prof.set_preference("network.dns.disablePrefetch", True)
- ff_prof.set_preference("network.http.sendRefererHeader", 0)
- ff_prof.set_preference("permissions.default.image", 3)
- ff_prof.set_preference("browser.download.folderList", 2)
- ff_prof.set_preference("browser.download.manager.showWhenStarting", False)
- ff_prof.set_preference("browser.helperApps.neverAsk.saveToDisk", "text/plain")
- ff_prof.set_preference('network.proxy.type', 1)
- ff_prof.set_preference("network.proxy.socks_version", 5)
- ff_prof.set_preference('network.proxy.socks', '127.0.0.1')
- ff_prof.set_preference('network.proxy.socks_port', 9150)
- ff_prof.set_preference('network.proxy.socks_remote_dns', True)
- ff_prof.set_preference("javascript.enabled", False)
- ff_prof.update_preferences()
-
- service = Service(config.get('TOR', 'geckodriver_path'))
-
- driver = webdriver.Firefox(firefox_binary=ff_binary, firefox_profile=ff_prof, service=service)
-
- driver.maximize_window()
-
- return driver
-
-
- #the driver 'gets' the url, attempting to get on the site, if it can't access return 'down'
- #return: return the selenium driver or string 'down'
- def getAccess():
- url = getFixedURL()
- driver = createFFDriver()
- try:
- driver.get(url)
- return driver
- except:
- driver.close()
- return 'down'
-
-
- # Manual captcha solver, waits fora specific element so that the whole page loads, finds the input box, gets screenshot of captcha
- # then allows for manual solving of captcha in the terminal
- #If CAPTCHA is incorrect the first time, will automatically re-enter password and username after pressing 'Enter'
- #@param: current selenium web driver
- def login(driver):
-
- #login urls
- login_page1 = driver.current_url
- login_page2 = 'http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?login'
-
- # Will automatically re-enter the user/pw if first time CAPTCHA is entered incorrectly.
- while(driver.current_url == login_page1 or driver.current_url == login_page2):
- # entering username and password into input boxes
- usernameBox = driver.find_element(by=By.XPATH, value='/html/body/div/div/form/div/input[1]')
- # Username here
- usernameBox.send_keys('SamarIsland')
-
- passwordBox = driver.find_element(by=By.XPATH, value='/html/body/div/div/form/div/input[2]')
- # Password here
- passwordBox.send_keys('Underthe5e@')
-
- input("Press ENTER if: \n- username and password needs to be re-entered again\n- when CAPTCHA is completed and home page is visible \n")
-
-
- # wait for listing page show up (This Xpath may need to change based on different seed url)
- WebDriverWait(driver, 100).until(EC.visibility_of_element_located((By.XPATH, '/html/body')))
-
- # Saves the crawled html page, makes the directory path for html pages if not made
- def savePage(driver, page, url):
- cleanPage = cleanHTML(driver, page)
- filePath = getFullPathName(url)
- os.makedirs(os.path.dirname(filePath), exist_ok=True)
- open(filePath, 'wb').write(cleanPage.encode('utf-8'))
- return
-
-
- # Gets the full path of the page to be saved along with its appropriate file name
- #@param: raw url as crawler crawls through every site
- def getFullPathName(url):
- from MarketPlaces.Initialization.markets_mining import config, CURRENT_DATE
-
- mainDir = os.path.join(config.get('Project', 'shared_folder'), "MarketPlaces/" + getMKTName() + "/HTML_Pages")
- fileName = getNameFromURL(url)
- if isDescriptionLink(url):
- fullPath = os.path.join(mainDir, CURRENT_DATE + r'\\Description\\' + fileName + '.html')
- else:
- fullPath = os.path.join(mainDir, CURRENT_DATE + r'\\Listing\\' + fileName + '.html')
- return fullPath
-
-
- # Creates the file name from passed URL, gives distinct name if can't be made unique after cleaned
- #@param: raw url as crawler crawls through every site
- def getNameFromURL(url):
- global counter
- name = ''.join(e for e in url if e.isalnum())
- if (name == ''):
- name = str(counter)
- counter = counter + 1
- return name
-
-
- # returns list of urls, here is where you can list the different urls of interest, the crawler runs through this list
- #in this example, there are a couple of categories some threads fall under such as
- # Guides and Tutorials, Digital Products, and Software and Malware
- #as you can see they are categories of products
- def getInterestedLinks():
- links = []
-
- #Hacking and Spam Category
- #Databases, Access, & Data
- links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=12')
- #Exploit Kits
- links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=13')
- #Exploits, Kits, & Vulnerabilities
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=11')
- #Hacking Tools & Scripts
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=14')
- #Other Hacking & Spam
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=21')
- #Phishing Tools & Utilities
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=19')
- #RDPs/VNCs
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=18')
