- this tool designed to demonstrate how much a publically accessible node could be abused.
Peers
[] => every found peerLogs
[] => every received API response
- get_cmd(node_url, port, call) => a returns a curl template to API call
call
fornode_url
:port
- get_peers() => return
- detect_vulns() => return
- check_rpc(peers[]) => check if rpc API is public for peers[]
connected_peers
vaiable stores a nodes with accessable JSON-RPC API done- connect to each node in
connected_peers
JSON-RPC API, done - fetch connected peers, done
- check if any of those peers has a public JSON-RPC API, done
- if one has add it to the
connected_peers
list, done - go through the added peers, find vulns using teatime framework.
- store the peers into NoSql database done
- store the logs of every
node_call
into NoSql database done - store the peers with public accessable JOSON-RPC to some database or storage canceled
- Repeat. done
- methods with return always return arrays
Logs
array stores everynode_call
response
- MongoDB used.
- <net_version>
- <personal_listWallets>