@ -0,0 +1,301 @@ | |||||
__author__ = 'Helium' | |||||
''' | |||||
HiddenAnswers Crawler (Selenium) | |||||
''' | |||||
from selenium import webdriver | |||||
from selenium.common.exceptions import NoSuchElementException | |||||
from selenium.webdriver.firefox.firefox_profile import FirefoxProfile | |||||
from selenium.webdriver.firefox.firefox_binary import FirefoxBinary | |||||
from selenium.webdriver.firefox.service import Service | |||||
from selenium.webdriver.common.by import By | |||||
from selenium.webdriver.support import expected_conditions as EC | |||||
from selenium.webdriver.support.ui import WebDriverWait | |||||
from PIL import Image | |||||
import urllib.parse as urlparse | |||||
import os, re, time | |||||
from datetime import date | |||||
import configparser | |||||
import subprocess | |||||
from bs4 import BeautifulSoup | |||||
from Forums.Initialization.prepare_parser import new_parse | |||||
from Forums.HiddenAnswers.parser import hiddenanswers_links_parser | |||||
from Forums.Utilities.utilities import cleanHTML | |||||
config = configparser.ConfigParser() | |||||
config.read('../../setup.ini') | |||||
counter = 1 | |||||
baseURL = 'http://7eoz4h2nvw4zlr7gvlbutinqqpm546f5egswax54az6lt2u7e3t6d7yd.onion/' | |||||
# Opens Tor Browser, crawls the website | |||||
def startCrawling(): | |||||
opentor() | |||||
# forumName = getForumName() | |||||
driver = getAccess() | |||||
if driver != 'down': | |||||
try: | |||||
login(driver) | |||||
crawlForum(driver) | |||||
except Exception as e: | |||||
print(driver.current_url, e) | |||||
closetor(driver) | |||||
# new_parse(forumName, baseURL, False) | |||||
# Opens Tor Browser | |||||
def opentor(): | |||||
global pid | |||||
print("Connecting Tor...") | |||||
pro = subprocess.Popen(config.get('TOR', 'firefox_binary_path')) | |||||
pid = pro.pid | |||||
time.sleep(7.5) | |||||
input('Tor Connected. Press ENTER to continue\n') | |||||
return | |||||
# Login using premade account credentials and do login captcha manually | |||||
def login(driver): | |||||
# wait for listing page show up (This Xpath may need to change based on different seed url) | |||||
WebDriverWait(driver, 50).until(EC.visibility_of_element_located( | |||||
(By.XPATH, '/html/body/div[2]/div[2]/div/div[2]/div[4]/div/ul/li[14]/a'))) | |||||
# Returns the name of the website | |||||
def getForumName(): | |||||
name = 'HiddenAnswers' | |||||
return name | |||||
# Return the link of the website | |||||
def getFixedURL(): | |||||
url = 'http://7eoz4h2nvw4zlr7gvlbutinqqpm546f5egswax54az6lt2u7e3t6d7yd.onion/' | |||||
return url | |||||
# Closes Tor Browser | |||||
def closetor(driver): | |||||
# global pid | |||||
# os.system("taskkill /pid " + str(pro.pid)) | |||||
# os.system("taskkill /t /f /im tor.exe") | |||||
print('Closing Tor...') | |||||
driver.close() | |||||
time.sleep(3) | |||||
return | |||||
# Creates FireFox 'driver' and configure its 'Profile' | |||||
# to use Tor proxy and socket | |||||
def createFFDriver(): | |||||
ff_binary = FirefoxBinary(config.get('TOR', 'firefox_binary_path')) | |||||
ff_prof = FirefoxProfile(config.get('TOR', 'firefox_profile_path')) | |||||
ff_prof.set_preference("places.history.enabled", False) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.offlineApps", True) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.passwords", True) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.siteSettings", True) | |||||
ff_prof.set_preference("privacy.sanitize.sanitizeOnShutdown", True) | |||||
ff_prof.set_preference("signon.rememberSignons", False) | |||||
ff_prof.set_preference("network.cookie.lifetimePolicy", 2) | |||||
ff_prof.set_preference("network.dns.disablePrefetch", True) | |||||
ff_prof.set_preference("network.http.sendRefererHeader", 0) | |||||
ff_prof.set_preference("permissions.default.image", 3) | |||||
ff_prof.set_preference("browser.download.folderList", 2) | |||||
ff_prof.set_preference("browser.download.manager.showWhenStarting", False) | |||||
ff_prof.set_preference("browser.helperApps.neverAsk.saveToDisk", "text/plain") | |||||
ff_prof.set_preference('network.proxy.type', 1) | |||||
ff_prof.set_preference("network.proxy.socks_version", 5) | |||||
ff_prof.set_preference('network.proxy.socks', '127.0.0.1') | |||||
ff_prof.set_preference('network.proxy.socks_port', 9150) | |||||
ff_prof.set_preference('network.proxy.socks_remote_dns', True) | |||||
ff_prof.set_preference("javascript.enabled", True) | |||||
ff_prof.update_preferences() | |||||
service = Service(config.get('TOR', 'geckodriver_path')) | |||||
driver = webdriver.Firefox(firefox_binary=ff_binary, firefox_profile=ff_prof, service=service) | |||||
return driver | |||||
def getAccess(): | |||||
url = getFixedURL() | |||||
driver = createFFDriver() | |||||
try: | |||||
driver.get(url) | |||||
return driver | |||||
except: | |||||
driver.close() | |||||
return 'down' | |||||
# Saves the crawled html page | |||||
def savePage(page, url): | |||||
cleanPage = cleanHTML(page) | |||||
filePath = getFullPathName(url) | |||||
os.makedirs(os.path.dirname(filePath), exist_ok=True) | |||||
open(filePath, 'wb').write(cleanPage.encode('utf-8')) | |||||
return | |||||
# Gets the full path of the page to be saved along with its appropriate file name | |||||
def getFullPathName(url): | |||||
fileName = getNameFromURL(url) | |||||
if isDescriptionLink(url): | |||||
#..\CryptBB\HTML_Pages\\ | |||||
fullPath = r'..\HiddenAnswers\HTML_Pages\\' + str( | |||||
"%02d" % date.today().month) + str("%02d" % date.today().day) + str( | |||||
"%04d" % date.today().year) + r'\\' + r'Description\\' + fileName + '.html' | |||||
else: | |||||
fullPath = r'..\HiddenAnswers\HTML_Pages\\' + str( | |||||
"%02d" % date.today().month) + str("%02d" % date.today().day) + str( | |||||
"%04d" % date.today().year) + r'\\' + r'Listing\\' + fileName + '.html' | |||||
return fullPath | |||||
# Creates the file name from passed URL | |||||
def getNameFromURL(url): | |||||
global counter | |||||
name = ''.join(e for e in url if e.isalnum()) | |||||
if (name == ''): | |||||
name = str(counter) | |||||
counter = counter + 1 | |||||
return name | |||||
def getInterestedLinks(): | |||||
links = [] | |||||
# Hacks | |||||
links.append('http://7eoz4h2nvw4zlr7gvlbutinqqpm546f5egswax54az6lt2u7e3t6d7yd.onion/index.php/questions/hacking') | |||||
return links | |||||
def crawlForum(driver): | |||||
print("Crawling the HiddenAnswers forum") | |||||
linksToCrawl = getInterestedLinks() | |||||
visited = set(linksToCrawl) | |||||
initialTime = time.time() | |||||
i = 0 | |||||
count = 0 | |||||
while i < len(linksToCrawl): | |||||
link = linksToCrawl[i] | |||||
print('Crawling :', link) | |||||
try: | |||||
try: | |||||
driver.get(link) | |||||
except: | |||||
driver.refresh() | |||||
html = driver.page_source | |||||
savePage(html, link) | |||||
has_next_page = True | |||||
while has_next_page: | |||||
list = topicPages(html) | |||||
for item in list: | |||||
itemURL = urlparse.urljoin(baseURL, str(item)) | |||||
try: | |||||
driver.get(itemURL) | |||||
except: | |||||
driver.refresh() | |||||
savePage(driver.page_source, item) | |||||
driver.back() | |||||
''' | |||||
#variable to check if there is a next page for the topic | |||||
has_next_topic_page = True | |||||
counter = 1 | |||||
# check if there is a next page for the topics | |||||
while has_next_topic_page: | |||||
# try to access next page of th topic | |||||
itemURL = urlparse.urljoin(baseURL, str(item)) | |||||
try: | |||||
driver.get(itemURL) | |||||
except: | |||||
driver.refresh() | |||||
savePage(driver.page_source, item) | |||||
# if there is a next page then go and save.... | |||||
# next page in the topic? | |||||
try: | |||||
temp = driver.find_element(By.XPATH, '/html/body/div/div[2]/div/div[2]/div') # /html/body/div/div[2]/div/div[2]/div/ | |||||
item = temp.find_element(by=By.CLASS_NAME, value='pagination_next').get_attribute('href') #/html/body/div/div[2]/div/div[2]/div | |||||
if item == "": | |||||
raise NoSuchElementException | |||||
has_next_topic_page = False | |||||
else: | |||||
counter += 1 | |||||
except NoSuchElementException: | |||||
has_next_topic_page = False | |||||
# end of loop | |||||
for i in range(counter): | |||||
driver.back() | |||||
''' | |||||
# comment out | |||||
break | |||||
# comment out | |||||
if count == 1: | |||||
count = 0 | |||||
break | |||||
try: | |||||
link = driver.find_element(by=By.XPATH, value = '/html/body/div[2]/div[2]/div/div[3]/div[3]/ul/li[7]/a').get_attribute('href') | |||||
if link == "": | |||||
raise NoSuchElementException | |||||
try: | |||||
driver.get(link) | |||||
except: | |||||
driver.refresh() | |||||
html = driver.page_source | |||||
savePage(html, link) | |||||
count += 1 | |||||
except NoSuchElementException: | |||||
has_next_page = False | |||||
except Exception as e: | |||||
print(link, e) | |||||
i += 1 | |||||
# finalTime = time.time() | |||||
# print finalTime - initialTime | |||||
input("Crawling HiddenAnswers forum done sucessfully. Press ENTER to continue\n") | |||||
# Returns 'True' if the link is Topic link | |||||
def isDescriptionLink(url): | |||||
if 'index.php' in url and 'questions' not in url: | |||||
return True | |||||
return False | |||||
# Returns True if the link is a listingPage link | |||||
def isListingLink(url): | |||||
if 'questions' in url: | |||||
return True | |||||
return False | |||||
# calling the parser to define the links | |||||
def topicPages(html): | |||||
soup = BeautifulSoup(html, "html.parser") | |||||
#print(soup.find('div', id="container").find('div', id="content").find('table', {"class": "tborder clear"}).find('tbody').find('tr',{"class": "inline_row"}).find('strong').text) | |||||
return hiddenanswers_links_parser(soup) | |||||
def crawler(): | |||||
startCrawling() | |||||
# print("Crawling and Parsing Abyss .... DONE!") |
@ -0,0 +1,462 @@ | |||||
1655762162153 geckodriver INFO Listening on 127.0.0.1:50333 | |||||
1655762166434 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50334" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofileqUeAAN" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655762166904 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50334/devtools/browser/fb880205-35da-44a4-83b8-a861ce7125f1 | |||||
1655762168590 Marionette INFO Listening on port 50341 | |||||
1655762169104 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655762207624 Marionette INFO Stopped listening on port 50341 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
###!!! [Parent][RunMessage] Error: Channel closing: too late to send/recv, messages will be lost | |||||
1655762207923 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655762990320 geckodriver INFO Listening on 127.0.0.1:50884 | |||||
1655762994595 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50885" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofileurjxEe" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655762995244 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50885/devtools/browser/36503f58-7ab7-4188-81b0-fa1b81f32c0a | |||||
1655762996997 Marionette INFO Listening on port 50890 | |||||
JavaScript error: resource://gre/modules/ExtensionContent.jsm, line 575: TypeError: PrecompiledScript.executeInGlobal: Argument 1 is not an object. | |||||
1655762997277 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655763083091 Marionette INFO Stopped listening on port 50890 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655763083216 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655763089557 geckodriver INFO Listening on 127.0.0.1:50923 | |||||
1655763093759 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50924" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofile5mY1qq" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655763094208 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50924/devtools/browser/68ce2df9-521f-4258-94f7-c2e2b199701a | |||||
1655763095918 Marionette INFO Listening on port 50929 | |||||
1655763096408 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655763143935 Marionette INFO Stopped listening on port 50929 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655763144495 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655763166975 geckodriver INFO Listening on 127.0.0.1:50947 | |||||
1655763171175 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50948" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofilenAGZM5" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655763171719 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50948/devtools/browser/0b9966bd-0cec-45cc-9d11-02a2580233f0 | |||||
1655763173307 Marionette INFO Listening on port 50953 | |||||
1655763173368 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655763208922 Marionette INFO Stopped listening on port 50953 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
JavaScript error: chrome://remote/content/marionette/cert.js, line 55: NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICertOverrideService.setDisableAllSecurityChecksAndLetAttackersInterceptMyData] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655763209261 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655763387409 geckodriver INFO Listening on 127.0.0.1:49752 | |||||
1655763391806 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "49753" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofilevAHJSJ" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655763392827 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:49753/devtools/browser/7fe49a16-940f-4ee8-9a2f-48739a92db78 | |||||
1655763394700 Marionette INFO Listening on port 49759 | |||||
1655763395103 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655763430848 Marionette INFO Stopped listening on port 49759 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
JavaScript error: chrome://remote/content/marionette/cert.js, line 55: NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICertOverrideService.setDisableAllSecurityChecksAndLetAttackersInterceptMyData] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655763431145 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655765589286 geckodriver INFO Listening on 127.0.0.1:50102 | |||||
1655765621677 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50103" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofile8ecUpb" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655765622149 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:50103/devtools/browser/e5a916fc-987c-43d4-9c12-9c9b88cca242 | |||||
1655765623776 Marionette INFO Listening on port 50109 | |||||
1655765623892 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655766125168 Marionette INFO Stopped listening on port 50109 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655766125303 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655766505099 geckodriver INFO Listening on 127.0.0.1:50156 | |||||
1655766509351 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50157" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofileVqvmzh" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655766509876 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50157/devtools/browser/13084c14-64d3-48a5-8b99-4c514e961d4f | |||||
1655766511328 Marionette INFO Listening on port 50162 | |||||
1655766511395 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655766552298 Marionette INFO Stopped listening on port 50162 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
