|
|
- __author__ = 'DarkWeb'
-
- '''
- Kerberos Market Crawler (Selenium)
- '''
-
- from selenium import webdriver
- from selenium.common.exceptions import NoSuchElementException
- from selenium.webdriver.firefox.firefox_profile import FirefoxProfile
- from selenium.webdriver.firefox.firefox_binary import FirefoxBinary
- from selenium.webdriver.firefox.service import Service
- from selenium.webdriver.common.by import By
- from selenium.webdriver.support import expected_conditions as EC
- from selenium.webdriver.support.ui import WebDriverWait
- from PIL import Image
-
- import urllib.parse as urlparse
- import os, time
- from datetime import date
- import subprocess
- from bs4 import BeautifulSoup
- from MarketPlaces.Initialization.prepare_parser import new_parse
- from MarketPlaces.Kerberos.parser import kerberos_links_parser
- from MarketPlaces.Utilities.utilities import cleanHTML
-
- counter = 1
- baseURL = 'http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion'
-
-
- # Opens Tor Browser, crawls the website
- def startCrawling():
- opentor()
- # marketName = getMarketName()
- driver = getAccess()
-
- if driver != 'down':
- captcha(driver)
- login(driver)
- crawlForum(driver)
-
- # new_parse(marketName, False)
- closetor(driver)
-
-
- # Opens Tor Browser
- def opentor():
- global pid
- print("Connecting Tor...")
- path = open('../../path.txt').readline().strip()
- pro = subprocess.Popen(path)
- pid = pro.pid
- time.sleep(7.5)
- input('Tor Connected. Press ENTER to continue\n')
- return
-
-
- def captcha(driver):
- # wait for captcha page
- WebDriverWait(driver, 100).until(EC.visibility_of_element_located(
- (By.XPATH, "/html/body/div/div/img")))
-
- # too hard to code, requires manual completion
-
- # wait for login page
- WebDriverWait(driver, 100).until(EC.visibility_of_element_located(
- (By.XPATH, "/html/body/div[1]/div[2]/div/form/div[10]/button")))
-
-
- # Login using premade account credentials and do login captcha manually
- def login(driver):
- #wait for login page
- WebDriverWait(driver, 100).until(EC.visibility_of_element_located(
- (By.XPATH, "/html/body/div[1]/div[2]/div/form/div[10]/button")))
-
- #entering username and password into input boxes
- usernameBox = driver.find_element(by=By.XPATH, value='/html/body/div[1]/div[2]/div/form/input[1]')
- #Username here
- usernameBox.send_keys('blabri')
- passwordBox = driver.find_element(by=By.XPATH, value='/html/body/div[1]/div[2]/div/form/input[2]')
- #Password here
- passwordBox.send_keys('fishowal')
-
- # wait for captcha page show up
- # WebDriverWait(driver, 100).until(EC.visibility_of_element_located(
- # (By.XPATH, "/html/body/div/img[24]")))
- time.sleep(10)
-
- # save captcha to local
- driver.find_element(by=By.XPATH, value='/html/body/div[1]/div[2]/div/form/div[6]').screenshot(
- r'..\Kerberos\captcha.png')
-
- # This method will show image in any image viewer
- im = Image.open(r'..\Kerberos\captcha.png')
-
- im.show()
-
- # wait until input space show up
- inputBox = driver.find_element(by=By.XPATH, value='/html/body/div[1]/div[2]/div/form/input[3]')
-
- # ask user input captcha solution in terminal
- userIn = input("Enter solution: ")
-
- # send user solution into the input space
- inputBox.send_keys(userIn)
-
- # click the verify(submit) button
- driver.execute_script("window.scrollTo(0, document.body.scrollHeight);")
- driver.find_element(by=By.XPATH, value="/html/body/div[1]/div[2]/div/form/div[10]/button").click()
-
- # wait for listing page show up (This Xpath may need to change based on different seed url)
- WebDriverWait(driver, 100).until(EC.visibility_of_element_located(
- (By.XPATH, '//*[@id="breadcrumb"]')))
-
-
- # Returns the name of the website
- def getMarketName():
- name = 'Kerberos'
- return name
-
-
- # Return the link of the website
- def getFixedURL():
- url = 'http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion'
-
- return url
-
-
- # Closes Tor Browser
- def closetor(driver):
- # global pid
- # os.system("taskkill /pid " + str(pro.pid))
- # os.system("taskkill /t /f /im tor.exe")
- print('Closing Tor...')
