slack-watchman


Nameslack-watchman JSON
Version 4.4.0 PyPI version JSON
download
home_pagehttps://github.com/PaperMtn/slack-watchman
SummaryMonitoring and enumerating Slack for exposed secrets
upload_time2024-11-20 21:11:07
maintainerNone
docs_urlNone
authorPaperMtn
requires_python>=3.10
licenseGPL-3.0
keywords audit slack slack-watchman watchman blue-team red-team threat-hunting
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            <img src="https://i.imgur.com/jeU9F0a.png" width="550">

# Slack Watchman
![Python 2.7 and 3 compatible](https://img.shields.io/pypi/pyversions/slack-watchman)
![PyPI version](https://img.shields.io/pypi/v/slack-watchman.svg)
![License: MIT](https://img.shields.io/pypi/l/slack-watchman.svg)

Monitoring and enumerating Slack for exposed secrets

## About Slack Watchman
<img src="/images/slack_watchman.png" width="500">

Slack Watchman is an application that uses the Slack API to find potentially sensitive data exposed in a Slack workspace, and to enumerate other useful information for red, blue and purple teams.

More information about Slack Watchman can be found [on my blog](https://papermtn.co.uk/slack-watchman-monitoring-slack-workspaces-for-sensitive-information/).

### Features
#### Secrets Detection
<img src="/images/slack_watchman_finding.png" width="500">

Slack Watchman looks for:

- API Keys, Tokens & Service Accounts
  - AWS, Azure, GCP, Google API, Slack (keys & webhooks), Twitter, Facebook, GitHub and more
  - Generic Private keys
  - Access Tokens, Bearer Tokens, Client Secrets, Private Tokens
- Files
    - Certificate files
    - Potentially interesting/malicious/sensitive files (.docm, .xlsm, .zip etc.)
    - Executable files
    - Keychain files
    - Config files for popular services (Terraform, Jenkins, OpenVPN and more)
- Personal Data
    - Leaked passwords
    - Passport numbers, Dates of birth, Social security numbers, National insurance numbers and more
- Financial data
    - Paypal Braintree tokens, Bank card details, IBAN numbers, CUSIP numbers and more

#### Time based searching
You can run Slack Watchman to look for results going back as far as:
- 24 hours
- 7 days
- 30 days
- All time

#### Enumeration
<img src="/images/slack_watchman_enumeration.png" width="500">

It also enumerates the following:
- User data
    - All users & all admins
- Conversation data
    - All conversations, including externally shared conversations
    - All conversations that include a Slack Canvas (which often contain sensitive or important information)
- Workspace authentication options


This means after one deep scan, you can schedule Slack Watchman to run regularly and only return results from your chosen timeframe.

#### Unauthenticated Probe
<img src="/images/slack_watchman_probe.png" width="500">

You can run Slack Watchman in unauthenticated probe mode to enumerate authentication options and other information on a Workspace. This doesn't need a token, and returns:

- Workspace name
- Workspace ID
- Approved domains (which can create accounts)
- OAuth providers
- SSO auth status
- Two-factor requirements

To run this mode use Slack Watchman with the `--probe` flag and the workspace domain to probe:

```commandline
slack-watchman --probe https://domain.slack.com
```

### Signatures
Slack Watchman uses custom YAML signatures to detect matches in Slack. These signatures are pulled from the central [Watchman Signatures repository](https://github.com/PaperMtn/watchman-signatures). Slack Watchman automatically updates its signature base at runtime to ensure its using the latest signatures to detect secrets.

#### Suppressing Signatures
You can define signatures that you want to disable when running Slack Watchman by adding their IDs to the `disabled_signatures` section of the `watchman.conf` file. For example:

```yaml
slack_watchman:
  token: ...
  cookie: ...
  url: ...
  disabled_signatures:
    - tokens_generic_bearer_tokens
    - tokens_generic_access_tokens
```

You can find the ID of a signature in the individual YAML files in [Watchman Signatures repository](https://github.com/PaperMtn/watchman-signatures).

### Logging

Slack Watchman gives the following logging options:
- Terminal-friendly Stdout
- JSON to Stdout

Slack Watchman defaults to terminal-friendly stdout logging if no option is given. This is designed to be easier for humans to read.

JSON logging is also available, which is perfect for ingesting into a SIEM or other log analysis platforms.

JSON formatted logging can be easily redirected to a file as below:
```commandline
slack-watchman --timeframe a --all --output json >> slack_watchman_log.json 
```

## Authentication Requirements
### Slack API token
To run Slack Watchman, you will need a Slack API OAuth access token. You can do this by creating a simple [Slack App](https://api.slack.com/apps).