JavaScript error: chrome://remote/content/marionette/cert.js, line 55: NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICertOverrideService.setDisableAllSecurityChecksAndLetAttackersInterceptMyData] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655766552578 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655767657126 geckodriver INFO Listening on 127.0.0.1:50257 | |||||
1655767661375 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50258" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofileB9Dzeh" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655767661843 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50258/devtools/browser/867cd318-6430-4b3f-9b63-8c6bdf17636a | |||||
1655767663330 Marionette INFO Listening on port 50263 | |||||
1655767663431 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655767668263 Marionette INFO Stopped listening on port 50263 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
###!!! [Parent][RunMessage] Error: Channel closing: too late to send/recv, messages will be lost | |||||
1655767668591 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655767689480 geckodriver INFO Listening on 127.0.0.1:50276 | |||||
1655767693635 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50277" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofile8ZOQe7" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655767694215 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50277/devtools/browser/a70a3f5b-19af-4a68-99c8-c46086ba9599 | |||||
1655767695725 Marionette INFO Listening on port 50282 | |||||
1655767695830 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655767701272 Marionette INFO Stopped listening on port 50282 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655767701594 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655767791360 geckodriver INFO Listening on 127.0.0.1:50296 | |||||
1655767795575 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50297" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofile4GEqBr" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655767796001 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50297/devtools/browser/e2d4e57a-16ce-429d-9804-e9e391199ddf | |||||
1655767797534 Marionette INFO Listening on port 50302 | |||||
1655767797661 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655767802833 Marionette INFO Stopped listening on port 50302 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655767803151 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655767902908 geckodriver INFO Listening on 127.0.0.1:50320 | |||||
1655767907009 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50321" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofileqlJ8ZA" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655767907484 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:50321/devtools/browser/49e77669-01dd-447e-a804-36d42b3400cf | |||||
1655767908782 Marionette INFO Listening on port 50326 | |||||
1655767909069 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655767916218 Marionette INFO Stopped listening on port 50326 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655767916523 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655767958348 geckodriver INFO Listening on 127.0.0.1:50340 | |||||
1655767962557 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50341" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofilekpCdfs" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655767963032 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50341/devtools/browser/b4d1728c-d26f-4537-adc2-5c954b171b13 | |||||
1655767964591 Marionette INFO Listening on port 50346 | |||||
1655767964633 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655767973210 Marionette INFO Stopped listening on port 50346 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655767973501 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655767998084 geckodriver INFO Listening on 127.0.0.1:50358 | |||||
1655768002314 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50359" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofileujYNBj" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655768002757 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50359/devtools/browser/04112c45-204d-43f1-9615-34782fd06632 | |||||
1655768004165 Marionette INFO Listening on port 50364 | |||||
1655768004375 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655768009787 Marionette INFO Stopped listening on port 50364 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
###!!! [Child][RunMessage] Error: Channel closing: too late to send/recv, messages will be lost | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
###!!! [Parent][RunMessage] Error: Channel closing: too late to send/recv, messages will be lost | |||||
1655768010100 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655768083966 geckodriver INFO Listening on 127.0.0.1:50386 | |||||
1655768088234 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50387" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofile39Pl1f" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655768088664 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50387/devtools/browser/3d6cda42-cb60-4c67-8d76-1d186a51887f | |||||
1655768090263 Marionette INFO Listening on port 50392 | |||||
1655768090299 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655768091655 Marionette INFO Stopped listening on port 50392 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
###!!! [Parent][MessageChannel] Error: (msgtype=0x390076,name=PContent::Msg_DestroyBrowsingContextGroup) Closed channel: cannot send/recv | |||||
###!!! [Parent][MessageChannel] Error: (msgtype=0x390076,name=PContent::Msg_DestroyBrowsingContextGroup) Closed channel: cannot send/recv | |||||
###!!! [Parent][MessageChannel] Error: (msgtype=0x390076,name=PContent::Msg_DestroyBrowsingContextGroup) Closed channel: cannot send/recv | |||||
1655768092659 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655768101201 geckodriver INFO Listening on 127.0.0.1:50404 | |||||
1655768105373 mozrunner::runner INFO Running command: "C:\\Users\\CALSysLab\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50405" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\CALSYS~1\\AppData\\Local\\Temp\\rust_mozprofile2YRGSz" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: Init" | |||||
console.log: "TorConnect: observed profile-after-change" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapStatus'" | |||||
console.log: "TorConnect: observing topic 'TorBootstrapError'" | |||||
console.log: "TorConnect: observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: observed profile-after-change" | |||||
1655768105853 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: will load after bootstrap => [about:blank]" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
DevTools listening on ws://localhost:50405/devtools/browser/9c4a4d71-25ff-4980-a54d-8545d6200790 | |||||
1655768107431 Marionette INFO Listening on port 50410 | |||||
1655768107530 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1655768119155 Marionette INFO Stopped listening on port 50410 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
1655768119438 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1655768229472 geckodriver INFO Listening on 127.0.0.1:50431 | |||||
1655768233458 webdriver::server WARN Rejected request with missing Host header |
@ -0,0 +1,352 @@ | |||||
__author__ = 'Helium' | |||||
# Here, we are importing the auxiliary functions to clean or convert data | |||||
from Forums.Utilities.utilities import * | |||||
from datetime import date | |||||
from datetime import timedelta | |||||
import re | |||||
# Here, we are importing BeautifulSoup to search through the HTML tree | |||||
from bs4 import BeautifulSoup | |||||
# This is the method to parse the Description Pages (one page to each topic in the Listing Pages) | |||||
def cryptBB_description_parser(soup): | |||||
# Fields to be parsed | |||||
topic = "-1" # topic name | |||||
user = [] # all users of each post | |||||
addDate = [] # all dated of each post | |||||
feedback = [] # all feedbacks of each vendor (this was found in just one Forum and with a number format) | |||||
status = [] # all user's authority in each post such as (adm, member, dangerous) | |||||
reputation = [] # all users's karma in each post (usually found as a number) | |||||
sign = [] # all user's signature in each post (usually a standard message after the content of the post) | |||||
post = [] # all messages of each post | |||||
interest = [] # all user's interest in each post | |||||
# Finding the topic (should be just one coming from the Listing Page) | |||||
li = soup.find("td", {"class": "thead"}).find('strong') | |||||
topic = li.text | |||||
topic = re.sub("\[\w*\]", '', topic) | |||||
topic = topic.replace(",","") | |||||
topic = topic.replace("\n","") | |||||
topic = cleanString(topic.strip()) | |||||
print(topic) | |||||
# Finding the repeated tag that corresponds to the listing of posts | |||||
# posts = soup.find("form", {"name": "quickModForm"}).findAll('div', {"class": "windowbg"}) + \ | |||||
# soup.find("form", {"name": "quickModForm"}).findAll('div', {"class": "windowbg2"}) | |||||
try: | |||||
posts = soup.find('table', {"class": "tborder tfixed clear"}).find('td', {"id": "posts_container"}).find_all( | |||||
'div', {"class": "post"}) | |||||
# print(len(posts)) | |||||
# For each message (post), get all the fields we are interested to: | |||||
for ipost in posts: | |||||
# Finding a first level of the HTML page | |||||
# post_wrapper = ipost.find('div', {"class": "post_wrapper"}).find('div', {"class": "poster"}) | |||||
post_wrapper = ipost.find('span', {"class": "largetext"}) | |||||
# Finding the author (user) of the post | |||||
# author = post_wrapper.find('h4') | |||||
author = post_wrapper.text.strip() | |||||
# print("author " + author) | |||||
user.append(cleanString(author)) # Remember to clean the problematic characters | |||||
# Finding the status of the author | |||||
smalltext = ipost.find('div', {"class": "post_author"}) | |||||
# Testing here two possibilities to find this status and combine them | |||||
if ipost.find('div', {"class": "deleted_post_author"}): | |||||
status.append(-1) | |||||
interest.append(-1) | |||||
reputation.append(-1) | |||||
addDate.append(-1) | |||||
post.append("THIS POST HAS BEEN REMOVED!") | |||||
sign.append(-1) | |||||
feedback.append(-1) | |||||
continue | |||||
# CryptBB does have membergroup and postgroup | |||||
membergroup = smalltext.find('div', {"class": "profile-rank"}) | |||||
postgroup = smalltext.find('div', {"class": "postgroup"}) | |||||
if membergroup != None: | |||||
membergroup = membergroup.text.strip() | |||||
if postgroup != None: | |||||
postgroup = postgroup.text.strip() | |||||
membergroup = membergroup + " - " + postgroup | |||||
else: | |||||
if postgroup != None: | |||||
membergroup = postgroup.text.strip() | |||||
else: | |||||
membergroup = "-1" | |||||
status.append(cleanString(membergroup)) | |||||
# print("status " + cleanString(membergroup)) | |||||
# Finding the interest of the author | |||||
# CryptBB does not have blurb | |||||
blurb = smalltext.find('li', {"class": "blurb"}) | |||||
if blurb != None: | |||||
blurb = blurb.text.strip() | |||||
else: | |||||
blurb = "-1" | |||||
interest.append(cleanString(blurb)) | |||||
# Finding the reputation of the user | |||||
# CryptBB does have reputation | |||||
author_stats = smalltext.find('div', {"class": "author_statistics"}) | |||||
karma = author_stats.find('strong') | |||||
if karma != None: | |||||
karma = karma.text | |||||
karma = karma.replace("Community Rating: ", "") | |||||
karma = karma.replace("Karma: ", "") | |||||
karma = karma.strip() | |||||
else: | |||||
karma = "-1" | |||||
reputation.append(cleanString(karma)) | |||||
# print("karma " + cleanString(karma)) | |||||
# Getting here another good tag to find the post date, post content and users' signature | |||||
postarea = ipost.find('div', {"class": "post_content"}) | |||||
dt = postarea.find('span', {"class": "post_date"}).text | |||||
# dt = dt.strip().split() | |||||
dt = dt.strip() | |||||
day=date.today() | |||||
if "Yesterday" in dt: | |||||
yesterday = day - timedelta(days=1) | |||||
yesterday = yesterday.strftime('%m-%d-%Y') | |||||
stime = dt.replace('Yesterday,','').strip() | |||||
date_time_obj = yesterday+ ', '+stime | |||||
date_time_obj = datetime.strptime(date_time_obj,'%m-%d-%Y, %I:%M %p') | |||||
elif "hours ago" in dt: | |||||
day = day.strftime('%m-%d-%Y') | |||||
date_time_obj = postarea.find('span', {"class": "post_date"}).find('span')['title'] | |||||
date_time_obj = datetime.strptime(date_time_obj, '%m-%d-%Y, %I:%M %p') | |||||
else: | |||||
date_time_obj = datetime.strptime(dt, '%m-%d-%Y, %I:%M %p') | |||||
stime = date_time_obj.strftime('%b %d, %Y') | |||||
sdate = date_time_obj.strftime('%I:%M %p') | |||||
addDate.append(date_time_obj) | |||||
# print("date " + str(date_time_obj)) | |||||
# Finding the date of the post | |||||
# date_time_obj = datetime.strptime(dt, '%a %b %d, %Y %I:%M %p') | |||||
# smalltext = postarea.find('div', {"class": "flow_hidden"}).find('div', {"class": "keyinfo"})\ | |||||
# .find('div', {"class": "smalltext"}) | |||||
# sdatetime = smalltext.text | |||||
# sdatetime = sdatetime.replace(u"\xab","") # Removing unnecessary characters | |||||
# sdatetime = sdatetime.replace(u"\xbb","") # Removing unnecessary characters | |||||
# sdatetime = sdatetime.split("on: ") # Removing unnecessary characters | |||||
# sdatetime = sdatetime[1].strip() | |||||
# stime = sdatetime[:-12:-1] # Finding the time of the post | |||||
# stime = stime[::-1] | |||||
# sdate = sdatetime.replace(stime,"") # Finding the date of the post | |||||
# sdate = sdate.replace(",","") | |||||
# sdate = sdate.strip() | |||||
# Covert the date of the post that can be informed as: "12 February 2016", "today", "yesterday". We need | |||||
# a date format here as "mm/dd/yyyy" | |||||
# addDate.append(convertDate(sdate,"english", crawlerDate) + " " + stime) | |||||
# Finding the post | |||||
inner = postarea.find('div', {"class": "post_body scaleimages"}) | |||||
inner = inner.text.strip() | |||||
# print(inner) | |||||
post.append(cleanString(inner)) | |||||
# Finding the users's signature | |||||
# signature = ipost.find('div', {"class": "post_wrapper"}).find('div', {"class": "moderatorbar"}).find('div', {"class": "signature"}) | |||||
signature = ipost.find('div', {"class": "signature scaleimages"}) | |||||
if signature != None: | |||||
signature = signature.text.strip() | |||||
# print(signature) | |||||
else: | |||||
signature = "-1" | |||||
sign.append(cleanString(signature)) | |||||
# As no information about users's feedback was found, just assign "-1" to the variable | |||||
feedback.append("-1") | |||||
except: | |||||
if soup.find('td', {"class": "trow1"}).text == " You do not have permission to access this page. ": | |||||
user.append("-1") | |||||
status.append(-1) | |||||
interest.append(-1) | |||||
reputation.append(-1) | |||||
addDate.append(-1) | |||||
post.append("NO ACCESS TO THIS PAGE!") | |||||
sign.append(-1) | |||||
feedback.append(-1) | |||||
# Populate the final variable (this should be a list with all fields scraped) | |||||
row = (topic, post, user, addDate, feedback, status, reputation, sign, interest) | |||||
