Penetration Testing mailing list archives
[PEN-TEST] Easy Web Server Scanning
From: Raju Mathur <raju () linux-delhi org>
Date: Wed, 13 Dec 2000 08:01:28 +0530
Ah heck, here's one quick and dirty way to do it: for i in <put IP's you want to test here, without the `<>'> ; do perl -e 'use LWP::UserAgent;$a=new LWP::UserAgent;$r=HTTP::Request->new(HEAD=>"http://$ARGV[0]/");$r2=$a->request($r);print "HTTP Server on $ARGV[0] is: ",$r2->headers->server,"\n"' $i ; done Send Rs. 50/$1 to your favourite charity if you use this ``program'' ;-) Regards, -- Raju
"Mike" == Mike Ahern <mc_ahern () YAHOO COM> writes:
Mike> You will no doubt hear from many on the PEN TEST list about Mike> lots of easy ways to do this. Mike> Superscan provides this output (Server type) which can be Mike> quickly saved to a text file and extracted via grep/sed/awk. Mike> The resulting content can easily be used to audit web Mike> servers using "lynx -dump", etc., by creating files with the Mike> IP of target web servers and using a looping script (for i Mike> in `blah`, do, ...) echoing/redirecting the output to an Mike> outfile. Mike> Hope this is helpful. Mike> - mch -- Raju Mathur raju () kandalaya org http://kandalaya.org/
Current thread:
- [PEN-TEST] Easy Web Server Scanning Mike Ahern (Dec 13)
- [PEN-TEST] Easy Web Server Scanning Raju Mathur (Dec 13)