The app needs to have the following **User Token Scopes** added:
```
channels:read
files:read
groups:read
im:read
links:read
mpim:read
remote_files:read
search:read
team:read
users:read
users:read.email
```
**Note**: User tokens act on behalf of the user who authorises them, so I would suggest you create this app and authorise it using a service account, otherwise the app will have access to your private conversations and chats.

#### App Manifest
Slack apps can be created from JSON manifests which define the details of the application and the scopes to approve. The app manifest for Slack Watchman can be found in [docs/app_manifest.json](/docs/app_manifest.json), you can use this to speed up creating your Slack app.

### Cookie Authentication
Alternatively, Slack Watchman can also authenticate to Slack using a user `d` cookie, which is stored in the browser of each user logged into a workspace.

To use cookie authentication, you will need to provide the `d` cookie, and the URL of the target workspace. Then you will need to use the `--cookie` flag when running Slack Watchman

More information on cookie authentication can be found [on my blog](https://papermtn.co.uk/category/tools/slack-watchman/)
#### Providing tokens
Slack Watchman will first try to get the Slack token (plus the cookie token and URL if selected) from the environment variables 
- `SLACK_WATCHMAN_TOKEN`
- `SLACK_WATCHMAN_COOKIE`
- `SLACK_WATCHMAN_URL`

If this fails it will try to load the token(s) from `.conf` file (see below).

#### watchman.conf file
Configuration options can be passed in a file named `watchman.conf` which must be stored in your home directory. The file should follow the YAML format, and should look like below:
```yaml
slack_watchman:
  token: xoxp-xxxxxxxx
  cookie: xoxd-%2xxxxx
  url: https://xxxxx.slack.com
  disabled_signatures:
    - tokens_generic_bearer_tokens
    - tokens_generic_access_tokens
```
Slack Watchman will look for this file at runtime, and use the configuration options from here. If you are not using cookie auth, leave `cookie` and `url` blank.

If you are having issues with your .conf file, run it through a YAML linter.

An example file is in `docs/example.conf`

**Note**: Cookie and URL values are optional, and not required if not using cookie authentication.

## Installation
You can install the latest stable version via pip:

```commandline
python3 -m pip install slack-watchman
```

Or build from source yourself:

Download the release source files, then from the top level repository run:
```commandline
python3 -m pip build
python3 -m pip install --force-reinstall dist/*.whl
```

## Docker Image

Slack Watchman is also available from the Docker hub as a Docker image:

`docker pull papermountain/slack-watchman:latest`

You can then run Slack Watchman in a container, making sure you pass the required environment variables:

```commandline
// help
docker run --rm papermountain/slack-watchman -h

// scan all
docker run --rm -e SLACK_WATCHMAN_TOKEN=xoxp... papermountain/slack-watchman --timeframe a --all --output json
docker run --rm --env-file .env papermountain/slack-watchman --timeframe a --all --output stdout
```

## Usage
Slack Watchman will be installed as a global command, use as follows:
```commandline
usage: slack-watchman [-h] [--timeframe {d,w,m,a}] [--output {json,stdout}] [--version] [--all] [--users] [--channels] [--pii] [--secrets] [--debug] [--verbose] [--cookie] [--probe PROBE_DOMAIN]

Monitoring and enumerating Slack for exposed secrets

options:
  -h, --help            show this help message and exit
  --timeframe {d,w,m,a}, -t {d,w,m,a}
                        How far back to search: d = 24 hours w = 7 days, m = 30 days, a = all time
  --output {json,stdout}, -o {json,stdout}
                        Where to send results
  --version, -v         show program's version number and exit
  --all, -a             Find secrets and PII
  --users, -u           Enumerate users and output them to .csv in the current working directory
  --channels, -c        Enumerate channels and output them to .csv in the current working directory
  --pii, -p             Find personal data: DOB, passport details, drivers licence, ITIN, SSN etc.
  --secrets, -s         Find exposed secrets: credentials, tokens etc.
  --debug, -d           Turn on debug level logging
  --verbose, -V         Turn on more verbose output for JSON logging. This includes more fields, but is larger
  --cookie              Use cookie auth using Slack d cookie. REQUIRES either SLACK_WATCHMAN_COOKIE and SLACK_WATCHMAN_URL environment variables set, or both values set in watchman.conf
  --probe PROBE_DOMAIN  Perform an un-authenticated probe on a workspace for available authentication options and other information. Enter workspace domain to probe
  ```

You can run Slack Watchman to look for everything, and output to default stdout:

```commandline
slack-watchman --timeframe a --all
```

