User Tools

Site Tools


api

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
api [2024/08/15 18:00]
kaduuwikiadmin [API Script to find and extracts accounts in leaks]
api [2025/03/26 08:50] (current)
kaduuwikiadmin [API Script to find and extracts accounts in leaks]
Line 55: Line 55:
  
  
-===== API Script for all endpoints ===== 
- 
- 
-The customer has various options in Kaduu for accessing the query data: 
-  * Via dashboard: data can be displayed and then exported (CSV, XML, DOCX etc) 
-  * Via webhook 
-  * Via REST API 
-  * Via alerting (email) 
- 
-The REST API allows you great flexibility in automation and integration into your existing processes and applications. In this chapter we illustrate how the API can be used with a customizable Python script which could assist you with few business use cases: 
- 
-  * White labeled alerts: You use Kaduu to regularly provide end customers or specific people with email alerts on certain topics (e.g. leaked data). To do this, you want to use an email with your design, company name and structure and also send this via your infrastructure. 
-  * Ticketing System Integration: You want to integrate Kaduu into your existing environment and create tickets or incidents automatically in Splunk, Jira, Slack or similar systems. 
-  * Automated Output Parsing: You want to store all results for certain search queries daily in an easy-to-process format (CSV, XLS, etc.) locally in a folder of your choice for analysis and further processing. 
-  * Reduce Workload in Alerting: You want to save time when using Kaduu's email alerts: Instead of logging into the system for email alerts and researching the cause of the alerts, you want to receive the specific raw data of the alerts via email. 
- 
-You can learn more in the {{ :readme.docx |readme.docx}} or {{ ::api_script.zip |download the python files}}. 
  
 +===== API Script to extract leaks and save it to a CSV =====
  
 +{{ ::query_leaks.zip |The Leak Center Query Tool}} is a Python script that interacts with the Leak Center API to fetch and process leaked data. It supports authentication using credentials provided interactively or through an optional auth.txt file, which must be formatted as username,password. The script queries for a target domain, which can be supplied interactively or via an input.txt file. Optionally, a date range can be specified through a DateRange.txt file or interactively; if skipped, no date filter is applied. The script normalizes different date formats, such as yyyy.mm.dd, yy.mm.dd, or yyyy-mm-dd, into a format compatible with the backend.
  
 +The script processes paginated responses from the API and writes the results to a CSV file, Leaks.csv, with structured headers including id, createdAt, content, fileName, and more. 
  
 ===== API Script to find and extracts accounts in leaks ===== ===== API Script to find and extracts accounts in leaks =====
  
-This script is designed to help users search through data leaks for specific information like email addresses and passwords. It automates the process of logging into the Leak Center's API service, where the leaks are stored. Once logged in, the script uses search criteria specified by the user (such as particular tags that might relate to the type of information they're interested in, e.g., "accounts") to find relevant data within the leaks. +This script is designed to help users search through data leaks for specific information like email addresses and passwords. It automates the process of logging into the Leak Center's API service, where the leaks are stored. Once logged in, the script uses search criteria specified by the user (such as particular tags that might relate to the type of information they're interested in, e.g., "accounts") to find relevant data within the leaks. Please check the readme inside the script for more details. {{ :leakapi_v2.zip |Download the file here.}}
- +
-The script handles several key steps: +
- +
-  * Logging In: It starts by using a username and password to log into the API and get a security token. This token is necessary for making secure requests to the service. +
-  * Reading Input Data: It reads from various text files that contain the user's search terms, date ranges for when the data was leaked, and specific tags related to the leaks. +
-  * Searching Leaks: Using the provided search terms, the script sends a query to the API to find leaks that match the criteria. +
-  * Processing Results: Once it retrieves the data, the script filters through it to find and extract only those details that match the user's needs, saving the results in a text file for easy access. +
-  * Continued Searches: The script can handle multiple pages of results from the API, ensuring it captures all relevant data. +
- +
- +
-The script can be downloaded {{ ::new_script_2.zip |here}}. It uses: +
-  * auth.txt - your Kaduu email and pwd +
-  * DateRange.txt - the date range for the query. Could be for example "2020-01-01 TO *" or "2020-01-01 TO *2024-01-01" +
-  * input.txt - should contain your domain (like "example.com" - dont use a subdomain) +
-  * Tags.txt - by default "accounts" +
api.1723737612.txt.gz · Last modified: 2024/08/15 18:00 by kaduuwikiadmin