PURPOSE:
To automate the task of scanning a network to find all the http servers on the network. Then having to manually take the results of the scan and then browse to the page to see if there is anything of interest on the site.
The program relies on nmap, wget, and grep to achieve the results. The results are placed into an HTML file that can be used to click on the items of interest.
The IP Adress is feed directly to nmap so it can be in any format that nmap will accept 127.0.0.1-255, 127.0.0.1/16, scanme.nmap.org, etc.
Right after the IP Address, is where you can use one of three port range to scan. They are;
Setup the ports that you want to scan using the -p flag. So you can do it several different ways. -p80 will only scan ports 80, -p1-10000, will scan ports 1-10000.
The more ports you scan the better your chance of detecting something you did not know about, but it will take longer.
The other options impact how frequently and the number of seconds to try to connect to the website, the default is now 3 retries and to timeout after 120 seconds, this is the best coverage, but you can really speed things up by going to 1 retry and 15 seconds (on internal network)
And the last is where you want the results to be saved to. It will append the .html to the end of whatever you type here.
WISHLIST
Need to add code to display the first few words of the website to the output
Last edit: Joseph "Dan" Waggoner 2015-08-07
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
HTTPSearch
PURPOSE:
To automate the task of scanning a network to find all the http servers on the network. Then having to manually take the results of the scan and then browse to the page to see if there is anything of interest on the site.
The program relies on nmap, wget, and grep to achieve the results. The results are placed into an HTML file that can be used to click on the items of interest.
USAGE:
perl httpsearch.pl [Options] {target specfications} <output files=""></output>
The IP Adress is feed directly to nmap so it can be in any format that nmap will accept 127.0.0.1-255, 127.0.0.1/16, scanme.nmap.org, etc.
Right after the IP Address, is where you can use one of three port range to scan. They are;
Setup the ports that you want to scan using the -p flag. So you can do it several different ways. -p80 will only scan ports 80, -p1-10000, will scan ports 1-10000.
The more ports you scan the better your chance of detecting something you did not know about, but it will take longer.
The other options impact how frequently and the number of seconds to try to connect to the website, the default is now 3 retries and to timeout after 120 seconds, this is the best coverage, but you can really speed things up by going to 1 retry and 15 seconds (on internal network)
And the last is where you want the results to be saved to. It will append the .html to the end of whatever you type here.
WISHLIST
Need to add code to display the first few words of the website to the output
Last edit: Joseph "Dan" Waggoner 2015-08-07