# Sending the results | |||||
return row | |||||
# This is the method to parse the Listing Pages (one page with many posts) | |||||
def onniForums_listing_parser(soup): | |||||
board = "-1" # board name (the previous level of the topic in the Forum categorization tree. | |||||
# For instance: Security/Malware/Tools to hack Facebook. The board here should be Malware) | |||||
nm = 0 # this variable should receive the number of topics | |||||
topic = [] # all topics | |||||
user = [] # all users of each topic | |||||
post = [] # number of posts of each topic | |||||
view = [] # number of views of each topic | |||||
addDate = [] # when the topic was created (difficult to find) | |||||
href = [] # this variable should receive all cleaned urls (we will use this to do the marge between | |||||
# Listing and Description pages) | |||||
# Finding the board (should be just one) | |||||
board = soup.find('span', {"class": "active"}).text | |||||
board = cleanString(board.strip()) | |||||
# Finding the repeated tag that corresponds to the listing of topics | |||||
itopics = soup.find_all('tr',{"class": "inline_row"}) | |||||
index = 0 | |||||
for itopic in itopics: | |||||
# For each topic found, the structure to get the rest of the information can be of two types. Testing all of them | |||||
# to don't miss any topic | |||||
# Adding the topic to the topic list | |||||
try: | |||||
topics = itopic.find('span', {"class": "subject_old"}).find('a').text | |||||
except: | |||||
topics = itopic.find('span', {"class": "subject_new"}).find('a').text | |||||
topics = re.sub("\[\w*\]", '', topics) | |||||
topic.append(cleanString(topics)) | |||||
# Counting how many topics we have found so far | |||||
nm = len(topic) | |||||
# Adding the url to the list of urls | |||||
try: | |||||
link = itopic.find('span', {"class": "subject_old"}).find('a').get('href') | |||||
except: | |||||
link = itopic.find('span',{"class": "subject_new"}).find('a').get('href') | |||||
link = cleanLink(link) | |||||
href.append(link) | |||||
# Finding the author of the topic | |||||
ps = itopic.find('div', {"class":"author smalltext"}).find('a').text | |||||
author = ps.strip() | |||||
user.append(cleanString(author)) | |||||
# Finding the number of replies | |||||
columns = itopic.findChildren('td',recursive=False) | |||||
posts = columns[3].text | |||||
post.append(cleanString(posts)) | |||||
# Finding the number of Views | |||||
tview = columns[4].text | |||||
view.append(cleanString(tview)) | |||||
# If no information about when the topic was added, just assign "-1" to the variable | |||||
#dt = itopic.find('div', {"class": "responsive-hide"}).text.split('»')[1] | |||||
#dt = dt.strip() | |||||
#date_time_obj = datetime.strptime(dt,'%a %b %d, %Y %I:%M %p') | |||||
#addDate.append(date_time_obj) | |||||
addDate.append("-1") | |||||
index += 1 | |||||
return organizeTopics("CryptBB", nm, topic, board, view, post, user, addDate, href) | |||||
# if len(tag) > 0: | |||||
# | |||||
# # Finding the topic | |||||
# | |||||
# tds = tds[0].find(tag[0]) | |||||
# topics = tds.text | |||||
# topics = topics.replace(u"\xbb","") | |||||
# topics = topics.strip() | |||||
# topic.append(cleanString(topics)) | |||||
# | |||||
# # Counting how many topics we have found so far | |||||
# | |||||
# nm = len(topic) | |||||
# | |||||
# # Adding the url to the list of urls | |||||
# | |||||
# link = tds.findAll('a', href=True) | |||||
# link = link[0].get('href') | |||||
# link = cleanLink(link) | |||||
# href.append(link) | |||||
# | |||||
# # Finding the author of the topic | |||||
# | |||||
# ps = itopic.find('td', {"class": tag[1]}).find('p').find('a') | |||||
# if ps == None: | |||||
# ps = itopic.find('td', {"class": tag[1]}).find('p') | |||||
# ps = ps.text.replace("Started by ","") | |||||
# else: | |||||
# ps = ps.text | |||||
# author = ps.strip() | |||||
# user.append(cleanString(author)) | |||||
# | |||||
# # Finding the number of replies | |||||
# | |||||
# statistics = itopic.find('td', {"class": tag[2]}) | |||||
# statistics = statistics.text | |||||
# statistics = statistics.split("Replies") | |||||
# posts = statistics[0].strip() | |||||
# post.append(cleanString(posts)) | |||||
# | |||||
# # Finding the number of Views | |||||
# | |||||
# views = statistics[1] | |||||
# views = views.replace("Views","") | |||||
# views = views.strip() | |||||
# view.append(cleanString(views)) | |||||
# | |||||
# # As no information about when the topic was added, just assign "-1" to the variable | |||||
# | |||||
# addDate.append("-1") | |||||
#return organizeTopics("TheMajesticGarden", nm, topic, board, view, post, user, addDate, href) | |||||
#need to change this method | |||||
def hiddenanswers_links_parser(soup): | |||||
# Returning all links that should be visited by the Crawler | |||||
href = [] | |||||
#print(soup.find('table', {"class": "tborder clear"}).find( | |||||
# 'tbody').find_all('tr', {"class": "inline_row"})) | |||||
listing = soup.find_all('div', {"class": "qa-q-item-title"}) | |||||
for a in listing: | |||||
link = a.find('a').get('href') | |||||
href.append(link) | |||||
return href |
@ -1 +1 @@ | |||||
CryptBB | |||||
HiddenAnswers |
@ -5715,3 +5715,129 @@ unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | destructor()@TargetList.jsm:109 | ||||
stop()@CDP.jsm:104 | stop()@CDP.jsm:104 | ||||
close()@RemoteAgent.jsm:138 | close()@RemoteAgent.jsm:138 | ||||
1687805040175 geckodriver INFO Listening on 127.0.0.1:51912 | |||||
1687805045018 mozrunner::runner INFO Running command: "C:\\Users\\\\Helium\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "51913" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\Helium\\AppData\\Local\\Temp\\rust_mozprofileZnzBgo" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: init()" | |||||
console.log: "TorConnect: Entering Initial state" | |||||
console.log: "TorConnect: Observed profile-after-change" | |||||
console.log: "TorConnect: Observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: Observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: Observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: Observed profile-after-change" | |||||
1687805045980 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: Will load after bootstrap => [about:blank]" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:51913/devtools/browser/0670c8f8-9c9c-4e01-8160-fa774a106913 | |||||
1687805048452 Marionette INFO Listening on port 51922 | |||||
1687805049069 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
SourceActor threw an exception: [Exception... "Failed to open input source 'blob:moz-extension://3064b8c5-bffd-4bf8-b2f1-210b12185538/63e6c1d1-8508-4931-957a-2457d6b0914d'" nsresult: "0x805303f4 (<unknown>)" location: "JS frame :: resource://devtools/shared/DevToolsUtils.js :: mainThreadFetch/< :: line 670" data: yes] | |||||
Stack: mainThreadFetch/<@resource://devtools/shared/DevToolsUtils.js:670:15 | |||||
mainThreadFetch@resource://devtools/shared/DevToolsUtils.js:516:10 | |||||
_fetchURLContents@resource://devtools/server/actors/utils/sources-manager.js:442:22 | |||||
urlContents@resource://devtools/server/actors/utils/sources-manager.js:406:17 | |||||
_resurrectSource@resource://devtools/server/actors/thread.js:2142:35 | |||||
addAllSources@resource://devtools/server/actors/thread.js:1509:14 | |||||
watch@resource://devtools/server/actors/resources/sources.js:52:17 | |||||
watchResources@resource://devtools/server/actors/resources/index.js:239:19 | |||||
_watchTargetResources@resource://devtools/server/actors/targets/target-actor-mixin.js:156:24 | |||||
addWatcherDataEntry@resource://devtools/server/actors/targets/target-actor-mixin.js:47:20 | |||||
_addWatcherDataEntry@resource://devtools/server/connectors/js-window-actor/DevToolsFrameChild.jsm:483:24 | |||||
receiveMessage@resource://devtools/server/connectors/js-window-actor/DevToolsFrameChild.jsm:425:21 | |||||
Line: 670, column: 0 | |||||
console.error: ({}) | |||||
SourceActor threw an exception: [Exception... "Failed to open input source 'blob:moz-extension://3064b8c5-bffd-4bf8-b2f1-210b12185538/7fa8f91a-56f0-4c04-9105-87d47b1b4471'" nsresult: "0x805303f4 (<unknown>)" location: "JS frame :: resource://devtools/shared/DevToolsUtils.js :: mainThreadFetch/< :: line 670" data: yes] | |||||
Stack: mainThreadFetch/<@resource://devtools/shared/DevToolsUtils.js:670:15 | |||||
mainThreadFetch@resource://devtools/shared/DevToolsUtils.js:516:10 | |||||
_fetchURLContents@resource://devtools/server/actors/utils/sources-manager.js:442:22 | |||||
urlContents@resource://devtools/server/actors/utils/sources-manager.js:406:17 | |||||
_resurrectSource@resource://devtools/server/actors/thread.js:2142:35 | |||||
addAllSources@resource://devtools/server/actors/thread.js:1509:14 | |||||
watch@resource://devtools/server/actors/resources/sources.js:52:17 | |||||
watchResources@resource://devtools/server/actors/resources/index.js:239:19 | |||||
_watchTargetResources@resource://devtools/server/actors/targets/target-actor-mixin.js:156:24 | |||||
addWatcherDataEntry@resource://devtools/server/actors/targets/target-actor-mixin.js:47:20 | |||||
_addWatcherDataEntry@resource://devtools/server/connectors/js-window-actor/DevToolsFrameChild.jsm:483:24 | |||||
receiveMessage@resource://devtools/server/connectors/js-window-actor/DevToolsFrameChild.jsm:425:21 | |||||
Line: 670, column: 0 | |||||
console.error: ({}) | |||||
JavaScript error: resource://devtools/shared/DevToolsUtils.js, line 670: Failed to open input source 'blob:moz-extension://3064b8c5-bffd-4bf8-b2f1-210b12185538/63e6c1d1-8508-4931-957a-2457d6b0914d' | |||||
JavaScript error: resource://devtools/shared/DevToolsUtils.js, line 670: Failed to open input source 'blob:moz-extension://3064b8c5-bffd-4bf8-b2f1-210b12185538/7fa8f91a-56f0-4c04-9105-87d47b1b4471' | |||||
1687805693835 Marionette INFO Stopped listening on port 51922 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
JavaScript error: resource:///modules/sessionstore/SessionFile.jsm, line 375: Error: _initWorker called too early! Please read the session file from disk first. | |||||
JavaScript error: resource://gre/modules/PromiseWorker.jsm, line 106: Error: Could not get children of file(C:\Users\Helium\AppData\Local\Temp\rust_mozprofileZnzBgo\thumbnails) because it does not exist | |||||
[Parent 9020, IPC I/O Parent] WARNING: file /var/tmp/build/firefox-b6010b1466c9/ipc/chromium/src/base/process_util_win.cc:167 | |||||
1687805694033 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
//gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:51977/devtools/browser/24dda83b-987b-4d3c-9428-25b6c04610db | |||||
1687805249759 Marionette INFO Listening on port 51982 | |||||
1687805250211 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
1687805370464 Marionette INFO Stopped listening on port 51982 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
JavaScript error: resource:///modules/sessionstore/SessionFile.jsm, line 375: Error: _initWorker called too early! Please read the session file from disk first. | |||||
JavaScript error: resource://gre/modules/PageThumbs.jsm, line 709: AbortError: IOUtils.profileBeforeChange getter: IOUtils: profileBeforeChange phase has already finished | |||||
1687805370771 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1687805405107 geckodriver INFO Listening on 127.0.0.1:52029 | |||||
1687805408794 mozrunner::runner INFO Running command: "C:\\Users\\\\Helium\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "52030" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\Helium\\AppData\\Local\\Temp\\rust_mozprofile2JpHDQ" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: init()" | |||||
console.log: "TorConnect: Entering Initial state" | |||||
console.log: "TorConnect: Observed profile-after-change" | |||||
console.log: "TorConnect: Observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: Observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: Observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: Observed profile-after-change" | |||||
1687805409476 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: Will load after bootstrap => [about:blank]" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:52030/devtools/browser/e8211f5b-5a07-4862-9dbf-d532a7480d9e | |||||
1687805411441 Marionette INFO Listening on port 52035 | |||||
1687805411630 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: key "WEBEXT_CONTENT_SCRIPT_INJECTION_MS" was already initialized | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: key "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID" was already initialized | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS", key: "" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID", key: "{73a6fe31-595d-460b-a920-fcc0f8843232}" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS", key: "" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID", key: "{73a6fe31-595d-460b-a920-fcc0f8843232}" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: key "WEBEXT_CONTENT_SCRIPT_INJECTION_MS" was already initialized | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: key "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID" was already initialized | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS", key: "" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID", key: "{73a6fe31-595d-460b-a920-fcc0f8843232}" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS", key: "" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID", key: "{73a6fe31-595d-460b-a920-fcc0f8843232}" | |||||
1687805544313 Marionette INFO Stopped listening on port 52035 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
JavaScript error: chrome://remote/content/marionette/cert.js, line 55: NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICertOverrideService.setDisableAllSecurityChecksAndLetAttackersInterceptMyData] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
JavaScript error: resource:///modules/sessionstore/SessionFile.jsm, line 375: Error: _initWorker called too early! Please read the session file from disk first. | |||||
JavaScript error: resource://gre/modules/PromiseWorker.jsm, line 106: Error: Could not get children of file(C:\Users\Helium\AppData\Local\Temp\rust_mozprofile2JpHDQ\thumbnails) because it does not exist | |||||
1687805544458 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 |
@ -0,0 +1,314 @@ | |||||
__author__ = 'Helium' | |||||
''' | |||||
Apocalypse Forum Crawler (Selenium) | |||||
having trouble debugging it due to the captcha not loading | |||||
''' | |||||
from selenium import webdriver | |||||
from selenium.common.exceptions import NoSuchElementException | |||||
from selenium.webdriver.firefox.firefox_profile import FirefoxProfile | |||||
from selenium.webdriver.firefox.firefox_binary import FirefoxBinary | |||||
from selenium.webdriver.firefox.service import Service | |||||
from selenium.webdriver.support.ui import WebDriverWait | |||||
from selenium.webdriver.support import expected_conditions as EC | |||||
from selenium.webdriver.common.by import By | |||||
from PIL import Image | |||||
import urllib.parse as urlparse | |||||
import os, re, time | |||||
from datetime import date | |||||
import subprocess | |||||
import configparser | |||||
from bs4 import BeautifulSoup | |||||
from MarketPlaces.Initialization.prepare_parser import new_parse | |||||