- driver.quit()
- time.sleep(3)
- return
-
-
- # Creates FireFox 'driver' and configure its 'Profile'
- # to use Tor proxy and socket
- def createFFDriver():
- file = open('../../path.txt', 'r')
- lines = file.readlines()
-
- ff_binary = FirefoxBinary(lines[0].strip())
-
- ff_prof = FirefoxProfile(lines[1].strip())
- ff_prof.set_preference("places.history.enabled", False)
- ff_prof.set_preference("privacy.clearOnShutdown.offlineApps", True)
- ff_prof.set_preference("privacy.clearOnShutdown.passwords", True)
- ff_prof.set_preference("privacy.clearOnShutdown.siteSettings", True)
- ff_prof.set_preference("privacy.sanitize.sanitizeOnShutdown", True)
- ff_prof.set_preference("signon.rememberSignons", False)
- ff_prof.set_preference("network.cookie.lifetimePolicy", 2)
- ff_prof.set_preference("network.dns.disablePrefetch", True)
- # ff_prof.set_preference("network.http.sendRefererHeader", 0)
- ff_prof.set_preference("permissions.default.image", 3)
- ff_prof.set_preference("browser.download.folderList", 2)
- ff_prof.set_preference("browser.download.manager.showWhenStarting", False)
- ff_prof.set_preference("browser.helperApps.neverAsk.saveToDisk", "text/plain")
- ff_prof.set_preference('network.proxy.type', 1)
- ff_prof.set_preference("network.proxy.socks_version", 5)
- ff_prof.set_preference('network.proxy.socks', '127.0.0.1')
- ff_prof.set_preference('network.proxy.socks_port', 9150)
- ff_prof.set_preference('network.proxy.socks_remote_dns', True)
- ff_prof.set_preference("javascript.enabled", False)
- ff_prof.update_preferences()
-
- service = Service(executable_path=lines[2].strip())
-
- driver = webdriver.Firefox(firefox_binary=ff_binary, firefox_profile=ff_prof, service=service)
-
- return driver
-
-
- def getAccess():
- url = getFixedURL()
- driver = createFFDriver()
-
- try:
-
- driver.get(url)
- return driver
-
- except:
-
- return 'down'
-
-
- # Saves the crawled html page
- def savePage(page, url):
- cleanPage = cleanHTML(page)
- filePath = getFullPathName(url)
- os.makedirs(os.path.dirname(filePath), exist_ok=True)
- open(filePath, 'wb').write(cleanPage.encode('utf-8'))
- return
-
-
- # Gets the full path of the page to be saved along with its appropriate file name
- def getFullPathName(url):
- fileName = getNameFromURL(url)
- if isDescriptionLink(url):
- fullPath = r'..\Kerberos\HTML_Pages\\' + str(
- "%02d" % date.today().month) + str("%02d" % date.today().day) + str(
- "%04d" % date.today().year) + r'\\' + r'Description\\' + fileName + '.html'
- else:
- fullPath = r'..\Kerberos\HTML_Pages\\' + str(
- "%02d" % date.today().month) + str("%02d" % date.today().day) + str(
- "%04d" % date.today().year) + r'\\' + r'Listing\\' + fileName + '.html'
- return fullPath
-
-
- # Creates the file name from passed URL
- def getNameFromURL(url):
- global counter
- name = ''.join(e for e in url if e.isalnum())
- if name == '':
- name = str(counter)
- counter = counter + 1
- return name
-
-
- def getInterestedLinks():
- links = []
-
- # Services - Hacking
- links.append('http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion/categories/99/block/price-none/ww/ww/1/')
- # Tutorials - Hacking
- links.append('http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion/categories/122/block/price-none/ww/ww/1/')
- # Tutorials - Guides
- links.append('http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion/categories/124/block/price-none/ww/ww/1/')
- # Tutorials - Other
- links.append('http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion/categories/126/block/price-none/ww/ww/1/')
- # Software and Malware - Botnets
- links.append('http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion/categories/129/block/price-none/ww/ww/1/')
- # Software and Malware - Malware
- links.append('http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion/categories/130/block/price-none/ww/ww/1/')
- # Software and Malware - Trojans
- links.append('http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion/categories/131/block/price-none/ww/ww/1/')
- # Software and Malware - Exploits / Kits
- links.append('http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion/categories/133/block/price-none/ww/ww/1/')
- # Software and Malware - Other
- links.append('http://kerberosazmnfrjinmftp3im3cr7hw4nxbavm4ngofn64g24be7h3kqd.onion/categories/136/block/price-none/ww/ww/1/')
-
- return links
-
-
- def crawlForum(driver):
- print("Crawling the Kerberos market")
-
- linksToCrawl = getInterestedLinks()
- visited = set(linksToCrawl)
- initialTime = time.time()
-
- i = 0
- count = 0
- while i < len(linksToCrawl):
- link = linksToCrawl[i]
- print('Crawling :', link)
-
- try:
- try:
- driver.get(link)
- except:
- driver.refresh()
- html = driver.page_source
- savePage(html, link)
-
- has_next_page = True
- while has_next_page:
- list = productPages(html)
- for item in list:
- itemURL = urlparse.urljoin(baseURL, str(item))
- try:
- driver.get(itemURL)
- except:
- driver.refresh()
- savePage(driver.page_source, item)
- driver.back()
- # break
-
- if count == 1:
- count = 0
- break
-
- try:
- nav = driver.find_element(by=By.XPATH, value=
- '/html/body/div[3]/div[4]/div[4]/div/div[1]/div[28]')
- a = nav.find_element(by=By.LINK_TEXT, value="Next")
- link = a.get_attribute('href')
-
- if link == "":
- raise NoSuchElementException
- try:
- driver.get(link)
- except:
- driver.refresh()
- html = driver.page_source
- savePage(html, link)
- count += 1
-
- except NoSuchElementException:
- has_next_page = False
-
- except Exception as e:
- print(link, e)
- i += 1
-
- # finalTime = time.time()
- # print finalTime - initialTime
-
- input("Crawling Kerberos market done sucessfully. Press ENTER to continue\n")
-
-
- # Returns 'True' if the link is Topic link
- def isDescriptionLink(url):
- if 'item' in url:
- return True
- return False
-
-
- # Returns True if the link is a listingPage link
- def isListingLink(url):
- if 'categories' in url:
- return True
- return False
-
-
- # calling the parser to define the links
- def productPages(html):
- soup = BeautifulSoup(html, "html.parser")
- return kerberos_links_parser(soup)
-
-
- def crawler():
- startCrawling()
- # print("Crawling and Parsing BestCardingWorld .... DONE!")
|