diff --git a/2FA-Spider/main.py b/2FA-Spider/main.py index fcf2e63..93caf86 100644 --- a/2FA-Spider/main.py +++ b/2FA-Spider/main.py @@ -3,8 +3,8 @@ def main(): - # start = 1 start must from 1 - end = 20 # don't need to change + start = 1 # start must from 1 + end = 10000 # don't need to change searxng_search = SearxngSearch(TOP_WEBSITES_CSV_PATH) searxng_search.run(end) print(f"\033[91m[END] Congratulations! You has crawled all domains, the failed domains are stored in {PROGRESS_FILE}, the results are stored in {RESULTS_FILE_PATH}. If you want to resume the progress, you can run it again, and don't worry it will be repeated.\033[0m") diff --git a/README.md b/README.md new file mode 100644 index 0000000..b964b00 --- /dev/null +++ b/README.md @@ -0,0 +1,19 @@ +# SE2FA - Website 2FA Security Evaluation Framework + +SE2FA is a framework designed for evaluating the security of website 2FA systems. This repository contains the code for two important components that make up the SE2FA framework: + +## Components + +### 1. **2FA Spider** +The 2FA Spider is a crawler that uses a meta search engine to discover websites that support 2FA, including relevant 2FA documentation. It helps in automatically identifying and cataloging websites with 2FA implementations for further security assessment. If you want to run this program, please read the README.md in 2FA Spider Directory. + +### 2. **2FA Extension** +The 2FA Extension is a Google Chrome plugin that accelerates the extraction of 2FA cookies. It offers the following functionalities: +- Capture cookie snapshots +- Compare two cookie snapshots +- Intercept and capture HTTP traffic + +## Framework Architecture +The SE2FA framework consists of these two components working in tandem to assess the security of websites' 2FA mechanisms. Below is an architecture diagram illustrating how the components interact: + +![SE2FA Framework](SE2FA.png) diff --git a/SE2FA.png b/SE2FA.png new file mode 100644 index 0000000..d781d62 Binary files /dev/null and b/SE2FA.png differ