from MarketPlaces.Apocalypse.parser import apocalypse_links_parser | |||||
from MarketPlaces.Utilities.utilities import cleanHTML | |||||
config = configparser.ConfigParser() | |||||
config.read('../../setup.ini') | |||||
counter = 1 | |||||
baseURL = 'http://apocam5hnoqskkmhr325nivjuh5phbmmggadxgcjabzzirap5iklkxad.onion/' | |||||
# Opens Tor Browser, crawls the website, then parses, then closes tor | |||||
#acts like the main method for the crawler, another function at the end of this code calls this function later | |||||
def startCrawling(): | |||||
opentor() | |||||
# mktName = getMKTName() | |||||
driver = getAccess() | |||||
if driver != 'down': | |||||
try: | |||||
login(driver) | |||||
crawlForum(driver) | |||||
except Exception as e: | |||||
print(driver.current_url, e) | |||||
closetor(driver) | |||||
# new_parse(forumName, baseURL, False) | |||||
# Opens Tor Browser | |||||
#prompts for ENTER input to continue | |||||
def opentor(): | |||||
global pid | |||||
print("Connecting Tor...") | |||||
pro = subprocess.Popen(config.get('TOR', 'firefox_binary_path')) | |||||
pid = pro.pid | |||||
time.sleep(7.5) | |||||
input('Tor Connected. Press ENTER to continue\n') | |||||
return | |||||
# Returns the name of the website | |||||
#return: name of site in string type | |||||
def getMKTName(): | |||||
name = 'Apocalypse' | |||||
return name | |||||
# Return the base link of the website | |||||
#return: url of base site in string type | |||||
def getFixedURL(): | |||||
url = 'http://apocam5hnoqskkmhr325nivjuh5phbmmggadxgcjabzzirap5iklkxad.onion/' | |||||
return url | |||||
# Closes Tor Browser | |||||
#@param: current selenium driver | |||||
def closetor(driver): | |||||
# global pid | |||||
# os.system("taskkill /pid " + str(pro.pid)) | |||||
# os.system("taskkill /t /f /im tor.exe") | |||||
print('Closing Tor...') | |||||
driver.close() | |||||
time.sleep(3) | |||||
return | |||||
# Creates FireFox 'driver' and configure its 'Profile' | |||||
# to use Tor proxy and socket | |||||
def createFFDriver(): | |||||
ff_binary = FirefoxBinary(config.get('TOR', 'firefox_binary_path')) | |||||
ff_prof = FirefoxProfile(config.get('TOR', 'firefox_profile_path')) | |||||
ff_prof.set_preference("places.history.enabled", False) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.offlineApps", True) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.passwords", True) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.siteSettings", True) | |||||
ff_prof.set_preference("privacy.sanitize.sanitizeOnShutdown", True) | |||||
ff_prof.set_preference("signon.rememberSignons", False) | |||||
ff_prof.set_preference("network.cookie.lifetimePolicy", 2) | |||||
ff_prof.set_preference("network.dns.disablePrefetch", True) | |||||
ff_prof.set_preference("network.http.sendRefererHeader", 0) | |||||
ff_prof.set_preference("permissions.default.image", 2) | |||||
ff_prof.set_preference("browser.download.folderList", 2) | |||||
ff_prof.set_preference("browser.download.manager.showWhenStarting", False) | |||||
ff_prof.set_preference("browser.helperApps.neverAsk.saveToDisk", "text/plain") | |||||
ff_prof.set_preference('network.proxy.type', 1) | |||||
ff_prof.set_preference("network.proxy.socks_version", 5) | |||||
ff_prof.set_preference('network.proxy.socks', '127.0.0.1') | |||||
ff_prof.set_preference('network.proxy.socks_port', 9150) | |||||
ff_prof.set_preference('network.proxy.socks_remote_dns', True) | |||||
ff_prof.set_preference("javascript.enabled", False) | |||||
ff_prof.update_preferences() | |||||
service = Service(config.get('TOR', 'geckodriver_path')) | |||||
driver = webdriver.Firefox(firefox_binary=ff_binary, firefox_profile=ff_prof, service=service) | |||||
return driver | |||||
#the driver 'gets' the url, attempting to get on the site, if it can't access return 'down' | |||||
#return: return the selenium driver or string 'down' | |||||
def getAccess(): | |||||
url = getFixedURL() | |||||
driver = createFFDriver() | |||||
try: | |||||
driver.get(url) | |||||
return driver | |||||
except: | |||||
driver.close() | |||||
return 'down' | |||||
# Manual captcha solver, waits fora specific element so that the whole page loads, finds the input box, gets screenshot of captcha | |||||
# then allows for manual solving of captcha in the terminal | |||||
#@param: current selenium web driver | |||||
def login(driver): | |||||
input("Press ENTER when CAPTCHA is completed\n") | |||||
# wait for page to show up (This Xpath may need to change based on different seed url) | |||||
WebDriverWait(driver, 100).until(EC.visibility_of_element_located( | |||||
(By.XPATH, '//*[@id="name"]'))) | |||||
# entering username and password into input boxes | |||||
usernameBox = driver.find_element(by=By.XPATH, value='//*[@id="name"]') | |||||
# Username here | |||||
usernameBox.send_keys('shooby') | |||||
passwordBox = driver.find_element(by=By.XPATH, value='//*[@id="password"]') | |||||
# Password here | |||||
passwordBox.send_keys('perry_1the2_platypu$') | |||||
input("Press ENTER when CAPTCHA is completed\n") | |||||
# wait for listing page show up (This Xpath may need to change based on different seed url) | |||||
WebDriverWait(driver, 100).until(EC.visibility_of_element_located( | |||||
(By.XPATH, "/html/body/div[1]/div[2]/div[1]/div[1]/a[13]"))) | |||||
# Saves the crawled html page, makes the directory path for html pages if not made | |||||
def savePage(page, url): | |||||
cleanPage = cleanHTML(page) | |||||
filePath = getFullPathName(url) | |||||
os.makedirs(os.path.dirname(filePath), exist_ok=True) | |||||
open(filePath, 'wb').write(cleanPage.encode('utf-8')) | |||||
return | |||||
# Gets the full path of the page to be saved along with its appropriate file name | |||||
#@param: raw url as crawler crawls through every site | |||||
def getFullPathName(url): | |||||
from MarketPlaces.Initialization.markets_mining import CURRENT_DATE | |||||
fileName = getNameFromURL(url) | |||||
if isDescriptionLink(url): | |||||
fullPath = r'..\Apocalypse\HTML_Pages\\' + CURRENT_DATE + r'\\Description\\' + fileName + '.html' | |||||
else: | |||||
fullPath = r'..\Apocalypse\HTML_Pages\\' + CURRENT_DATE + r'\\Listing\\' + fileName + '.html' | |||||
return fullPath | |||||
# Creates the file name from passed URL, gives distinct name if can't be made unique after cleaned | |||||
#@param: raw url as crawler crawls through every site | |||||
def getNameFromURL(url): | |||||
global counter | |||||
name = ''.join(e for e in url if e.isalnum()) | |||||
if (name == ''): | |||||
name = str(counter) | |||||
counter = counter + 1 | |||||
return name | |||||
# returns list of urls, here is where you can list the different urls of interest, the crawler runs through this list | |||||
#in this example, there are a couple of categories some threads fall under such as | |||||
# Guides and Tutorials, Digital Products, and Software and Malware | |||||
#as you can see they are categories of products | |||||
def getInterestedLinks(): | |||||
links = [] | |||||
# Hacking Services | |||||
links.append('http://apocam5hnoqskkmhr325nivjuh5phbmmggadxgcjabzzirap5iklkxad.onion/subcategory/19') | |||||
# software and malware | |||||
links.append('http://apocam5hnoqskkmhr325nivjuh5phbmmggadxgcjabzzirap5iklkxad.onion/subcategory/30') | |||||
return links | |||||
# gets links of interest to crawl through, iterates through list, where each link is clicked and crawled through | |||||
#topic and description pages are crawled through here, where both types of pages are saved | |||||
#@param: selenium driver | |||||
def crawlForum(driver): | |||||
print("Crawling the Apocalypse market") | |||||
linksToCrawl = getInterestedLinks() | |||||
visited = set(linksToCrawl) | |||||
initialTime = time.time() | |||||
count = 0 | |||||
i = 0 | |||||
while i < len(linksToCrawl): | |||||
link = linksToCrawl[i] | |||||
print('Crawling :', link) | |||||
try: | |||||
try: | |||||
driver.get(link) | |||||
except: | |||||
driver.refresh() | |||||
html = driver.page_source | |||||
savePage(html, link) | |||||
has_next_page = True | |||||
while has_next_page: | |||||
list = productPages(html) | |||||
for item in list: | |||||
itemURL = urlparse.urljoin(baseURL, str(item)) | |||||
try: | |||||
driver.get(itemURL) | |||||
except: | |||||
driver.refresh() | |||||
savePage(driver.page_source, item) | |||||
driver.back() | |||||
# # comment out | |||||
# break | |||||
# | |||||
# # comment out | |||||
# if count == 1: | |||||
# count = 0 | |||||
# break | |||||
try: | |||||
link = driver.find_element(by=By.XPATH, value= | |||||
'/html/body/div[1]/div/div[2]/nav/ul/li[5]/a').get_attribute('href') | |||||
if link == "": | |||||
raise NoSuchElementException | |||||
try: | |||||
driver.get(link) | |||||
except: | |||||
driver.refresh() | |||||
html = driver.page_source | |||||
savePage(html, link) | |||||
count += 1 | |||||
except NoSuchElementException: | |||||
has_next_page = False | |||||
except Exception as e: | |||||
print(link, e) | |||||
i += 1 | |||||
# finalTime = time.time() | |||||
# print finalTime - initialTime | |||||
input("Crawling Apocalypse forum done sucessfully. Press ENTER to continue\n") | |||||
# Returns 'True' if the link is a description link | |||||
#@param: url of any url crawled | |||||
#return: true if is a description page, false if not | |||||
def isDescriptionLink(url): | |||||
if 'article' in url: | |||||
return True | |||||
return False | |||||
# Returns True if the link is a listingPage link | |||||
#@param: url of any url crawled | |||||
#return: true if is a Listing page, false if not | |||||
def isListingLink(url): | |||||
if 'subcategory' in url: | |||||
return True | |||||
return False | |||||
# calling the parser to define the links, the html is the url of a link from the list of interested link list | |||||
#@param: link from interested link list ie. getInterestingLinks() | |||||
#return: list of description links that should be crawled through | |||||
def productPages(html): | |||||
soup = BeautifulSoup(html, "html.parser") | |||||
return apocalypse_links_parser(soup) | |||||
# Drop links that "signout" | |||||
# def isSignOut(url): | |||||
# #absURL = urlparse.urljoin(url.base_url, url.url) | |||||
# if 'signout' in url.lower() or 'logout' in url.lower(): | |||||
# return True | |||||
# | |||||
# return False | |||||
def crawler(): | |||||
startCrawling() | |||||
# print("Crawling and Parsing BestCardingWorld .... DONE!") |
@ -0,0 +1,291 @@ | |||||
__author__ = 'DarkWeb' | |||||
# Here, we are importing the auxiliary functions to clean or convert data | |||||
from MarketPlaces.Utilities.utilities import * | |||||
# Here, we are importing BeautifulSoup to search through the HTML tree | |||||
from bs4 import BeautifulSoup | |||||
#parses description pages, so takes html pages of description pages using soup object, and parses it for info it needs | |||||
#stores info it needs in different lists, these lists are returned after being organized | |||||
#@param: soup object looking at html page of description page | |||||
#return: 'row' that contains a variety of lists that each hold info on the description page | |||||
def darkfox_description_parser(soup): | |||||
# Fields to be parsed | |||||
name = "-1" # 0 Product_Name | |||||
describe = "-1" # 1 Product_Description | |||||
lastSeen = "-1" # 2 Product_LastViewDate | |||||
rules = "-1" # 3 NOT USED ... | |||||
CVE = "-1" # 4 Product_CVE_Classification (Common Vulnerabilities and Exposures) | |||||
MS = "-1" # 5 Product_MS_Classification (Microsoft Security) | |||||
review = "-1" # 6 Product_Number_Of_Reviews | |||||
category = "-1" # 7 Product_Category | |||||
shipFrom = "-1" # 8 Product_ShippedFrom | |||||
shipTo = "-1" # 9 Product_ShippedTo | |||||
left = "-1" # 10 Product_QuantityLeft | |||||
escrow = "-1" # 11 Vendor_Warranty | |||||
terms = "-1" # 12 Vendor_TermsAndConditions | |||||
vendor = "-1" # 13 Vendor_Name | |||||
sold = "-1" # 14 Product_QuantitySold | |||||
addDate = "-1" # 15 Product_AddedDate | |||||
available = "-1" # 16 NOT USED ... | |||||
endDate = "-1" # 17 NOT USED ... | |||||
BTC = "-1" # 18 Product_BTC_SellingPrice | |||||
USD = "-1" # 19 Product_USD_SellingPrice | |||||
rating = "-1" # 20 Vendor_Rating | |||||
success = "-1" # 21 Vendor_Successful_Transactions | |||||
EURO = "-1" # 22 Product_EURO_SellingPrice | |||||
# Finding Product Name | |||||
name = soup.find('h1').text | |||||
name = name.replace('\n', ' ') | |||||
name = name.replace(",", "") | |||||
name = name.strip() | |||||
# Finding Vendor | |||||
vendor = soup.find('h3').find('a').text.strip() | |||||
# Finding Vendor Rating | |||||
rating = soup.find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding Successful Transactions | |||||
success = soup.find('h3').text | |||||
success = success.replace("Vendor: ", "") | |||||
success = success.replace(vendor, "") | |||||
success = success.replace("(", "") | |||||
success = success.replace(")", "") | |||||
success = success.strip() | |||||
bae = soup.find('div', {'class': "box"}).find_all('ul') | |||||
# Finding Prices | |||||
USD = bae[1].find('strong').text.strip() | |||||
li = bae[2].find_all('li') | |||||
# Finding Escrow | |||||
escrow = li[0].find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding the Product Category | |||||
category = li[1].find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding the Product Quantity Available | |||||
left = li[3].find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding Number Sold | |||||
sold = li[4].find('span', {'class': "tag is-dark"}).text.strip() | |||||
li = bae[3].find_all('li') | |||||
# Finding Shipment Information (Origin) | |||||
if "Ships from:" in li[-2].text: | |||||
shipFrom = li[-2].text | |||||
shipFrom = shipFrom.replace("Ships from: ", "") | |||||
# shipFrom = shipFrom.replace(",", "") | |||||
shipFrom = shipFrom.strip() | |||||
# Finding Shipment Information (Destination) | |||||
shipTo = li[-1].find('div', {'title': "List of countries is scrollable"}).text | |||||
shipTo = shipTo.replace("Ships to: ", "") | |||||
shipTo = shipTo.strip() | |||||
if "certain countries" in shipTo: | |||||
countries = "" | |||||
tags = li[-1].find_all('span', {'class': "tag"}) | |||||
for tag in tags: | |||||
country = tag.text.strip() | |||||
countries += country + ", " | |||||
shipTo = countries.strip(", ") | |||||
# Finding the Product description | |||||
describe = soup.find('div', {'class': "pre-line"}).text | |||||
describe = describe.replace("\n", " ") | |||||
describe = describe.strip() | |||||
'''# Finding the Number of Product Reviews | |||||
tag = soup.findAll(text=re.compile('Reviews')) | |||||
for index in tag: | |||||
reviews = index | |||||
par = reviews.find('(') | |||||
if par >=0: | |||||
reviews = reviews.replace("Reviews (","") | |||||
reviews = reviews.replace(")","") | |||||
reviews = reviews.split(",") | |||||
review = str(abs(int(reviews[0])) + abs(int(reviews[1]))) | |||||
else : | |||||
review = "-1"''' | |||||
# Searching for CVE and MS categories | |||||
cve = soup.findAll(text=re.compile('CVE-\d{4}-\d{4}')) | |||||
if cve: | |||||
CVE = " " | |||||
for idx in cve: | |||||
CVE += (idx) | |||||
CVE += " " | |||||
CVE = CVE.replace(',', ' ') | |||||
CVE = CVE.replace('\n', '') | |||||
ms = soup.findAll(text=re.compile('MS\d{2}-\d{3}')) | |||||
if ms: | |||||
MS = " " | |||||
for im in ms: | |||||
MS += (im) | |||||
MS += " " | |||||
MS = MS.replace(',', ' ') | |||||
MS = MS.replace('\n', '') | |||||