## Other Watchman apps
You may be interested in the other apps in the Watchman family:
- [Slack Watchman for Enterprise Grid](https://github.com/PaperMtn/slack-watchman-enterprise-grid)
- [GitLab Watchman](https://github.com/PaperMtn/gitlab-watchman)
- [GitHub Watchman](https://github.com/PaperMtn/github-watchman)

## License
The source code for this project is released under the [GNU General Public Licence](https://www.gnu.org/licenses/licenses.html#GPL). This project is not associated with Slack Technologies or Salesforce.
            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/PaperMtn/slack-watchman",
    "name": "slack-watchman",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.10",
    "maintainer_email": null,
    "keywords": "audit, slack, slack-watchman, watchman, blue-team, red-team, threat-hunting",
    "author": "PaperMtn",
    "author_email": "papermtn@protonmail.com",
    "download_url": "https://files.pythonhosted.org/packages/3f/4b/d606e6e1bf5b5b583f20498921e3063e26b7034c6c2d9a3c5d20d93986c8/slack_watchman-4.4.0.tar.gz",
    "platform": null,
    "description": "<img src=\"https://i.imgur.com/jeU9F0a.png\" width=\"550\">\n\n# Slack Watchman\n![Python 2.7 and 3 compatible](https://img.shields.io/pypi/pyversions/slack-watchman)\n![PyPI version](https://img.shields.io/pypi/v/slack-watchman.svg)\n![License: MIT](https://img.shields.io/pypi/l/slack-watchman.svg)\n\nMonitoring and enumerating Slack for exposed secrets\n\n## About Slack Watchman\n<img src=\"/images/slack_watchman.png\" width=\"500\">\n\nSlack Watchman is an application that uses the Slack API to find potentially sensitive data exposed in a Slack workspace, and to enumerate other useful information for red, blue and purple teams.\n\nMore information about Slack Watchman can be found [on my blog](https://papermtn.co.uk/slack-watchman-monitoring-slack-workspaces-for-sensitive-information/).\n\n### Features\n#### Secrets Detection\n<img src=\"/images/slack_watchman_finding.png\" width=\"500\">\n\nSlack Watchman looks for:\n\n- API Keys, Tokens & Service Accounts\n  - AWS, Azure, GCP, Google API, Slack (keys & webhooks), Twitter, Facebook, GitHub and more\n  - Generic Private keys\n  - Access Tokens, Bearer Tokens, Client Secrets, Private Tokens\n- Files\n    - Certificate files\n    - Potentially interesting/malicious/sensitive files (.docm, .xlsm, .zip etc.)\n    - Executable files\n    - Keychain files\n    - Config files for popular services (Terraform, Jenkins, OpenVPN and more)\n- Personal Data\n    - Leaked passwords\n    - Passport numbers, Dates of birth, Social security numbers, National insurance numbers and more\n- Financial data\n    - Paypal Braintree tokens, Bank card details, IBAN numbers, CUSIP numbers and more\n\n#### Time based searching\nYou can run Slack Watchman to look for results going back as far as:\n- 24 hours\n- 7 days\n- 30 days\n- All time\n\n#### Enumeration\n<img src=\"/images/slack_watchman_enumeration.png\" width=\"500\">\n\nIt also enumerates the following:\n- User data\n    - All users & all admins\n- Conversation data\n    - All conversations, including externally shared conversations\n    - All conversations that include a Slack Canvas (which often contain sensitive or important information)\n- Workspace authentication options\n\n\nThis means after one deep scan, you can schedule Slack Watchman to run regularly and only return results from your chosen timeframe.\n\n#### Unauthenticated Probe\n<img src=\"/images/slack_watchman_probe.png\" width=\"500\">\n\nYou can run Slack Watchman in unauthenticated probe mode to enumerate authentication options and other information on a Workspace. This doesn't need a token, and returns:\n\n- Workspace name\n- Workspace ID\n- Approved domains (which can create accounts)\n- OAuth providers\n- SSO auth status\n- Two-factor requirements\n\nTo run this mode use Slack Watchman with the `--probe` flag and the workspace domain to probe:\n\n```commandline\nslack-watchman --probe https://domain.slack.com\n```\n\n### Signatures\nSlack Watchman uses custom YAML signatures to detect matches in Slack. These signatures are pulled from the central [Watchman Signatures repository](https://github.com/PaperMtn/watchman-signatures). Slack Watchman automatically updates its signature base at runtime to ensure its using the latest signatures to detect secrets.\n\n#### Suppressing Signatures\nYou can define signatures that you want to disable when running Slack Watchman by adding their IDs to the `disabled_signatures` section of the `watchman.conf` file. For example:\n\n```yaml\nslack_watchman:\n  token: ...