Inspects the deep web URL with onioff

What is ONIOFF:-

Onioff is a tool written in python. It basically inspects the deep web URLs or the onions URLs. Onioff checks the status of the deep web URLs that it is active or not. It showcase the actual status of the onion URLs.

According to ethical hacking researcher of iicybersecurity onioff comes handy, when you are using tor and not sure about the link whether it is active or not you can use the onioff to inspect.

Onioff does not come pre-installed in kali linux. In order to use onioff use the following steps carefully:-

  • For installing the ONIOFF go to github link:- https://github.com/kem4/onioff.git
  • In order to install onioff you must have python3, socks update in your kali linux.
  • For updating python3 and socks.
  • Type sudo apt-get update.
  • Then type sudo apt-get install python3.
  • For installing socks. Type sudo apt-get install python3-socks.

Note:- Use python3 instead of python because the tool is developed on python3.

  • For using the onioff you must have the tor configured and must be in running in kali linux.
  • For installing tor in kali linux. Type sudo apt-get update
  • Then type sudo apt-get install tor
  • For running tor type tor in kali linux.
  • For checking if the tor is running type ps -ef | grep tor

 

LAUNCHING THE ONIOFF:-

For launching the onioff. Go to location where you have downloaded the onioff.

  • Type cd onioff
  • Type pip install –r requirements.txt
  • Now type python3 onioff.py –help
 ██████╗ ███╗ ██╗██╗ ██████╗ ███████╗███████╗

██╔═══██╗████╗ ██║██║██╔═══██╗██╔════╝██╔════╝

██║ ██║██╔██╗ ██║██║██║ ██║█████╗ █████╗

██║ ██║██║╚██╗██║██║██║ ██║██╔══╝ ██╔══╝

╚██████╔╝██║ ╚████║██║╚██████╔╝██║ ██║

 ╚═════╝ ╚═╝ ╚═══╝╚═╝ ╚═════╝ ╚═╝ ╚═╝ v2.1

 

 Onion URL Inspector (ONIOFF)

 Made with <3 by: Nikolaos Kamarinakis (k4m4)

 Version: 2.1

Usage: python3 onioff.py {onion} [options]

Options:

 --version show program's version number and exit

 -h, --help show this help message and exit

 -f FILE, --file=FILE name of onion file

 -o OUTPUT_FILE, --output=OUTPUT_FILE

 output filename

 -a, --active log active onions only to output file

Examples:

 python3 onioff.py http://xmh57jrzrnw6insl.onion/

 python3 onioff.py -f ~/onions.txt -o ~/report.txt

 python3 onioff.py https://facebookcorewwwi.onion/ -o ~/report.txt

 

SCANNING THE ONION URL:-

 iicybersecurity@kali:~/onioff$ python3 onioff.py http://yq6mfhgnosbf5vx5.onion/


█████╗ ███╗ ██╗██╗ ██████╗ ███████╗███████╗

██╔═══██╗████╗ ██║██║██╔═══██╗██╔════╝██╔════╝

██║ ██║██╔██╗ ██║██║██║ ██║█████╗ █████╗

██║ ██║██║╚██╗██║██║██║ ██║██╔══╝ ██╔══╝

╚██████╔╝██║ ╚████║██║╚██████╔╝██║ ██║

 ╚═════╝ ╚═╝ ╚═══╝╚═╝ ╚═════╝ ╚═╝ ╚═╝ v2.1

Onion URL Inspector (ONIOFF)

 Made with <3 by: Nikolaos Kamarinakis (k4m4)

 Version: 2.1

[+] Commencing onion inspection

[+] Tor running normally

[O] http://yq6mfhgnosbf5vx5.onion/ (ACTIVE) ==> 'Apple Love'

[!] Onion inspection successfully complete

[!] Inspection report saved as --> reports/onioff_2018-11-11_15:03:54.txt

Comp/tional time elapsed: 0.350149

  • The above query shows that the link is active in deep web and is open.

 

VIEWING THE REPORTS:-

  • Type ls as shown below
iicybersecurity@kali:~/onioff$ ls

code-of-conduct.md license onioff.py readme.md reports requirements.txt

iicybersecurity@kali:~/onioff$ cd reports

iicybersecurity@kali:~/onioff/reports$ ls

onioff_2018-11-11_15:03:54.txt readme.md

iicybersecurity@kali:~/onioff/reports$ cat onioff_2018-11-11_15:03:54.txt

http://yq6mfhgnosbf5vx5.onion/ - Apple Love
  • In the above output, you can view the save reports.