# Populating the final variable (this should be a list with all fields scraped) | |||||
row = (name, describe, lastSeen, rules, CVE, MS, review, category, shipFrom, shipTo, left, escrow, terms, vendor, | |||||
sold, addDate, available, endDate, BTC, USD, rating, success, EURO) | |||||
# Sending the results | |||||
return row | |||||
#parses listing pages, so takes html pages of listing pages using soup object, and parses it for info it needs | |||||
#stores info it needs in different lists, these lists are returned after being organized | |||||
#@param: soup object looking at html page of listing page | |||||
#return: 'row' that contains a variety of lists that each hold info on the listing page | |||||
def darkfox_listing_parser(soup): | |||||
# Fields to be parsed | |||||
nm = 0 # Total_Products (Should be Integer) | |||||
mktName = "DarkFox" # 0 Marketplace_Name | |||||
name = [] # 1 Product_Name | |||||
CVE = [] # 2 Product_CVE_Classification (Common Vulnerabilities and Exposures) | |||||
MS = [] # 3 Product_MS_Classification (Microsoft Security) | |||||
category = [] # 4 Product_Category | |||||
describe = [] # 5 Product_Description | |||||
escrow = [] # 6 Vendor_Warranty | |||||
views = [] # 7 Product_Number_Of_Views | |||||
reviews = [] # 8 Product_Number_Of_Reviews | |||||
addDate = [] # 9 Product_AddDate | |||||
lastSeen = [] # 10 Product_LastViewDate | |||||
BTC = [] # 11 Product_BTC_SellingPrice | |||||
USD = [] # 12 Product_USD_SellingPrice | |||||
EURO = [] # 13 Product_EURO_SellingPrice | |||||
sold = [] # 14 Product_QuantitySold | |||||
qLeft =[] # 15 Product_QuantityLeft | |||||
shipFrom = [] # 16 Product_ShippedFrom | |||||
shipTo = [] # 17 Product_ShippedTo | |||||
vendor = [] # 18 Vendor | |||||
rating = [] # 19 Vendor_Rating | |||||
success = [] # 20 Vendor_Successful_Transactions | |||||
href = [] # 23 Product_Links (Urls) | |||||
listing = soup.findAll('div', {"class": "card"}) | |||||
# Populating the Number of Products | |||||
nm = len(listing) | |||||
for a in listing: | |||||
bae = a.findAll('a', href=True) | |||||
# Adding the url to the list of urls | |||||
link = bae[0].get('href') | |||||
link = cleanLink(link) | |||||
href.append(link) | |||||
# Finding the Product | |||||
product = bae[1].find('p').text | |||||
product = product.replace('\n', ' ') | |||||
product = product.replace(",", "") | |||||
product = product.replace("...", "") | |||||
product = product.strip() | |||||
name.append(product) | |||||
bae = a.find('div', {'class': "media-content"}).find('div').find_all('div') | |||||
if len(bae) >= 5: | |||||
# Finding Prices | |||||
price = bae[0].text | |||||
ud = price.replace(" USD", " ") | |||||
# u = ud.replace("$","") | |||||
u = ud.replace(",", "") | |||||
u = u.strip() | |||||
USD.append(u) | |||||
# bc = (prc[1]).strip(' BTC') | |||||
# BTC.append(bc) | |||||
# Finding the Vendor | |||||
vendor_name = bae[1].find('a').text | |||||
vendor_name = vendor_name.replace(",", "") | |||||
vendor_name = vendor_name.strip() | |||||
vendor.append(vendor_name) | |||||
# Finding the Category | |||||
cat = bae[2].find('small').text | |||||
cat = cat.replace("Category: ", "") | |||||
cat = cat.replace(",", "") | |||||
cat = cat.strip() | |||||
category.append(cat) | |||||
# Finding Number Sold and Quantity Left | |||||
num = bae[3].text | |||||
num = num.replace("Sold: ", "") | |||||
num = num.strip() | |||||
sold.append(num) | |||||
quant = bae[4].find('small').text | |||||
quant = quant.replace("In stock: ", "") | |||||
quant = quant.strip() | |||||
qLeft.append(quant) | |||||
# Finding Successful Transactions | |||||
freq = bae[1].text | |||||
freq = freq.replace(vendor_name, "") | |||||
freq = re.sub(r'Vendor Level \d+', "", freq) | |||||
freq = freq.replace("(", "") | |||||
freq = freq.replace(")", "") | |||||
freq = freq.strip() | |||||
success.append(freq) | |||||
# Searching for CVE and MS categories | |||||
cve = a.findAll(text=re.compile('CVE-\d{4}-\d{4}')) | |||||
if not cve: | |||||
cveValue="-1" | |||||
else: | |||||
cee = " " | |||||
for idx in cve: | |||||
cee += (idx) | |||||
cee += " " | |||||
cee = cee.replace(',', ' ') | |||||
cee = cee.replace('\n', '') | |||||
cveValue=cee | |||||
CVE.append(cveValue) | |||||
ms = a.findAll(text=re.compile('MS\d{2}-\d{3}')) | |||||
if not ms: | |||||
MSValue="-1" | |||||
else: | |||||
me = " " | |||||
for im in ms: | |||||
me += (im) | |||||
me += " " | |||||
me = me.replace(',', ' ') | |||||
me = me.replace('\n', '') | |||||
MSValue=me | |||||
MS.append(MSValue) | |||||
# Populate the final variable (this should be a list with all fields scraped) | |||||
return organizeProducts(mktName, nm, name, CVE, MS, category, describe, escrow, views, reviews, addDate, lastSeen, | |||||
BTC, USD, EURO, qLeft, shipFrom, shipTo, vendor, rating, success, sold, href) | |||||
#called by the crawler to get description links on a listing page | |||||
#@param: beautifulsoup object that is using the correct html page (listing page) | |||||
#return: list of description links from a listing page | |||||
def apocalypse_links_parser(soup): | |||||
# Returning all links that should be visited by the Crawler | |||||
href = [] | |||||
listing = soup.findAll('div', {"class": "col-lg-4 col-md-6 mb-1"}) | |||||
for a in listing: | |||||
bae = a.find('a', href=True) | |||||
link = bae['href'] | |||||
href.append(link) | |||||
return href |
@ -8909,3 +8909,204 @@ unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | destructor()@TargetList.jsm:109 | ||||
stop()@CDP.jsm:104 | stop()@CDP.jsm:104 | ||||
close()@RemoteAgent.jsm:138 | close()@RemoteAgent.jsm:138 | ||||
1687801130458 geckodriver INFO Listening on 127.0.0.1:50882 | |||||
1687801134634 mozrunner::runner INFO Running command: "C:\\Users\\\\Helium\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "50883" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\Helium\\AppData\\Local\\Temp\\rust_mozprofilelG5YzL" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: init()" | |||||
console.log: "TorConnect: Entering Initial state" | |||||
console.log: "TorConnect: Observed profile-after-change" | |||||
console.log: "TorConnect: Observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: Observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: Observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: Observed profile-after-change" | |||||
1687801135417 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: Will load after bootstrap => [about:blank]" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:50883/devtools/browser/826ee004-52be-4963-88bb-51490db9f024 | |||||
1687801137796 Marionette INFO Listening on port 50888 | |||||
1687801138076 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
1687801235502 Marionette INFO Stopped listening on port 50888 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
JavaScript error: chrome://remote/content/marionette/cert.js, line 55: NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICertOverrideService.setDisableAllSecurityChecksAndLetAttackersInterceptMyData] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
JavaScript error: resource:///modules/sessionstore/SessionFile.jsm, line 375: Error: _initWorker called too early! Please read the session file from disk first. | |||||
JavaScript error: resource://gre/modules/PromiseWorker.jsm, line 106: Error: Could not get children of file(C:\Users\Helium\AppData\Local\Temp\rust_mozprofilelG5YzL\thumbnails) because it does not exist | |||||
1687801236009 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1687803729727 geckodriver INFO Listening on 127.0.0.1:51043 | |||||
1687803735433 mozrunner::runner INFO Running command: "C:\\Users\\\\Helium\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "51044" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\Helium\\AppData\\Local\\Temp\\rust_mozprofile8yk3pL" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: init()" | |||||
console.log: "TorConnect: Entering Initial state" | |||||
console.log: "TorConnect: Observed profile-after-change" | |||||
console.log: "TorConnect: Observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: Observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: Observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: Observed profile-after-change" | |||||
1687803736266 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: Will load after bootstrap => [about:blank]" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:51044/devtools/browser/279ae18c-ab96-49ae-a7ee-4297cfabb35d | |||||
1687803738682 Marionette INFO Listening on port 51049 | |||||
1687803739068 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
1687803762049 Marionette INFO Stopped listening on port 51049 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
JavaScript error: chrome://remote/content/marionette/cert.js, line 55: NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICertOverrideService.setDisableAllSecurityChecksAndLetAttackersInterceptMyData] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
JavaScript error: resource:///modules/sessionstore/SessionFile.jsm, line 375: Error: _initWorker called too early! Please read the session file from disk first. | |||||
JavaScript error: resource://gre/modules/PromiseWorker.jsm, line 106: Error: Could not get children of file(C:\Users\Helium\AppData\Local\Temp\rust_mozprofile8yk3pL\thumbnails) because it does not exist | |||||
1687803762484 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1687803815921 geckodriver INFO Listening on 127.0.0.1:51099 | |||||
1687803818071 mozrunner::runner INFO Running command: "C:\\Users\\\\Helium\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "51100" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\Helium\\AppData\\Local\\Temp\\rust_mozprofile2ZkMFQ" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: init()" | |||||
console.log: "TorConnect: Entering Initial state" | |||||
console.log: "TorConnect: Observed profile-after-change" | |||||
console.log: "TorConnect: Observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: Observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: Observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: Observed profile-after-change" | |||||
1687803818411 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: Will load after bootstrap => [about:blank]" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:51100/devtools/browser/bf69c5ed-7691-4b50-8429-7072e8d06df1 | |||||
1687803819390 Marionette INFO Listening on port 51105 | |||||
1687803819471 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
console.log: "TorConnect: beginBootstrap()" | |||||
console.log: "TorConnect: Try transitioning from Initial to Bootstrapping" | |||||
console.log: "TorConnect: Exited Initial state" | |||||
console.log: "TorConnect: Entering Bootstrapping state" | |||||
JavaScript error: resource://gre/actors/RemotePageChild.jsm, line 116: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIXPCComponents_Utils.cloneInto] | |||||
1687803885470 Marionette INFO Stopped listening on port 51105 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
[Parent 9700, IPC I/O Parent] WARNING: file /var/tmp/build/firefox-b6010b1466c9/ipc/chromium/src/base/process_util_win.cc:167 | |||||
[Parent 9700, IPC I/O Parent] WARNING: file /var/tmp/build/firefox-b6010b1466c9/ipc/chromium/src/base/process_util_win.cc:167 | |||||
JavaScript error: chrome://remote/content/marionette/cert.js, line 55: NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICertOverrideService.setDisableAllSecurityChecksAndLetAttackersInterceptMyData] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
JavaScript error: resource:///modules/sessionstore/SessionFile.jsm, line 375: Error: _initWorker called too early! Please read the session file from disk first. | |||||
JavaScript error: resource://gre/modules/PageThumbs.jsm, line 709: AbortError: IOUtils.profileBeforeChange getter: IOUtils: profileBeforeChange phase has already finished | |||||
[Parent 9700, IPC I/O Parent] WARNING: file /var/tmp/build/firefox-b6010b1466c9/ipc/chromium/src/base/process_util_win.cc:167 | |||||
###!!! [Parent][RunMessage] Error: Channel closing: too late to send/recv, messages will be lost | |||||
1687803885894 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1687803951739 geckodriver INFO Listening on 127.0.0.1:51410 | |||||
1687803957561 mozrunner::runner INFO Running command: "C:\\Users\\\\Helium\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "51411" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\Helium\\AppData\\Local\\Temp\\rust_mozprofileEkT3L7" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: init()" | |||||
console.log: "TorConnect: Entering Initial state" | |||||
console.log: "TorConnect: Observed profile-after-change" | |||||
console.log: "TorConnect: Observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: Observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: Observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: Observed profile-after-change" | |||||
1687803958783 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: Will load after bootstrap => [about:blank]" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:51411/devtools/browser/0fcfcb3c-648c-42fe-941c-2e5078a8d9f5 | |||||
1687803961334 Marionette INFO Listening on port 51416 | |||||
1687803962042 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: key "WEBEXT_CONTENT_SCRIPT_INJECTION_MS" was already initialized | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: key "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID" was already initialized | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS", key: "" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID", key: "{73a6fe31-595d-460b-a920-fcc0f8843232}" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS", key: "" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID", key: "{73a6fe31-595d-460b-a920-fcc0f8843232}" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: key "WEBEXT_CONTENT_SCRIPT_INJECTION_MS" was already initialized | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: key "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID" was already initialized | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS", key: "" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID", key: "{73a6fe31-595d-460b-a920-fcc0f8843232}" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 109: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS", key: "" | |||||
JavaScript error: resource://gre/modules/ExtensionTelemetry.jsm, line 113: Error: TelemetryStopwatch: finishing nonexisting stopwatch. Histogram: "WEBEXT_CONTENT_SCRIPT_INJECTION_MS_BY_ADDONID", key: "{73a6fe31-595d-460b-a920-fcc0f8843232}" | |||||
1687803990026 Marionette INFO Stopped listening on port 51416 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
JavaScript error: chrome://remote/content/marionette/cert.js, line 55: NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICertOverrideService.setDisableAllSecurityChecksAndLetAttackersInterceptMyData] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
JavaScript error: resource:///modules/sessionstore/SessionFile.jsm, line 375: Error: _initWorker called too early! Please read the session file from disk first. | |||||
JavaScript error: resource://gre/modules/PageThumbs.jsm, line 709: AbortError: IOUtils.profileBeforeChange getter: IOUtils: profileBeforeChange phase has already finished | |||||
