Content-type: text/html
Manpage of Hackbot
Hackbot
Section: Scanning tools (1)
Updated: 2.14
Index
Return to Main Contents
NAME
Hackbot - Host exploration and bannergrab tool
SYNOPSIS
hackbot.pl [-OAitfmsSdrX[-P <proxy:port>][-a <NN>][-z <NN>][-w avociun]] [<host|ip|net|range>|-F <targetfile>]
DESCRIPTION
Hackbot is a vulnerability and bannergrabber meant as auditory tool for remote and local hosts. Hackbot requires PERL (http://www.perl.org), IO::Socket, Net::hostent and Getopt::Std which should come with your default PERL installation.
PLATFORMS
Hackbot should work on all UNIX platforms which have perl and the necessary modules installed. If you want to get it to work with Windows fix it yourself, I simply refuse to support it. Microsoft is evil and should be removed from this planet.
OPTIONS
-O log to output file.
-A All scan types.
-i Ident scan.
-t Telnet fingerprinting.
-f FTP scan, grabs FTP banner and checks for
anonymous user login.
-m MTA scan, grabs MTA banner and checks for
open relay, EXPN and VRFY.
-s SSH scan, grabs SSH banner.
-S Check target host with spamcop's database
-d DNS scan, grabs DNS version.
-r Registrar whois lookup.
-P Scan via proxy
-w Webserver scan, various options, see the
WEBSERVER OPTIONS section below.
-z NN Set time in seconds between each CGI poll (to be less conspicuous).
-a NN Set alternative webserver port
-X X allow check
-F Reads hostnames or IP's from a targetfile.
WEBSERVER OPTIONS
Webserver scan types:
a All webserver scans.
v Check webserver version.
o Check for webserver PUBLIC and ALLOW options.
c CGI scan, scans for commonly exploitable CGI's
i IDA, IDC, IDQ scan, scans for path revealing NT
problems.
u Unicode scan, scans for NT unicode vulnerabilities.
n Nimda scan, scans for eml files in website html
source, works best combined with -c option.
SCANOUTPUT
The output of the scan is placed in host.output files or, when the -O option
is used, it is placed in the given output file
SCANOUTPUT EXAMPLE
127.0.0.1.output
www.yourdomain.name.output
or, when -O option is defined, output is placed in the given output file.
EXAMPLES
FTP, MTA and webserver options, CGI and IDA scan
$ hackbot.pl -f -m -w oci localhost
ALL scans
$ hackbot.pl -A localhost
or from a file
$ hackbot.pl -A -F file_with_hosts
or with ranges and output file
$ hackbot.pl -O logfile -A 192.168.1.1 192.168.1.255
or with CIDR's
$ hackbot.pl -A 192.168.1.0/24
NOTE: CIDR masks < /24 are currently unsupported.
AUTHORS
Marco van Berkum - m.v.berkum@obit.nl
Kristian Vlaardingerbroek - kris@obit.nl
Raymond Vrolijk - raymond.vrolijk@veronica.nl
Pepijn Vissers - zoef@zoefdehaas.nl
Martijn Mooijman - foobar@obit.nl
Herman Poortermans - herman@ofzo.nl
BUGS
All bugs can be reported to m.v.berkum@obit.nl, before reporting bugs please
refer to the KNOWN_BUGS file first.
LICENSE
Hackbot is freely distributable.
DISCLAIMER
The author of this program _CANNOT_ be held responsible for any illegal scanning activities initiated by an user or unauthorised party. This program is meant as tool to determine your OWN network security.
Any unauthorised probes with this program should be reported to local authorities and/or to the attacker himself. Complaints to my address regarding the unauthorised use of this program will be moved unseen to /dev/null.
Index
- NAME
-
- SYNOPSIS
-
- DESCRIPTION
-
- PLATFORMS
-
- OPTIONS
-
- WEBSERVER OPTIONS
-
- SCANOUTPUT
-
- SCANOUTPUT EXAMPLE
-
- EXAMPLES
-
- AUTHORS
-
- BUGS
-
- LICENSE
-
- DISCLAIMER
-
This document was created by
man2html,
using the manual pages.
Time: 22:53:26 GMT, October 18, 2002