diff --git a/documentation/README.md b/documentation/README.md index 2bb4859..ec9366f 100644 --- a/documentation/README.md +++ b/documentation/README.md @@ -1851,7 +1851,9 @@ Module to query a local instance of uwhois (https://github.com/rafiot/uwhoisd). -An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information +An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information. +Our Whois service, DNS Lookup API, and SSL analysis, equips organizations with comprehensive threat intelligence and attack surface analysis capabilities for enhanced security. +Explore our website's product section at https://whoisfreaks.com/ for a wide range of additional services catering to threat intelligence and attack surface analysis needs. - **features**: >The module takes a domain as input and queries the Whoisfreaks API with it. > diff --git a/documentation/mkdocs/expansion.md b/documentation/mkdocs/expansion.md index 37da129..701c79d 100644 --- a/documentation/mkdocs/expansion.md +++ b/documentation/mkdocs/expansion.md @@ -1848,7 +1848,9 @@ Module to query a local instance of uwhois (https://github.com/rafiot/uwhoisd). -An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information +An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information. +Our Whois service, DNS Lookup API, and SSL analysis, equips organizations with comprehensive threat intelligence and attack surface analysis capabilities for enhanced security. +Explore our website's product section at https://whoisfreaks.com/ for a wide range of additional services catering to threat intelligence and attack surface analysis needs. - **features**: >The module takes a domain as input and queries the Whoisfreaks API with it. > diff --git a/documentation/website/expansion/whoisfreaks.json b/documentation/website/expansion/whoisfreaks.json index bd33bad..0e55373 100644 --- a/documentation/website/expansion/whoisfreaks.json +++ b/documentation/website/expansion/whoisfreaks.json @@ -1,5 +1,5 @@ { - "description": "An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information", + "description": "An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information.\nOur Whois service, DNS Lookup API, and SSL analysis, equips organizations with comprehensive threat intelligence and attack surface analysis capabilities for enhanced security. \nExplore our website's product section at https://whoisfreaks.com/ for a wide range of additional services catering to threat intelligence and attack surface analysis needs.", "logo": "whoisfreaks.png", "requirements": [ "An access to the Whoisfreaks API_KEY" diff --git a/misp_modules/modules/expansion/whoisfreaks.py b/misp_modules/modules/expansion/whoisfreaks.py index d13416e..5ea5257 100644 --- a/misp_modules/modules/expansion/whoisfreaks.py +++ b/misp_modules/modules/expansion/whoisfreaks.py @@ -117,7 +117,7 @@ def expand_whois(apiKey, domain): 'types': ['domain'], 'values': ns_servers, 'categories': ['Attribution'], - 'comment': 'list of name server for %s by whoisFreaks' + 'comment': 'Name server for %s by whoisFreaks' % domain } @@ -162,7 +162,7 @@ def expand_dns(apiKey, domain): 'values': ['%s|%s' % (domain, ipv4) for ipv4 in list_ipv4], 'categories': ['Network activity'], - 'comment': ' List ipv4 of %s ' % + 'comment': 'ipv4 of %s ' % domain }) if list_ipv6: @@ -170,7 +170,7 @@ def expand_dns(apiKey, domain): 'values': ['%s|%s' % (domain, ipv6) for ipv6 in list_ipv6], 'categories': ['Network activity'], - 'comment': ' List ipv6 of %s' % + 'comment': 'ipv6 of %s' % domain }) @@ -178,14 +178,14 @@ def expand_dns(apiKey, domain): r.append({'types': ['domain'], 'values': servers_mx, 'categories': ['Network activity'], - 'comment': ' List mx of %s' % + 'comment': 'mx of %s' % domain }) if soa_hostnames: r.append({'types': ['domain'], 'values': soa_hostnames, 'categories': ['Network activity'], - 'comment': ' List soa of %s' % + 'comment': 'soa hostname of %s' % domain }) @@ -220,16 +220,3 @@ def introspection(): def version(): moduleinfo['config'] = moduleconfig return moduleinfo - - -# def main(): - - -# apiKey = 'b7d971e9fe0f43d097d130e245b0f687' -# domain = 'google.com' -# return handle_domain(apiKey, domain, misperrors) - - -# if __name__ == '__main__': -# main() - \ No newline at end of file