1687803990458 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 | |||||
1687808598159 geckodriver INFO Listening on 127.0.0.1:52393 | |||||
1687808601875 mozrunner::runner INFO Running command: "C:\\Users\\\\Helium\\Desktop\\Tor Browser\\Browser\\firefox.exe" "--marionette" "--remote-debugging-port" "52394" "--remote-allow-hosts" "localhost" "-no-remote" "-profile" "C:\\Users\\Helium\\AppData\\Local\\Temp\\rust_mozprofileJWq6B7" | |||||
console.log: "TorSettings: loadFromPrefs()" | |||||
console.log: "TorConnect: init()" | |||||
console.log: "TorConnect: Entering Initial state" | |||||
console.log: "TorConnect: Observed profile-after-change" | |||||
console.log: "TorConnect: Observing topic 'TorProcessExited'" | |||||
console.log: "TorConnect: Observing topic 'TorLogHasWarnOrErr'" | |||||
console.log: "TorConnect: Observing topic 'torsettings:ready'" | |||||
console.log: "TorSettings: Observed profile-after-change" | |||||
1687808602586 Marionette INFO Marionette enabled | |||||
console.log: "TorConnect: Will load after bootstrap => [about:blank]" | |||||
console.error: "Could not load engine [email protected]: Error: Extension is invalid" | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XPCOMUtils.jsm, line 161: TypeError: Cc[aContract] is undefined | |||||
DevTools listening on ws://localhost:52394/devtools/browser/721aa1c1-c11a-4dd0-b792-c0c18043fcab | |||||
1687808604383 Marionette INFO Listening on port 52399 | |||||
1687808604505 RemoteAgent WARN TLS certificate errors will be ignored for this session | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
JavaScript error: resource://gre/modules/XULStore.jsm, line 66: Error: Can't find profile directory. | |||||
1687808990408 Marionette INFO Stopped listening on port 52399 | |||||
JavaScript error: resource:///modules/Interactions.jsm, line 209: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver] | |||||
JavaScript error: chrome://remote/content/marionette/cert.js, line 55: NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICertOverrideService.setDisableAllSecurityChecksAndLetAttackersInterceptMyData] | |||||
!!! error running onStopped callback: TypeError: callback is not a function | |||||
JavaScript error: resource:///modules/sessionstore/SessionFile.jsm, line 375: Error: _initWorker called too early! Please read the session file from disk first. | |||||
JavaScript error: resource://gre/modules/PromiseWorker.jsm, line 106: Error: Could not get children of file(C:\Users\Helium\AppData\Local\Temp\rust_mozprofileJWq6B7\thumbnails) because it does not exist | |||||
###!!! [Parent][RunMessage] Error: Channel closing: too late to send/recv, messages will be lost | |||||
1687808990636 RemoteAgent ERROR unable to stop listener: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIWindowMediator.getEnumerator]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://remote/content/cdp/observers/TargetObserver.jsm :: stop :: line 64" data: no] Stack trace: stop()@TargetObserver.jsm:64 | |||||
unwatchForTabs()@TargetList.jsm:70 | |||||
unwatchForTargets()@TargetList.jsm:37 | |||||
destructor()@TargetList.jsm:109 | |||||
stop()@CDP.jsm:104 | |||||
close()@RemoteAgent.jsm:138 |
@ -1 +1 @@ | |||||
AnonymousMarketplace | |||||
MikesGrandStore |
@ -0,0 +1,314 @@ | |||||
__author__ = 'Helium' | |||||
''' | |||||
M00nkeyMarket Forum Crawler (Selenium) incomplete | |||||
having trouble checking it due to the captcha | |||||
''' | |||||
from selenium import webdriver | |||||
from selenium.common.exceptions import NoSuchElementException | |||||
from selenium.webdriver.firefox.firefox_profile import FirefoxProfile | |||||
from selenium.webdriver.firefox.firefox_binary import FirefoxBinary | |||||
from selenium.webdriver.firefox.service import Service | |||||
from selenium.webdriver.support.ui import WebDriverWait | |||||
from selenium.webdriver.support import expected_conditions as EC | |||||
from selenium.webdriver.common.by import By | |||||
from PIL import Image | |||||
import urllib.parse as urlparse | |||||
import os, re, time | |||||
from datetime import date | |||||
import subprocess | |||||
import configparser | |||||
from bs4 import BeautifulSoup | |||||
from MarketPlaces.Initialization.prepare_parser import new_parse | |||||
from MarketPlaces.M00nkeyMarket.parser import m00nkey_links_parser | |||||
from MarketPlaces.Utilities.utilities import cleanHTML | |||||
config = configparser.ConfigParser() | |||||
config.read('../../setup.ini') | |||||
counter = 1 | |||||
baseURL = 'http://apocam5hnoqskkmhr325nivjuh5phbmmggadxgcjabzzirap5iklkxad.onion/' | |||||
# Opens Tor Browser, crawls the website, then parses, then closes tor | |||||
#acts like the main method for the crawler, another function at the end of this code calls this function later | |||||
def startCrawling(): | |||||
opentor() | |||||
# mktName = getMKTName() | |||||
driver = getAccess() | |||||
if driver != 'down': | |||||
try: | |||||
login(driver) | |||||
crawlForum(driver) | |||||
except Exception as e: | |||||
print(driver.current_url, e) | |||||
closetor(driver) | |||||
# new_parse(forumName, baseURL, False) | |||||
# Opens Tor Browser | |||||
#prompts for ENTER input to continue | |||||
def opentor(): | |||||
global pid | |||||
print("Connecting Tor...") | |||||
pro = subprocess.Popen(config.get('TOR', 'firefox_binary_path')) | |||||
pid = pro.pid | |||||
time.sleep(7.5) | |||||
input('Tor Connected. Press ENTER to continue\n') | |||||
return | |||||
# Returns the name of the website | |||||
#return: name of site in string type | |||||
def getMKTName(): | |||||
name = 'M00nkeyMarket' | |||||
return name | |||||
# Return the base link of the website | |||||
#return: url of base site in string type | |||||
def getFixedURL(): | |||||
url = 'http://apocam5hnoqskkmhr325nivjuh5phbmmggadxgcjabzzirap5iklkxad.onion/' | |||||
return url | |||||
# Closes Tor Browser | |||||
#@param: current selenium driver | |||||
def closetor(driver): | |||||
# global pid | |||||
# os.system("taskkill /pid " + str(pro.pid)) | |||||
# os.system("taskkill /t /f /im tor.exe") | |||||
print('Closing Tor...') | |||||
driver.close() | |||||
time.sleep(3) | |||||
return | |||||
# Creates FireFox 'driver' and configure its 'Profile' | |||||
# to use Tor proxy and socket | |||||
def createFFDriver(): | |||||
ff_binary = FirefoxBinary(config.get('TOR', 'firefox_binary_path')) | |||||
ff_prof = FirefoxProfile(config.get('TOR', 'firefox_profile_path')) | |||||
ff_prof.set_preference("places.history.enabled", False) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.offlineApps", True) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.passwords", True) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.siteSettings", True) | |||||
ff_prof.set_preference("privacy.sanitize.sanitizeOnShutdown", True) | |||||
ff_prof.set_preference("signon.rememberSignons", False) | |||||
ff_prof.set_preference("network.cookie.lifetimePolicy", 2) | |||||
ff_prof.set_preference("network.dns.disablePrefetch", True) | |||||
ff_prof.set_preference("network.http.sendRefererHeader", 0) | |||||
ff_prof.set_preference("permissions.default.image", 2) | |||||
ff_prof.set_preference("browser.download.folderList", 2) | |||||
ff_prof.set_preference("browser.download.manager.showWhenStarting", False) | |||||
ff_prof.set_preference("browser.helperApps.neverAsk.saveToDisk", "text/plain") | |||||
ff_prof.set_preference('network.proxy.type', 1) | |||||
ff_prof.set_preference("network.proxy.socks_version", 5) | |||||
ff_prof.set_preference('network.proxy.socks', '127.0.0.1') | |||||
ff_prof.set_preference('network.proxy.socks_port', 9150) | |||||
ff_prof.set_preference('network.proxy.socks_remote_dns', True) | |||||
ff_prof.set_preference("javascript.enabled", False) | |||||
ff_prof.update_preferences() | |||||
service = Service(config.get('TOR', 'geckodriver_path')) | |||||
driver = webdriver.Firefox(firefox_binary=ff_binary, firefox_profile=ff_prof, service=service) | |||||
return driver | |||||
#the driver 'gets' the url, attempting to get on the site, if it can't access return 'down' | |||||
#return: return the selenium driver or string 'down' | |||||
def getAccess(): | |||||
url = getFixedURL() | |||||
driver = createFFDriver() | |||||
try: | |||||
driver.get(url) | |||||
return driver | |||||
except: | |||||
driver.close() | |||||
return 'down' | |||||
# Manual captcha solver, waits fora specific element so that the whole page loads, finds the input box, gets screenshot of captcha | |||||
# then allows for manual solving of captcha in the terminal | |||||
#@param: current selenium web driver | |||||
def login(driver): | |||||
input("Press ENTER when CAPTCHA is completed\n") | |||||
# wait for page to show up (This Xpath may need to change based on different seed url) | |||||
WebDriverWait(driver, 100).until(EC.visibility_of_element_located( | |||||
(By.XPATH, '//*[@id="name"]'))) | |||||
# entering username and password into input boxes | |||||
usernameBox = driver.find_element(by=By.XPATH, value='//*[@id="name"]') | |||||
# Username here | |||||
usernameBox.send_keys('shooby') | |||||
passwordBox = driver.find_element(by=By.XPATH, value='//*[@id="password"]') | |||||
# Password here | |||||
passwordBox.send_keys('perry_1the2_platypu$') | |||||
input("Press ENTER when CAPTCHA is completed\n") | |||||
# wait for listing page show up (This Xpath may need to change based on different seed url) | |||||
WebDriverWait(driver, 100).until(EC.visibility_of_element_located( | |||||
(By.XPATH, "/html/body/div[1]/div[2]/div[1]/div[1]/a[13]"))) | |||||
# Saves the crawled html page, makes the directory path for html pages if not made | |||||
def savePage(page, url): | |||||
cleanPage = cleanHTML(page) | |||||
filePath = getFullPathName(url) | |||||
os.makedirs(os.path.dirname(filePath), exist_ok=True) | |||||
open(filePath, 'wb').write(cleanPage.encode('utf-8')) | |||||
return | |||||
# Gets the full path of the page to be saved along with its appropriate file name | |||||
#@param: raw url as crawler crawls through every site | |||||
def getFullPathName(url): | |||||
from MarketPlaces.Initialization.markets_mining import CURRENT_DATE | |||||
fileName = getNameFromURL(url) | |||||
if isDescriptionLink(url): | |||||
fullPath = r'..\M00nkeyMarket\HTML_Pages\\' + CURRENT_DATE + r'\\Description\\' + fileName + '.html' | |||||
else: | |||||
fullPath = r'..\M00nkeyMarket\HTML_Pages\\' + CURRENT_DATE + r'\\Listing\\' + fileName + '.html' | |||||
return fullPath | |||||
# Creates the file name from passed URL, gives distinct name if can't be made unique after cleaned | |||||
#@param: raw url as crawler crawls through every site | |||||
def getNameFromURL(url): | |||||
global counter | |||||
name = ''.join(e for e in url if e.isalnum()) | |||||
if (name == ''): | |||||
name = str(counter) | |||||
counter = counter + 1 | |||||
return name | |||||
# returns list of urls, here is where you can list the different urls of interest, the crawler runs through this list | |||||
#in this example, there are a couple of categories some threads fall under such as | |||||
# Guides and Tutorials, Digital Products, and Software and Malware | |||||
#as you can see they are categories of products | |||||
def getInterestedLinks(): | |||||
links = [] | |||||
# software | |||||
links.append('http://moonkey4f2mkcp6hpackeea356puiry27h3dz3hzbt3adbmsk4gs7wyd.onion/search/subcategories?subcategory=30') | |||||
# software and malware | |||||
links.append('http://apocam5hnoqskkmhr325nivjuh5phbmmggadxgcjabzzirap5iklkxad.onion/subcategory/30') | |||||
return links | |||||
# gets links of interest to crawl through, iterates through list, where each link is clicked and crawled through | |||||
#topic and description pages are crawled through here, where both types of pages are saved | |||||
#@param: selenium driver | |||||
def crawlForum(driver): | |||||
print("Crawling the M00nkeyMarket market") | |||||
linksToCrawl = getInterestedLinks() | |||||
visited = set(linksToCrawl) | |||||
initialTime = time.time() | |||||
count = 0 | |||||
i = 0 | |||||
while i < len(linksToCrawl): | |||||
link = linksToCrawl[i] | |||||
print('Crawling :', link) | |||||
try: | |||||
try: | |||||
driver.get(link) | |||||
except: | |||||
driver.refresh() | |||||
html = driver.page_source | |||||
savePage(html, link) | |||||
has_next_page = True | |||||
while has_next_page: | |||||
list = productPages(html) | |||||
for item in list: | |||||
itemURL = urlparse.urljoin(baseURL, str(item)) | |||||
try: | |||||
driver.get(itemURL) | |||||
except: | |||||
driver.refresh() | |||||
savePage(driver.page_source, item) | |||||
driver.back() | |||||
# # comment out | |||||
# break | |||||
# | |||||
# # comment out | |||||
# if count == 1: | |||||
# count = 0 | |||||
# break | |||||
try: | |||||
link = driver.find_element(by=By.XPATH, value= | |||||
'/html/body/div/div[1]/div/div/div[3]/div/center/div[2]/nav/span[3]/a').get_attribute('href') | |||||
if link == "": | |||||
raise NoSuchElementException | |||||
try: | |||||
driver.get(link) | |||||
except: | |||||
driver.refresh() | |||||
html = driver.page_source | |||||
savePage(html, link) | |||||
count += 1 | |||||
except NoSuchElementException: | |||||
has_next_page = False | |||||
except Exception as e: | |||||
print(link, e) | |||||
i += 1 | |||||
# finalTime = time.time() | |||||
# print finalTime - initialTime | |||||
input("Crawling M00nkeyMarket done sucessfully. Press ENTER to continue\n") | |||||
# Returns 'True' if the link is a description link | |||||
#@param: url of any url crawled | |||||
#return: true if is a description page, false if not | |||||
def isDescriptionLink(url): | |||||
if 'listing' in url: | |||||
return True | |||||
return False | |||||
# Returns True if the link is a listingPage link | |||||
#@param: url of any url crawled | |||||
#return: true if is a Listing page, false if not | |||||
def isListingLink(url): | |||||
if 'subcategories' in url: | |||||
return True | |||||
return False | |||||
# calling the parser to define the links, the html is the url of a link from the list of interested link list | |||||
#@param: link from interested link list ie. getInterestingLinks() | |||||
#return: list of description links that should be crawled through | |||||
def productPages(html): | |||||
soup = BeautifulSoup(html, "html.parser") | |||||
return m00nkey_links_parser(soup) | |||||
# Drop links that "signout" | |||||
# def isSignOut(url): | |||||
# #absURL = urlparse.urljoin(url.base_url, url.url) | |||||
# if 'signout' in url.lower() or 'logout' in url.lower(): | |||||
# return True | |||||
# | |||||
# return False | |||||
def crawler(): | |||||
startCrawling() | |||||
# print("Crawling and Parsing BestCardingWorld .... DONE!") |
@ -0,0 +1,291 @@ | |||||
__author__ = 'DarkWeb' | |||||
# Here, we are importing the auxiliary functions to clean or convert data | |||||
from MarketPlaces.Utilities.utilities import * | |||||
# Here, we are importing BeautifulSoup to search through the HTML tree | |||||
from bs4 import BeautifulSoup | |||||
#parses description pages, so takes html pages of description pages using soup object, and parses it for info it needs | |||||
#stores info it needs in different lists, these lists are returned after being organized | |||||
#@param: soup object looking at html page of description page | |||||
#return: 'row' that contains a variety of lists that each hold info on the description page | |||||