\n  cookie: ...\n  url: ...\n  disabled_signatures:\n    - tokens_generic_bearer_tokens\n    - tokens_generic_access_tokens\n```\n\nYou can find the ID of a signature in the individual YAML files in [Watchman Signatures repository](https://github.com/PaperMtn/watchman-signatures).\n\n### Logging\n\nSlack Watchman gives the following logging options:\n- Terminal-friendly Stdout\n- JSON to Stdout\n\nSlack Watchman defaults to terminal-friendly stdout logging if no option is given. This is designed to be easier for humans to read.\n\nJSON logging is also available, which is perfect for ingesting into a SIEM or other log analysis platforms.\n\nJSON formatted logging can be easily redirected to a file as below:\n```commandline\nslack-watchman --timeframe a --all --output json >> slack_watchman_log.json \n```\n\n## Authentication Requirements\n### Slack API token\nTo run Slack Watchman, you will need a Slack API OAuth access token. You can do this by creating a simple [Slack App](https://api.slack.com/apps).\n\nThe app needs to have the following **User Token Scopes** added:\n```\nchannels:read\nfiles:read\ngroups:read\nim:read\nlinks:read\nmpim:read\nremote_files:read\nsearch:read\nteam:read\nusers:read\nusers:read.email\n```\n**Note**: User tokens act on behalf of the user who authorises them, so I would suggest you create this app and authorise it using a service account, otherwise the app will have access to your private conversations and chats.\n\n#### App Manifest\nSlack apps can be created from JSON manifests which define the details of the application and the scopes to approve. The app manifest for Slack Watchman can be found in [docs/app_manifest.json](/docs/app_manifest.json), you can use this to speed up creating your Slack app.\n\n### Cookie Authentication\nAlternatively, Slack Watchman can also authenticate to Slack using a user `d` cookie, which is stored in the browser of each user logged into a workspace.\n\nTo use cookie authentication, you will need to provide the `d` cookie, and the URL of the target workspace. Then you will need to use the `--cookie` flag when running Slack Watchman\n\nMore information on cookie authentication can be found [on my blog](https://papermtn.co.uk/category/tools/slack-watchman/)\n#### Providing tokens\nSlack Watchman will first try to get the Slack token (plus the cookie token and URL if selected) from the environment variables \n- `SLACK_WATCHMAN_TOKEN`\n- `SLACK_WATCHMAN_COOKIE`\n- `SLACK_WATCHMAN_URL`\n\nIf this fails it will try to load the token(s) from `.conf` file (see below).\n\n#### watchman.conf file\nConfiguration options can be passed in a file named `watchman.conf` which must be stored in your home directory. The file should follow the YAML format, and should look like below:\n```yaml\nslack_watchman:\n  token: xoxp-xxxxxxxx\n  cookie: xoxd-%2xxxxx\n  url: https://xxxxx.slack.com\n  disabled_signatures:\n    - tokens_generic_bearer_tokens\n    - tokens_generic_access_tokens\n```\nSlack Watchman will look for this file at runtime, and use the configuration options from here. If you are not using cookie auth, leave `cookie` and `url` blank.\n\nIf you are having issues with your .conf file, run it through a YAML linter.\n\nAn example file is in `docs/example.conf`\n\n**Note**: Cookie and URL values are optional, and not required if not using cookie authentication.\n\n## Installation\nYou can install the latest stable version via pip:\n\n```commandline\npython3 -m pip install slack-watchman\n```\n\nOr build from source yourself:\n\nDownload the release source files, then from the top level repository run:\n```commandline\npython3 -m pip build\npython3 -m pip install --force-reinstall dist/*.whl\n```\n\n## Docker Image\n\nSlack Watchman is also available from the Docker hub as a Docker image:\n\n`docker pull papermountain/slack-watchman:latest`\n\nYou can then run Slack Watchman in a container, making sure you pass the required environment variables:\n\n```commandline\n// help\ndocker run --rm papermountain/slack-watchman -h\n\n// scan all\ndocker run --rm -e SLACK_WATCHMAN_TOKEN=xoxp... papermountain/slack-watchman --timeframe a --all --output json\ndocker run --rm --env-file .env papermountain/slack-watchman --timeframe a --all --output stdout\n```\n\n## Usage\nSlack Watchman will be installed as a global command, use as follows:\n```commandline\nusage: slack-watchman [-h] [--timeframe {d,w,m,a}] [--output {json,stdout}] [--version] [--all] [--users] [--channels] [--pii] [--secrets] [--debug] [--verbose] [--cookie] [--probe