Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

[new tool announcement] host-extract
From: YGN Ethical Hacker Group <lists () yehg net>
Date: Mon, 14 Mar 2011 00:46:18 +0800

Host-Extract | Host/IP Pattern Extractor
===============================

category: /pentest/enumeration/www
useful area: blackbox testing


This little ruby script tries to extract all IP/Host patterns in page
response of a given URL and JavaScript/CSS files of that URL.

With it, you can quickly identify internal IPs/Hostnames, development
IPs/ports, cdn, load balancers, additional attack entries related to
your target that are revealed in inline js, css, html comment areas
and js/css files.

This is unlike web crawler which looks for new links only in anchor
tags (<a) or the like.

In some cases, host-extract may give you false positives when there
are some words like - main-site_ver_10.2.1.3.swf.

With -v option, you can ask the tool to output html view-source
snippets for each IP/Domain extracted. This will shorten your manual
analysis time.

Please go to http://host-extract.googlecode.com/ for more info.


Download/Update
==============
svn co http://host-extract.googlecode.com/svn/trunk/ host-extract


Tutorial Wiki
==========

Sebastien Damaye from aldeid.com has prepared a thorough host-extract
tutorial with real-world famous web sites.

http://aldeid.com/index.php/Host-extract


Bugs/Suggestions Report
===================

Please report bugs/suggestions to host-extract at yehg.net.
Thanks for your contribution.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
  • [new tool announcement] host-extract YGN Ethical Hacker Group (Mar 13)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]