def darkfox_description_parser(soup): | |||||
# Fields to be parsed | |||||
name = "-1" # 0 Product_Name | |||||
describe = "-1" # 1 Product_Description | |||||
lastSeen = "-1" # 2 Product_LastViewDate | |||||
rules = "-1" # 3 NOT USED ... | |||||
CVE = "-1" # 4 Product_CVE_Classification (Common Vulnerabilities and Exposures) | |||||
MS = "-1" # 5 Product_MS_Classification (Microsoft Security) | |||||
review = "-1" # 6 Product_Number_Of_Reviews | |||||
category = "-1" # 7 Product_Category | |||||
shipFrom = "-1" # 8 Product_ShippedFrom | |||||
shipTo = "-1" # 9 Product_ShippedTo | |||||
left = "-1" # 10 Product_QuantityLeft | |||||
escrow = "-1" # 11 Vendor_Warranty | |||||
terms = "-1" # 12 Vendor_TermsAndConditions | |||||
vendor = "-1" # 13 Vendor_Name | |||||
sold = "-1" # 14 Product_QuantitySold | |||||
addDate = "-1" # 15 Product_AddedDate | |||||
available = "-1" # 16 NOT USED ... | |||||
endDate = "-1" # 17 NOT USED ... | |||||
BTC = "-1" # 18 Product_BTC_SellingPrice | |||||
USD = "-1" # 19 Product_USD_SellingPrice | |||||
rating = "-1" # 20 Vendor_Rating | |||||
success = "-1" # 21 Vendor_Successful_Transactions | |||||
EURO = "-1" # 22 Product_EURO_SellingPrice | |||||
# Finding Product Name | |||||
name = soup.find('h1').text | |||||
name = name.replace('\n', ' ') | |||||
name = name.replace(",", "") | |||||
name = name.strip() | |||||
# Finding Vendor | |||||
vendor = soup.find('h3').find('a').text.strip() | |||||
# Finding Vendor Rating | |||||
rating = soup.find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding Successful Transactions | |||||
success = soup.find('h3').text | |||||
success = success.replace("Vendor: ", "") | |||||
success = success.replace(vendor, "") | |||||
success = success.replace("(", "") | |||||
success = success.replace(")", "") | |||||
success = success.strip() | |||||
bae = soup.find('div', {'class': "box"}).find_all('ul') | |||||
# Finding Prices | |||||
USD = bae[1].find('strong').text.strip() | |||||
li = bae[2].find_all('li') | |||||
# Finding Escrow | |||||
escrow = li[0].find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding the Product Category | |||||
category = li[1].find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding the Product Quantity Available | |||||
left = li[3].find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding Number Sold | |||||
sold = li[4].find('span', {'class': "tag is-dark"}).text.strip() | |||||
li = bae[3].find_all('li') | |||||
# Finding Shipment Information (Origin) | |||||
if "Ships from:" in li[-2].text: | |||||
shipFrom = li[-2].text | |||||
shipFrom = shipFrom.replace("Ships from: ", "") | |||||
# shipFrom = shipFrom.replace(",", "") | |||||
shipFrom = shipFrom.strip() | |||||
# Finding Shipment Information (Destination) | |||||
shipTo = li[-1].find('div', {'title': "List of countries is scrollable"}).text | |||||
shipTo = shipTo.replace("Ships to: ", "") | |||||
shipTo = shipTo.strip() | |||||
if "certain countries" in shipTo: | |||||
countries = "" | |||||
tags = li[-1].find_all('span', {'class': "tag"}) | |||||
for tag in tags: | |||||
country = tag.text.strip() | |||||
countries += country + ", " | |||||
shipTo = countries.strip(", ") | |||||
# Finding the Product description | |||||
describe = soup.find('div', {'class': "pre-line"}).text | |||||
describe = describe.replace("\n", " ") | |||||
describe = describe.strip() | |||||
'''# Finding the Number of Product Reviews | |||||
tag = soup.findAll(text=re.compile('Reviews')) | |||||
for index in tag: | |||||
reviews = index | |||||
par = reviews.find('(') | |||||
if par >=0: | |||||
reviews = reviews.replace("Reviews (","") | |||||
reviews = reviews.replace(")","") | |||||
reviews = reviews.split(",") | |||||
review = str(abs(int(reviews[0])) + abs(int(reviews[1]))) | |||||
else : | |||||
review = "-1"''' | |||||
# Searching for CVE and MS categories | |||||
cve = soup.findAll(text=re.compile('CVE-\d{4}-\d{4}')) | |||||
if cve: | |||||
CVE = " " | |||||
for idx in cve: | |||||
CVE += (idx) | |||||
CVE += " " | |||||
CVE = CVE.replace(',', ' ') | |||||
CVE = CVE.replace('\n', '') | |||||
ms = soup.findAll(text=re.compile('MS\d{2}-\d{3}')) | |||||
if ms: | |||||
MS = " " | |||||
for im in ms: | |||||
MS += (im) | |||||
MS += " " | |||||
MS = MS.replace(',', ' ') | |||||
MS = MS.replace('\n', '') | |||||
# Populating the final variable (this should be a list with all fields scraped) | |||||
row = (name, describe, lastSeen, rules, CVE, MS, review, category, shipFrom, shipTo, left, escrow, terms, vendor, | |||||
sold, addDate, available, endDate, BTC, USD, rating, success, EURO) | |||||
# Sending the results | |||||
return row | |||||
#parses listing pages, so takes html pages of listing pages using soup object, and parses it for info it needs | |||||
#stores info it needs in different lists, these lists are returned after being organized | |||||
#@param: soup object looking at html page of listing page | |||||
#return: 'row' that contains a variety of lists that each hold info on the listing page | |||||
def darkfox_listing_parser(soup): | |||||
# Fields to be parsed | |||||
nm = 0 # Total_Products (Should be Integer) | |||||
mktName = "DarkFox" # 0 Marketplace_Name | |||||
name = [] # 1 Product_Name | |||||
CVE = [] # 2 Product_CVE_Classification (Common Vulnerabilities and Exposures) | |||||
MS = [] # 3 Product_MS_Classification (Microsoft Security) | |||||
category = [] # 4 Product_Category | |||||
describe = [] # 5 Product_Description | |||||
escrow = [] # 6 Vendor_Warranty | |||||
views = [] # 7 Product_Number_Of_Views | |||||
reviews = [] # 8 Product_Number_Of_Reviews | |||||
addDate = [] # 9 Product_AddDate | |||||
lastSeen = [] # 10 Product_LastViewDate | |||||
BTC = [] # 11 Product_BTC_SellingPrice | |||||
USD = [] # 12 Product_USD_SellingPrice | |||||
EURO = [] # 13 Product_EURO_SellingPrice | |||||
sold = [] # 14 Product_QuantitySold | |||||
qLeft =[] # 15 Product_QuantityLeft | |||||
shipFrom = [] # 16 Product_ShippedFrom | |||||
shipTo = [] # 17 Product_ShippedTo | |||||
vendor = [] # 18 Vendor | |||||
rating = [] # 19 Vendor_Rating | |||||
success = [] # 20 Vendor_Successful_Transactions | |||||
href = [] # 23 Product_Links (Urls) | |||||
listing = soup.findAll('div', {"class": "card"}) | |||||
# Populating the Number of Products | |||||
nm = len(listing) | |||||
for a in listing: | |||||
bae = a.findAll('a', href=True) | |||||
# Adding the url to the list of urls | |||||
link = bae[0].get('href') | |||||
link = cleanLink(link) | |||||
href.append(link) | |||||
# Finding the Product | |||||
product = bae[1].find('p').text | |||||
product = product.replace('\n', ' ') | |||||
product = product.replace(",", "") | |||||
product = product.replace("...", "") | |||||
product = product.strip() | |||||
name.append(product) | |||||
bae = a.find('div', {'class': "media-content"}).find('div').find_all('div') | |||||
if len(bae) >= 5: | |||||
# Finding Prices | |||||
price = bae[0].text | |||||
ud = price.replace(" USD", " ") | |||||
# u = ud.replace("$","") | |||||
u = ud.replace(",", "") | |||||
u = u.strip() | |||||
USD.append(u) | |||||
# bc = (prc[1]).strip(' BTC') | |||||
# BTC.append(bc) | |||||
# Finding the Vendor | |||||
vendor_name = bae[1].find('a').text | |||||
vendor_name = vendor_name.replace(",", "") | |||||
vendor_name = vendor_name.strip() | |||||
vendor.append(vendor_name) | |||||
# Finding the Category | |||||
cat = bae[2].find('small').text | |||||
cat = cat.replace("Category: ", "") | |||||
cat = cat.replace(",", "") | |||||
cat = cat.strip() | |||||
category.append(cat) | |||||
# Finding Number Sold and Quantity Left | |||||
num = bae[3].text | |||||
num = num.replace("Sold: ", "") | |||||
num = num.strip() | |||||
sold.append(num) | |||||
quant = bae[4].find('small').text | |||||
quant = quant.replace("In stock: ", "") | |||||
quant = quant.strip() | |||||
qLeft.append(quant) | |||||
# Finding Successful Transactions | |||||
freq = bae[1].text | |||||
freq = freq.replace(vendor_name, "") | |||||
freq = re.sub(r'Vendor Level \d+', "", freq) | |||||
freq = freq.replace("(", "") | |||||
freq = freq.replace(")", "") | |||||
freq = freq.strip() | |||||
success.append(freq) | |||||
# Searching for CVE and MS categories | |||||
cve = a.findAll(text=re.compile('CVE-\d{4}-\d{4}')) | |||||
if not cve: | |||||
cveValue="-1" | |||||
else: | |||||
cee = " " | |||||
for idx in cve: | |||||
cee += (idx) | |||||
cee += " " | |||||
cee = cee.replace(',', ' ') | |||||
cee = cee.replace('\n', '') | |||||
cveValue=cee | |||||
CVE.append(cveValue) | |||||
ms = a.findAll(text=re.compile('MS\d{2}-\d{3}')) | |||||
if not ms: | |||||
MSValue="-1" | |||||
else: | |||||
me = " " | |||||
for im in ms: | |||||
me += (im) | |||||
me += " " | |||||
me = me.replace(',', ' ') | |||||
me = me.replace('\n', '') | |||||
MSValue=me | |||||
MS.append(MSValue) | |||||
# Populate the final variable (this should be a list with all fields scraped) | |||||
return organizeProducts(mktName, nm, name, CVE, MS, category, describe, escrow, views, reviews, addDate, lastSeen, | |||||
BTC, USD, EURO, qLeft, shipFrom, shipTo, vendor, rating, success, sold, href) | |||||
#called by the crawler to get description links on a listing page | |||||
#@param: beautifulsoup object that is using the correct html page (listing page) | |||||
#return: list of description links from a listing page | |||||
def m00nkey_links_parser(soup): | |||||
# Returning all links that should be visited by the Crawler | |||||
href = [] | |||||
listing = soup.findAll('div', {"class": "col-lg-4 col-md-6 mb-1"}) | |||||
for a in listing: | |||||
bae = a.find('a', href=True) | |||||
link = bae['href'] | |||||
href.append(link) | |||||
return href |
@ -0,0 +1,297 @@ | |||||
__author__ = 'Helium' | |||||
''' | |||||
Robinhood Crawler (Selenium) | |||||
''' | |||||
from selenium import webdriver | |||||
from selenium.common.exceptions import NoSuchElementException | |||||
from selenium.webdriver.firefox.firefox_profile import FirefoxProfile | |||||
from selenium.webdriver.firefox.firefox_binary import FirefoxBinary | |||||
from selenium.webdriver.firefox.service import Service | |||||
from selenium.webdriver.support.ui import WebDriverWait | |||||
from selenium.webdriver.support import expected_conditions as EC | |||||
from selenium.webdriver.common.by import By | |||||
from PIL import Image | |||||
import urllib.parse as urlparse | |||||
import os, re, time | |||||
from datetime import date | |||||
import subprocess | |||||
import configparser | |||||
from bs4 import BeautifulSoup | |||||
from MarketPlaces.Initialization.prepare_parser import new_parse | |||||
from MarketPlaces.Robinhood.parser import robinhood_links_parser | |||||
from MarketPlaces.Utilities.utilities import cleanHTML | |||||
config = configparser.ConfigParser() | |||||
config.read('../../setup.ini') | |||||
counter = 1 | |||||
baseURL = 'http://ilr3qzubfnx33vbhal7l5coo4ftqlkv2tboph4ujog5crz6m5ua2b2ad.onion/' | |||||
# Opens Tor Browser, crawls the website, then parses, then closes tor | |||||
#acts like the main method for the crawler, another function at the end of this code calls this function later | |||||
def startCrawling(): | |||||
opentor() | |||||
# mktName = getMKTName() | |||||
driver = getAccess() | |||||
if driver != 'down': | |||||
try: | |||||
login(driver) | |||||
crawlForum(driver) | |||||
except Exception as e: | |||||
print(driver.current_url, e) | |||||
closetor(driver) | |||||
# new_parse(forumName, baseURL, False) | |||||
# Opens Tor Browser | |||||
#prompts for ENTER input to continue | |||||
def opentor(): | |||||
global pid | |||||
print("Connecting Tor...") | |||||
pro = subprocess.Popen(config.get('TOR', 'firefox_binary_path')) | |||||
pid = pro.pid | |||||
time.sleep(7.5) | |||||
input('Tor Connected. Press ENTER to continue\n') | |||||
return | |||||
# Returns the name of the website | |||||
#return: name of site in string type | |||||
def getMKTName(): | |||||
name = 'Robinhood' | |||||
return name | |||||
# Return the base link of the website | |||||
#return: url of base site in string type | |||||
def getFixedURL(): | |||||
url = 'http://ilr3qzubfnx33vbhal7l5coo4ftqlkv2tboph4ujog5crz6m5ua2b2ad.onion/' | |||||
return url | |||||
# Closes Tor Browser | |||||
#@param: current selenium driver | |||||
def closetor(driver): | |||||
# global pid | |||||
# os.system("taskkill /pid " + str(pro.pid)) | |||||
# os.system("taskkill /t /f /im tor.exe") | |||||
print('Closing Tor...') | |||||
driver.close() | |||||
time.sleep(3) | |||||
return | |||||
# Creates FireFox 'driver' and configure its 'Profile' | |||||
# to use Tor proxy and socket | |||||
def createFFDriver(): | |||||
ff_binary = FirefoxBinary(config.get('TOR', 'firefox_binary_path')) | |||||
ff_prof = FirefoxProfile(config.get('TOR', 'firefox_profile_path')) | |||||
ff_prof.set_preference("places.history.enabled", False) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.offlineApps", True) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.passwords", True) | |||||
ff_prof.set_preference("privacy.clearOnShutdown.siteSettings", True) | |||||
ff_prof.set_preference("privacy.sanitize.sanitizeOnShutdown", True) | |||||
ff_prof.set_preference("signon.rememberSignons", False) | |||||
ff_prof.set_preference("network.cookie.lifetimePolicy", 2) | |||||
ff_prof.set_preference("network.dns.disablePrefetch", True) | |||||
ff_prof.set_preference("network.http.sendRefererHeader", 0) | |||||
ff_prof.set_preference("permissions.default.image", 2) | |||||
ff_prof.set_preference("browser.download.folderList", 2) | |||||
ff_prof.set_preference("browser.download.manager.showWhenStarting", False) | |||||
ff_prof.set_preference("browser.helperApps.neverAsk.saveToDisk", "text/plain") | |||||
ff_prof.set_preference('network.proxy.type', 1) | |||||
ff_prof.set_preference("network.proxy.socks_version", 5) | |||||
ff_prof.set_preference('network.proxy.socks', '127.0.0.1') | |||||
ff_prof.set_preference('network.proxy.socks_port', 9150) | |||||
ff_prof.set_preference('network.proxy.socks_remote_dns', True) | |||||
ff_prof.set_preference("javascript.enabled", False) | |||||
ff_prof.update_preferences() | |||||
service = Service(config.get('TOR', 'geckodriver_path')) | |||||
driver = webdriver.Firefox(firefox_binary=ff_binary, firefox_profile=ff_prof, service=service) | |||||
return driver | |||||
#the driver 'gets' the url, attempting to get on the site, if it can't access return 'down' | |||||
#return: return the selenium driver or string 'down' | |||||
def getAccess(): | |||||
url = getFixedURL() | |||||
driver = createFFDriver() | |||||
try: | |||||
driver.get(url) | |||||
return driver | |||||
except: | |||||
driver.close() | |||||
return 'down' | |||||
# Manual captcha solver, waits fora specific element so that the whole page loads, finds the input box, gets screenshot of captcha | |||||
# then allows for manual solving of captcha in the terminal | |||||
#@param: current selenium web driver | |||||
def login(driver): | |||||
# wait for page to show up (This Xpath may need to change based on different seed url) | |||||
WebDriverWait(driver, 100).until(EC.visibility_of_element_located( | |||||
(By.XPATH, "/html/body/div[1]/header/div/div[3]/div/div/ul/li[6]/a"))) | |||||
# Saves the crawled html page, makes the directory path for html pages if not made | |||||
def savePage(page, url): | |||||
cleanPage = cleanHTML(page) | |||||