- #Social Media Boosting
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=20')
- #Spam Tools & Scripts
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=15')
- #Traffic
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=16')
-
- #Fraud
- #Accounts & Bank Drops
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=2')
- #CVV & Cards
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=3')
- #Carding/Fraud Software
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=8')
- #Other Fraud
- links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=9')
- #Personal Info(SSN/DOB/Fullz?Scans)
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=5')
- #Physical Fake IDs
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=7')
- #Dumps
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=4')
- #Skimmers
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=6')
-
- #Guides & Tutorials
- #Fraud Guides
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=137')
- #Hacking Guides
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=136')
- #Other Guides and tutorial
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=143')
- #Security and Anonymity Guides
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=140')
- #Social Engineering Guides
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=141')
-
- #Malware
- #Keyloggers
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=30')
- #Botnets
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=23')
- #RATs
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=24')
-
- #Software
- #Other Software
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=150')
- #Security Software
- #Security Software
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=145')
- #Cracked Products
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=149')
-
- #Services
- #Hacking
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=112')
- #Social Engineering
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=116')
- #Security
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=113')
- #Programming
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=115')
- #Carding
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=114')
-
- #Security and Hosting
- #VPN
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=129')
- #VPN Accounts
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=130')
- #Proxies
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=132')
- #Bulletproof Hosting
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=126')
- #Hosting
- #links.append('http://silkroadm5oqzuz3yq7pvwvinvyzeg2wnpnw3t4cyrsggrcgqfy2ptid.onion/?cat=125')
-
- return links
-
-
- # gets links of interest to crawl through, iterates through list, where each link is clicked and crawled through
- #topic and description pages are crawled through here, where both types of pages are saved
- #@param: selenium driver
- def crawlForum(driver):
- print("Crawling the SilkRoad4 market")
-
- linksToCrawl = getInterestedLinks()
-
- i = 0
- while i < len(linksToCrawl):
- link = linksToCrawl[i]
- print('Crawling :', link)
- try:
- has_next_page = True
- count = 0
-
- while has_next_page:
- try:
- driver.get(link)
- except:
- driver.refresh()
- html = driver.page_source
- savePage(driver, html, linksToCrawl[i] + f"page{count+1}")
-
- list = productPages(html)
- countItem = 0
- for item in list:
- countItem+=1
-
- itemURL = urlparse.urljoin(baseURL, str(item))
- try:
- driver.get(itemURL)
- except:
- driver.refresh()
- savePage(driver, driver.page_source, item)
- driver.back()
-
- if (countItem == 10):
- break
- #break
-
-
-
- # # comment out
- # break
- #
- #comment out
- if count == 2:
- break
-
- try:
- link = driver.find_element(by=By.XPATH, value='/html/body/div/div/table/tbody/tr/td[1]/center/form/input[3]').get_attribute('href')
- if link == "":
- raise NoSuchElementException
- count += 1
-
- except NoSuchElementException:
- has_next_page = False
-
- except Exception as e:
- print(link, e)
- i += 1
-
- print("Crawling the SilkRoad4 market done.")
-
-
- # Returns 'True' if the link is a description link
- #@param: url of any url crawled
- #return: true if is a description page, false if not
- def isDescriptionLink(url):
- if '?listing=' in url:
- return True
- return False
-
-
- # Returns True if the link is a listingPage link
- #@param: url of any url crawled
- #return: true if is a Listing page, false if not
- def isListingLink(url):
- if '?cat=' in url:
- return True
- return False
-
-
- # calling the parser to define the links, the html is the url of a link from the list of interested link list
- #@param: link from interested link list ie. getInterestingLinks()
- #return: list of description links that should be crawled through
- def productPages(html):
- soup = BeautifulSoup(html, "html.parser")
- return silkroad4_links_parser(soup)
-
-
- def crawler():
- startCrawling()
|