2012-12-14 06:52:31 +04:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
"""
|
|
|
|
Copyright (c) 2006-2012 sqlmap developers (http://sqlmap.org/)
|
|
|
|
See the file 'doc/COPYING' for copying permission
|
|
|
|
"""
|
|
|
|
|
2012-12-15 02:00:42 +04:00
|
|
|
import json
|
2012-12-20 18:35:02 +04:00
|
|
|
import logging
|
2012-12-14 06:52:31 +04:00
|
|
|
import os
|
2012-12-15 02:00:42 +04:00
|
|
|
import shutil
|
2012-12-14 16:01:13 +04:00
|
|
|
import sys
|
2012-12-20 18:35:02 +04:00
|
|
|
import StringIO
|
2012-12-14 19:52:35 +04:00
|
|
|
import tempfile
|
2012-12-14 17:40:25 +04:00
|
|
|
import threading
|
2012-12-20 18:35:02 +04:00
|
|
|
import types
|
2012-12-14 16:04:44 +04:00
|
|
|
|
2012-12-20 21:56:53 +04:00
|
|
|
_multiprocessing = None
|
|
|
|
try:
|
|
|
|
import multiprocessing
|
|
|
|
|
|
|
|
# problems on FreeBSD (Reference: http://www.eggheadcafe.com/microsoft/Python/35880259/multiprocessing-on-freebsd.aspx)
|
|
|
|
_ = multiprocessing.Queue()
|
|
|
|
except (ImportError, OSError):
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
_multiprocessing = multiprocessing
|
|
|
|
|
2012-12-21 13:18:30 +04:00
|
|
|
from thirdparty.bottle.bottle import abort
|
|
|
|
from thirdparty.bottle.bottle import error
|
|
|
|
from thirdparty.bottle.bottle import get
|
|
|
|
from thirdparty.bottle.bottle import hook
|
|
|
|
from thirdparty.bottle.bottle import post
|
|
|
|
from thirdparty.bottle.bottle import request
|
|
|
|
from thirdparty.bottle.bottle import response
|
|
|
|
from thirdparty.bottle.bottle import run
|
|
|
|
from thirdparty.bottle.bottle import static_file
|
|
|
|
from thirdparty.bottle.bottle import template
|
2012-12-14 16:04:44 +04:00
|
|
|
from lib.controller.controller import start
|
2012-12-20 20:53:43 +04:00
|
|
|
from lib.core.common import unArrayizeValue
|
2012-12-14 16:04:44 +04:00
|
|
|
from lib.core.convert import hexencode
|
2012-12-20 18:35:02 +04:00
|
|
|
from lib.core.convert import stdoutencode
|
2012-12-14 16:15:04 +04:00
|
|
|
from lib.core.data import paths
|
2012-12-14 16:04:44 +04:00
|
|
|
from lib.core.datatype import AttribDict
|
|
|
|
from lib.core.data import kb
|
|
|
|
from lib.core.data import logger
|
2012-12-20 20:53:43 +04:00
|
|
|
from lib.core.defaults import _defaults
|
2012-12-20 18:35:02 +04:00
|
|
|
from lib.core.log import FORMATTER
|
|
|
|
from lib.core.log import LOGGER_HANDLER
|
2012-12-15 04:12:22 +04:00
|
|
|
from lib.core.log import LOGGER_OUTPUT
|
2012-12-14 16:04:44 +04:00
|
|
|
from lib.core.exception import SqlmapMissingDependence
|
2012-12-20 20:53:43 +04:00
|
|
|
from lib.core.optiondict import optDict
|
2012-12-14 16:04:44 +04:00
|
|
|
from lib.core.option import init
|
|
|
|
from lib.core.settings import UNICODE_ENCODING
|
2012-12-20 18:35:02 +04:00
|
|
|
|
|
|
|
RESTAPI_SERVER_HOST = "127.0.0.1"
|
|
|
|
RESTAPI_SERVER_PORT = 8775
|
2012-12-14 06:52:31 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
# Local global variables
|
|
|
|
adminid = ""
|
2012-12-15 02:00:42 +04:00
|
|
|
tasks = AttribDict()
|
