What is ONIOFF:- Onioff is a tool written in python. It basically inspects the deep web URLs or the onions URLs. Onioff checks the status of the deep web URLs that it is active or not, as per ethical hacking courses. It showcase the actual status of the onion URLs.
According to ethical hacking researcher of International Institute of Cyber Security, onioff comes handy, when you are using tor and not sure about the link whether it is active or not you can use the onioff to inspect.
Onioff does not come pre-installed in kali linux. In order to use onioff use the following steps carefully:-
- For installing the ONIOFF go to github link:- https://github.com/kem4/onioff.git
- In order to install onioff you must have python3, socks update in your kali linux.
- For updating python3 and socks.
- Type sudo apt-get update.
- Then type sudo apt-get install python3.
- For installing socks. Type sudo apt-get install python3-socks.
Note:- Use python3 instead of python because the tool is developed on python3.
- For using the onioff you must have the tor configured and must be in running in kali linux.
- For installing tor in kali linux. Type sudo apt-get update
- Then type sudo apt-get install tor
- For running tor type tor in kali linux.
- For checking if the tor is running type ps -ef | grep tor
LAUNCHING THE ONIOFF:-
For launching the onioff. Go to location where you have downloaded the onioff.
- Type cd onioff
- Type pip install –r requirements.txt
- Now type python3 onioff.py –help
██████╗ ███╗ ██╗██╗ ██████╗ ███████╗███████╗ ██╔═══██╗████╗ ██║██║██╔═══██╗██╔════╝██╔════╝ ██║ ██║██╔██╗ ██║██║██║ ██║█████╗ █████╗ ██║ ██║██║╚██╗██║██║██║ ██║██╔══╝ ██╔══╝ ╚██████╔╝██║ ╚████║██║╚██████╔╝██║ ██║ ╚═════╝ ╚═╝ ╚═══╝╚═╝ ╚═════╝ ╚═╝ ╚═╝ v2.1
Onion URL Inspector (ONIOFF) Made with <3 by: Nikolaos Kamarinakis (k4m4) Version: 2.1 Usage: python3 onioff.py {onion} [options] Options: --version show program's version number and exit -h, --help show this help message and exit -f FILE, --file=FILE name of onion file -o OUTPUT_FILE, --output=OUTPUT_FILE output filename -a, --active log active onions only to output file Examples: python3 onioff.py https://xmh57jrzrnw6insl.onion/ python3 onioff.py -f ~/onions.txt -o ~/report.txt python3 onioff.py https://facebookcorewwwi.onion/ -o ~/report.txt
SCANNING THE ONION URL:-
iicybersecurity@kali:~/onioff$ python3 onioff.py https://yq6mfhgnosbf5vx5.onion/
█████╗ ███╗ ██╗██╗ ██████╗ ███████╗███████╗ ██╔═══██╗████╗ ██║██║██╔═══██╗██╔════╝██╔════╝ ██║ ██║██╔██╗ ██║██║██║ ██║█████╗ █████╗ ██║ ██║██║╚██╗██║██║██║ ██║██╔══╝ ██╔══╝ ╚██████╔╝██║ ╚████║██║╚██████╔╝██║ ██║ ╚═════╝ ╚═╝ ╚═══╝╚═╝ ╚═════╝ ╚═╝ ╚═╝ v2.1
Onion URL Inspector (ONIOFF) Made with <3 by: Nikolaos Kamarinakis (k4m4) Version: 2.1 [+] Commencing onion inspection [+] Tor running normally [O] https://yq6mfhgnosbf5vx5.onion/ (ACTIVE) ==> 'Apple Love' [!] Onion inspection successfully complete [!] Inspection report saved as --> reports/onioff_2018-11-11_15:03:54.txt Comp/tional time elapsed: 0.350149
- The above query shows that the link is active in deep web and is open.
VIEWING THE REPORTS:-
- Type ls as shown below
iicybersecurity@kali:~/onioff$ ls code-of-conduct.md license onioff.py readme.md reports requirements.txt iicybersecurity@kali:~/onioff$ cd reports iicybersecurity@kali:~/onioff/reports$ ls onioff_2018-11-11_15:03:54.txt readme.md iicybersecurity@kali:~/onioff/reports$ cat onioff_2018-11-11_15:03:54.txt https://yq6mfhgnosbf5vx5.onion/ - Apple Love
- In the above output, you can view the save reports.
Cyber Security Researcher. Information security specialist, currently working as risk infrastructure specialist & investigator. He is a cyber-security researcher with over 25 years of experience. He has served with the Intelligence Agency as a Senior Intelligence Officer. He has also worked with Google and Citrix in development of cyber security solutions. He has aided the government and many federal agencies in thwarting many cyber crimes. He has been writing for us in his free time since last 5 years.