PROBE_DOMAIN]\n\nMonitoring and enumerating Slack for exposed secrets\n\noptions:\n  -h, --help            show this help message and exit\n  --timeframe {d,w,m,a}, -t {d,w,m,a}\n                        How far back to search: d = 24 hours w = 7 days, m = 30 days, a = all time\n  --output {json,stdout}, -o {json,stdout}\n                        Where to send results\n  --version, -v         show program's version number and exit\n  --all, -a             Find secrets and PII\n  --users, -u           Enumerate users and output them to .csv in the current working directory\n  --channels, -c        Enumerate channels and output them to .csv in the current working directory\n  --pii, -p             Find personal data: DOB, passport details, drivers licence, ITIN, SSN etc.\n  --secrets, -s         Find exposed secrets: credentials, tokens etc.\n  --debug, -d           Turn on debug level logging\n  --verbose, -V         Turn on more verbose output for JSON logging. This includes more fields, but is larger\n  --cookie              Use cookie auth using Slack d cookie. REQUIRES either SLACK_WATCHMAN_COOKIE and SLACK_WATCHMAN_URL environment variables set, or both values set in watchman.conf\n  --probe PROBE_DOMAIN  Perform an un-authenticated probe on a workspace for available authentication options and other information. Enter workspace domain to probe\n  ```\n\nYou can run Slack Watchman to look for everything, and output to default stdout:\n\n```commandline\nslack-watchman --timeframe a --all\n```\n\n## Other Watchman apps\nYou may be interested in the other apps in the Watchman family:\n- [Slack Watchman for Enterprise Grid](https://github.com/PaperMtn/slack-watchman-enterprise-grid)\n- [GitLab Watchman](https://github.com/PaperMtn/gitlab-watchman)\n- [GitHub Watchman](https://github.com/PaperMtn/github-watchman)\n\n## License\nThe source code for this project is released under the [GNU General Public Licence](https://www.gnu.org/licenses/licenses.html#GPL). This project is not associated with Slack Technologies or Salesforce.",
    "bugtrack_url": null,
    "license": "GPL-3.0",
    "summary": "Monitoring and enumerating Slack for exposed secrets",
    "version": "4.4.0",
    "project_urls": {
        "Blog": "https://papermtn.co.uk/category/tools/slack-watchman/",
        "Homepage": "https://github.com/PaperMtn/slack-watchman",
        "Repository": "https://github.com/PaperMtn/slack-watchman"
    },
    "split_keywords": [
        "audit",
        " slack",
        " slack-watchman",
        " watchman",
        " blue-team",
        " red-team",
        " threat-hunting"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "9337dee7021692bbd3a966a952b8349ec14b4b2dbc7c2008016a3ad6456bc69f",
                "md5": "9582c28b3af81cfd69945d351cb7c8df",
                "sha256": "7aab6490f2c7c75de79649ba3cf6794996bb5c4b99b92b09806829cd050306d2"
            },
            "downloads": -1,
            "filename": "slack_watchman-4.4.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "9582c28b3af81cfd69945d351cb7c8df",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.10",
            "size": 40977,
            "upload_time": "2024-11-20T21:11:05",
            "upload_time_iso_8601": "2024-11-20T21:11:05.575107Z",
            "url": "https://files.pythonhosted.org/packages/93/37/dee7021692bbd3a966a952b8349ec14b4b2dbc7c2008016a3ad6456bc69f/slack_watchman-4.4.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "3f4bd606e6e1bf5b5b583f20498921e3063e26b7034c6c2d9a3c5d20d93986c8",
                "md5": "9636ee8aade9cfcb87380be120f4ec64",
                "sha256": "758e9ef90aa498c3fa657a738cfc03c1658cb15c4674c5a868fa2354aeabe75c"
            },
            "downloads": -1,
            "filename": "slack_watchman-4.4.0.tar.gz",
            "has_sig": false,
            "md5_digest": "9636ee8aade9cfcb87380be120f4ec64",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.10",
            "size": 37905,
            "upload_time": "2024-11-20T21:11:07",
            "upload_time_iso_8601": "2024-11-20T21:11:07.197536Z",
            "url": "https://files.pythonhosted.org/packages/3f/4b/d606e6e1bf5b5b583f20498921e3063e26b7034c6c2d9a3c5d20d93986c8/slack_watchman-4.4.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-11-20 21:11:07",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "PaperMtn",
    "github_project": "slack-watchman",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "slack-watchman"
}
        
Elapsed time: 0.45338s