filePath = getFullPathName(url) | |||||
os.makedirs(os.path.dirname(filePath), exist_ok=True) | |||||
open(filePath, 'wb').write(cleanPage.encode('utf-8')) | |||||
return | |||||
# Gets the full path of the page to be saved along with its appropriate file name | |||||
#@param: raw url as crawler crawls through every site | |||||
def getFullPathName(url): | |||||
from MarketPlaces.Initialization.markets_mining import CURRENT_DATE | |||||
fileName = getNameFromURL(url) | |||||
if isDescriptionLink(url): | |||||
fullPath = r'..\Robinhood\HTML_Pages\\' + CURRENT_DATE + r'\\Description\\' + fileName + '.html' | |||||
else: | |||||
fullPath = r'..\Robinhood\HTML_Pages\\' + CURRENT_DATE + r'\\Listing\\' + fileName + '.html' | |||||
return fullPath | |||||
# Creates the file name from passed URL, gives distinct name if can't be made unique after cleaned | |||||
#@param: raw url as crawler crawls through every site | |||||
def getNameFromURL(url): | |||||
global counter | |||||
name = ''.join(e for e in url if e.isalnum()) | |||||
if (name == ''): | |||||
name = str(counter) | |||||
counter = counter + 1 | |||||
return name | |||||
# returns list of urls, here is where you can list the different urls of interest, the crawler runs through this list | |||||
#in this example, there are a couple of categories some threads fall under such as | |||||
# Guides and Tutorials, Digital Products, and Software and Malware | |||||
#as you can see they are categories of products | |||||
def getInterestedLinks(): | |||||
links = [] | |||||
# Hacking and DDOS | |||||
links.append('http://4yx2akutmkhwfgzlpdxiah7cknurw6vlddlq24fxa3r3ebophwgpvhyd.onion/product-category/hacking/') | |||||
# # databases | |||||
# links.append('http://4yx2akutmkhwfgzlpdxiah7cknurw6vlddlq24fxa3r3ebophwgpvhyd.onion/product-category/databases/') | |||||
return links | |||||
# gets links of interest to crawl through, iterates through list, where each link is clicked and crawled through | |||||
#topic and description pages are crawled through here, where both types of pages are saved | |||||
#@param: selenium driver | |||||
def crawlForum(driver): | |||||
print("Crawling the Robinhood market") | |||||
linksToCrawl = getInterestedLinks() | |||||
visited = set(linksToCrawl) | |||||
initialTime = time.time() | |||||
count = 0 | |||||
i = 0 | |||||
while i < len(linksToCrawl): | |||||
link = linksToCrawl[i] | |||||
print('Crawling :', link) | |||||
try: | |||||
try: | |||||
driver.get(link) | |||||
except: | |||||
driver.refresh() | |||||
html = driver.page_source | |||||
savePage(html, link) | |||||
has_next_page = True | |||||
while has_next_page: | |||||
list = productPages(html) | |||||
for item in list: | |||||
itemURL = urlparse.urljoin(baseURL, str(item)) | |||||
try: | |||||
driver.get(itemURL) | |||||
except: | |||||
driver.refresh() | |||||
savePage(driver.page_source, item) | |||||
driver.back() | |||||
# comment out | |||||
break | |||||
# comment out | |||||
if count == 1: | |||||
count = 0 | |||||
break | |||||
try: | |||||
link = driver.find_element(by=By.XPATH, value= | |||||
'/html/body/div[1]/main/div/div[1]/div/div[3]/nav/ul/li[6]/a').get_attribute('href') | |||||
if link == "": | |||||
raise NoSuchElementException | |||||
try: | |||||
driver.get(link) | |||||
except: | |||||
driver.refresh() | |||||
html = driver.page_source | |||||
savePage(html, link) | |||||
count += 1 | |||||
except NoSuchElementException: | |||||
has_next_page = False | |||||
except Exception as e: | |||||
print(link, e) | |||||
i += 1 | |||||
# finalTime = time.time() | |||||
# print finalTime - initialTime | |||||
input("Crawling Robinhood forum done sucessfully. Press ENTER to continue\n") | |||||
# Returns 'True' if the link is a description link | |||||
#@param: url of any url crawled | |||||
#return: true if is a description page, false if not | |||||
def isDescriptionLink(url): | |||||
if 'product/' in url: | |||||
return True | |||||
return False | |||||
# Returns True if the link is a listingPage link | |||||
#@param: url of any url crawled | |||||
#return: true if is a Listing page, false if not | |||||
def isListingLink(url): | |||||
if 'product-category' in url: | |||||
return True | |||||
return False | |||||
# calling the parser to define the links, the html is the url of a link from the list of interested link list | |||||
#@param: link from interested link list ie. getInterestingLinks() | |||||
#return: list of description links that should be crawled through | |||||
def productPages(html): | |||||
soup = BeautifulSoup(html, "html.parser") | |||||
return robinhood_links_parser(soup) | |||||
# Drop links that "signout" | |||||
# def isSignOut(url): | |||||
# #absURL = urlparse.urljoin(url.base_url, url.url) | |||||
# if 'signout' in url.lower() or 'logout' in url.lower(): | |||||
# return True | |||||
# | |||||
# return False | |||||
def crawler(): | |||||
startCrawling() | |||||
# print("Crawling and Parsing BestCardingWorld .... DONE!") |
@ -0,0 +1,291 @@ | |||||
__author__ = 'DarkWeb' | |||||
# Here, we are importing the auxiliary functions to clean or convert data | |||||
from MarketPlaces.Utilities.utilities import * | |||||
# Here, we are importing BeautifulSoup to search through the HTML tree | |||||
from bs4 import BeautifulSoup | |||||
#parses description pages, so takes html pages of description pages using soup object, and parses it for info it needs | |||||
#stores info it needs in different lists, these lists are returned after being organized | |||||
#@param: soup object looking at html page of description page | |||||
#return: 'row' that contains a variety of lists that each hold info on the description page | |||||
def darkfox_description_parser(soup): | |||||
# Fields to be parsed | |||||
name = "-1" # 0 Product_Name | |||||
describe = "-1" # 1 Product_Description | |||||
lastSeen = "-1" # 2 Product_LastViewDate | |||||
rules = "-1" # 3 NOT USED ... | |||||
CVE = "-1" # 4 Product_CVE_Classification (Common Vulnerabilities and Exposures) | |||||
MS = "-1" # 5 Product_MS_Classification (Microsoft Security) | |||||
review = "-1" # 6 Product_Number_Of_Reviews | |||||
category = "-1" # 7 Product_Category | |||||
shipFrom = "-1" # 8 Product_ShippedFrom | |||||
shipTo = "-1" # 9 Product_ShippedTo | |||||
left = "-1" # 10 Product_QuantityLeft | |||||
escrow = "-1" # 11 Vendor_Warranty | |||||
terms = "-1" # 12 Vendor_TermsAndConditions | |||||
vendor = "-1" # 13 Vendor_Name | |||||
sold = "-1" # 14 Product_QuantitySold | |||||
addDate = "-1" # 15 Product_AddedDate | |||||
available = "-1" # 16 NOT USED ... | |||||
endDate = "-1" # 17 NOT USED ... | |||||
BTC = "-1" # 18 Product_BTC_SellingPrice | |||||
USD = "-1" # 19 Product_USD_SellingPrice | |||||
rating = "-1" # 20 Vendor_Rating | |||||
success = "-1" # 21 Vendor_Successful_Transactions | |||||
EURO = "-1" # 22 Product_EURO_SellingPrice | |||||
# Finding Product Name | |||||
name = soup.find('h1').text | |||||
name = name.replace('\n', ' ') | |||||
name = name.replace(",", "") | |||||
name = name.strip() | |||||
# Finding Vendor | |||||
vendor = soup.find('h3').find('a').text.strip() | |||||
# Finding Vendor Rating | |||||
rating = soup.find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding Successful Transactions | |||||
success = soup.find('h3').text | |||||
success = success.replace("Vendor: ", "") | |||||
success = success.replace(vendor, "") | |||||
success = success.replace("(", "") | |||||
success = success.replace(")", "") | |||||
success = success.strip() | |||||
bae = soup.find('div', {'class': "box"}).find_all('ul') | |||||
# Finding Prices | |||||
USD = bae[1].find('strong').text.strip() | |||||
li = bae[2].find_all('li') | |||||
# Finding Escrow | |||||
escrow = li[0].find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding the Product Category | |||||
category = li[1].find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding the Product Quantity Available | |||||
left = li[3].find('span', {'class': "tag is-dark"}).text.strip() | |||||
# Finding Number Sold | |||||
sold = li[4].find('span', {'class': "tag is-dark"}).text.strip() | |||||
li = bae[3].find_all('li') | |||||
# Finding Shipment Information (Origin) | |||||
if "Ships from:" in li[-2].text: | |||||
shipFrom = li[-2].text | |||||
shipFrom = shipFrom.replace("Ships from: ", "") | |||||
# shipFrom = shipFrom.replace(",", "") | |||||
shipFrom = shipFrom.strip() | |||||
# Finding Shipment Information (Destination) | |||||
shipTo = li[-1].find('div', {'title': "List of countries is scrollable"}).text | |||||
shipTo = shipTo.replace("Ships to: ", "") | |||||
shipTo = shipTo.strip() | |||||
if "certain countries" in shipTo: | |||||
countries = "" | |||||
tags = li[-1].find_all('span', {'class': "tag"}) | |||||
for tag in tags: | |||||
country = tag.text.strip() | |||||
countries += country + ", " | |||||
shipTo = countries.strip(", ") | |||||
# Finding the Product description | |||||
describe = soup.find('div', {'class': "pre-line"}).text | |||||
describe = describe.replace("\n", " ") | |||||
describe = describe.strip() | |||||
'''# Finding the Number of Product Reviews | |||||
tag = soup.findAll(text=re.compile('Reviews')) | |||||
for index in tag: | |||||
reviews = index | |||||
par = reviews.find('(') | |||||
if par >=0: | |||||
reviews = reviews.replace("Reviews (","") | |||||
reviews = reviews.replace(")","") | |||||
reviews = reviews.split(",") | |||||
review = str(abs(int(reviews[0])) + abs(int(reviews[1]))) | |||||
else : | |||||
review = "-1"''' | |||||
# Searching for CVE and MS categories | |||||
cve = soup.findAll(text=re.compile('CVE-\d{4}-\d{4}')) | |||||
if cve: | |||||
CVE = " " | |||||
for idx in cve: | |||||
CVE += (idx) | |||||
CVE += " " | |||||
CVE = CVE.replace(',', ' ') | |||||
CVE = CVE.replace('\n', '') | |||||
ms = soup.findAll(text=re.compile('MS\d{2}-\d{3}')) | |||||
if ms: | |||||
MS = " " | |||||
for im in ms: | |||||
MS += (im) | |||||
MS += " " | |||||
MS = MS.replace(',', ' ') | |||||
MS = MS.replace('\n', '') | |||||
# Populating the final variable (this should be a list with all fields scraped) | |||||
row = (name, describe, lastSeen, rules, CVE, MS, review, category, shipFrom, shipTo, left, escrow, terms, vendor, | |||||
sold, addDate, available, endDate, BTC, USD, rating, success, EURO) | |||||
# Sending the results | |||||
return row | |||||
#parses listing pages, so takes html pages of listing pages using soup object, and parses it for info it needs | |||||
#stores info it needs in different lists, these lists are returned after being organized | |||||
#@param: soup object looking at html page of listing page | |||||
#return: 'row' that contains a variety of lists that each hold info on the listing page | |||||
def darkfox_listing_parser(soup): | |||||
# Fields to be parsed | |||||
nm = 0 # Total_Products (Should be Integer) | |||||
mktName = "DarkFox" # 0 Marketplace_Name | |||||
name = [] # 1 Product_Name | |||||
CVE = [] # 2 Product_CVE_Classification (Common Vulnerabilities and Exposures) | |||||
MS = [] # 3 Product_MS_Classification (Microsoft Security) | |||||
category = [] # 4 Product_Category | |||||
describe = [] # 5 Product_Description | |||||
escrow = [] # 6 Vendor_Warranty | |||||
views = [] # 7 Product_Number_Of_Views | |||||
reviews = [] # 8 Product_Number_Of_Reviews | |||||
addDate = [] # 9 Product_AddDate | |||||
lastSeen = [] # 10 Product_LastViewDate | |||||
BTC = [] # 11 Product_BTC_SellingPrice | |||||
USD = [] # 12 Product_USD_SellingPrice | |||||
EURO = [] # 13 Product_EURO_SellingPrice | |||||
sold = [] # 14 Product_QuantitySold | |||||
qLeft =[] # 15 Product_QuantityLeft | |||||
shipFrom = [] # 16 Product_ShippedFrom | |||||
shipTo = [] # 17 Product_ShippedTo | |||||
vendor = [] # 18 Vendor | |||||
rating = [] # 19 Vendor_Rating | |||||
success = [] # 20 Vendor_Successful_Transactions | |||||
href = [] # 23 Product_Links (Urls) | |||||
listing = soup.findAll('div', {"class": "card"}) | |||||
# Populating the Number of Products | |||||
nm = len(listing) | |||||
for a in listing: | |||||
bae = a.findAll('a', href=True) | |||||
# Adding the url to the list of urls | |||||
link = bae[0].get('href') | |||||
link = cleanLink(link) | |||||
href.append(link) | |||||
# Finding the Product | |||||
product = bae[1].find('p').text | |||||
product = product.replace('\n', ' ') | |||||
product = product.replace(",", "") | |||||
product = product.replace("...", "") | |||||
product = product.strip() | |||||
name.append(product) | |||||
bae = a.find('div', {'class': "media-content"}).find('div').find_all('div') | |||||
if len(bae) >= 5: | |||||
# Finding Prices | |||||
price = bae[0].text | |||||
ud = price.replace(" USD", " ") | |||||
# u = ud.replace("$","") | |||||
u = ud.replace(",", "") | |||||
u = u.strip() | |||||
USD.append(u) | |||||
# bc = (prc[1]).strip(' BTC') | |||||
# BTC.append(bc) | |||||
# Finding the Vendor | |||||
vendor_name = bae[1].find('a').text | |||||
vendor_name = vendor_name.replace(",", "") | |||||
vendor_name = vendor_name.strip() | |||||
vendor.append(vendor_name) | |||||
# Finding the Category | |||||
cat = bae[2].find('small').text | |||||
cat = cat.replace("Category: ", "") | |||||
cat = cat.replace(",", "") | |||||
cat = cat.strip() | |||||
category.append(cat) | |||||
# Finding Number Sold and Quantity Left | |||||
num = bae[3].text | |||||
num = num.replace("Sold: ", "") | |||||
num = num.strip() | |||||
sold.append(num) | |||||
quant = bae[4].find('small').text | |||||
quant = quant.replace("In stock: ", "") | |||||
quant = quant.strip() | |||||
qLeft.append(quant) | |||||
# Finding Successful Transactions | |||||
freq = bae[1].text | |||||
freq = freq.replace(vendor_name, "") | |||||
freq = re.sub(r'Vendor Level \d+', "", freq) | |||||
freq = freq.replace("(", "") | |||||
freq = freq.replace(")", "") | |||||
freq = freq.strip() | |||||
success.append(freq) | |||||
# Searching for CVE and MS categories | |||||
cve = a.findAll(text=re.compile('CVE-\d{4}-\d{4}')) | |||||
if not cve: | |||||
cveValue="-1" | |||||
else: | |||||
cee = " " | |||||
for idx in cve: | |||||
cee += (idx) | |||||
cee += " " | |||||
cee = cee.replace(',', ' ') | |||||
cee = cee.replace('\n', '') | |||||
cveValue=cee | |||||
CVE.append(cveValue) | |||||
ms = a.findAll(text=re.compile('MS\d{2}-\d{3}')) | |||||
if not ms: | |||||
MSValue="-1" | |||||
else: | |||||
me = " " | |||||
for im in ms: | |||||
me += (im) | |||||
me += " " | |||||
me = me.replace(',', ' ') | |||||
me = me.replace('\n', '') | |||||
MSValue=me | |||||
MS.append(MSValue) | |||||
# Populate the final variable (this should be a list with all fields scraped) | |||||
return organizeProducts(mktName, nm, name, CVE, MS, category, describe, escrow, views, reviews, addDate, lastSeen, | |||||
BTC, USD, EURO, qLeft, shipFrom, shipTo, vendor, rating, success, sold, href) | |||||
#called by the crawler to get description links on a listing page | |||||
#@param: beautifulsoup object that is using the correct html page (listing page) | |||||
#return: list of description links from a listing page | |||||
def robinhood_links_parser(soup): | |||||
# Returning all links that should be visited by the Crawler | |||||
href = [] | |||||
listing = soup.findAll('div', {"class": "box-image"}) | |||||
for a in listing: | |||||
bae = a.find('div', {"class": "image-fade_in_back"}).find('a', href=True) | |||||
link = bae['href'] | |||||
href.append(link) | |||||
return href |