2012-12-14 06:52:31 +04:00
|
|
|
|
|
|
|
# Generic functions
|
|
|
|
def jsonize(data):
|
2012-12-15 02:00:42 +04:00
|
|
|
return json.dumps(data, sort_keys=False, indent=4)
|
2012-12-14 06:52:31 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
def is_admin(taskid):
|
|
|
|
global adminid
|
|
|
|
if adminid != taskid:
|
2012-12-14 06:52:31 +04:00
|
|
|
return False
|
|
|
|
else:
|
|
|
|
return True
|
|
|
|
|
2012-12-20 20:53:43 +04:00
|
|
|
def init_options():
|
2012-12-20 21:05:44 +04:00
|
|
|
dataype = {"boolean": False, "string": None, "integer": None, "float": None}
|
2012-12-20 20:53:43 +04:00
|
|
|
options = AttribDict()
|
|
|
|
|
|
|
|
for _ in optDict:
|
|
|
|
for name, type_ in optDict[_].items():
|
|
|
|
type_ = unArrayizeValue(type_)
|
|
|
|
options[name] = _defaults.get(name, dataype[type_])
|
|
|
|
|
|
|
|
# Enforce batch mode and disable coloring
|
|
|
|
options.batch = True
|
|
|
|
options.disableColoring = True
|
|
|
|
|
|
|
|
return options
|
|
|
|
|
2012-12-20 21:56:53 +04:00
|
|
|
def start_scan():
|
|
|
|
# Wrap logger stdout onto a custom file descriptor (LOGGER_OUTPUT)
|
|
|
|
def emit(self, record):
|
|
|
|
message = stdoutencode(FORMATTER.format(record))
|
|
|
|
print >>LOGGER_OUTPUT, message.strip('\r')
|
|
|
|
|
|
|
|
LOGGER_HANDLER.emit = types.MethodType(emit, LOGGER_HANDLER, type(LOGGER_HANDLER))
|
|
|
|
|
|
|
|
# Wrap standard output onto a custom file descriptor
|
|
|
|
sys.stdout = open(str(os.getpid()) + ".out", "wb")
|
|
|
|
#sys.stderr = StringIO.StringIO()
|
|
|
|
|
|
|
|
taskid = multiprocessing.current_process().name
|
|
|
|
init(tasks[taskid], True)
|
|
|
|
start()
|
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
@hook("after_request")
|
2012-12-14 16:15:04 +04:00
|
|
|
def security_headers():
|
|
|
|
"""
|
|
|
|
Set some headers across all HTTP responses
|
|
|
|
"""
|
|
|
|
response.headers["Server"] = "Server"
|
2012-12-14 17:40:25 +04:00
|
|
|
response.headers["X-Content-Type-Options"] = "nosniff"
|
|
|
|
response.headers["X-Frame-Options"] = "DENY"
|
2012-12-14 16:15:04 +04:00
|
|
|
response.headers["X-XSS-Protection"] = "1; mode=block"
|
2012-12-14 17:40:25 +04:00
|
|
|
response.headers["Pragma"] = "no-cache"
|
|
|
|
response.headers["Cache-Control"] = "no-cache"
|
|
|
|
response.headers["Expires"] = "0"
|
|
|
|
response.content_type = "application/json; charset=UTF-8"
|
2012-12-14 16:15:04 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
##############################
|
|
|
|
# HTTP Status Code functions #
|
|
|
|
##############################
|
2012-12-14 16:15:04 +04:00
|
|
|
|
2012-12-14 06:52:31 +04:00
|
|
|
@error(401) # Access Denied
|
2012-12-14 17:40:25 +04:00
|
|
|
def error401(error=None):
|
2012-12-14 06:52:31 +04:00
|
|
|
return "Access denied"
|
|
|
|
|
|
|
|
@error(404) # Not Found
|
2012-12-14 17:40:25 +04:00
|
|
|
def error404(error=None):
|
2012-12-14 06:52:31 +04:00
|
|
|
return "Nothing here"
|
|
|
|
|
|
|
|
@error(405) # Method Not Allowed (e.g. when requesting a POST method via GET)
|
2012-12-14 17:40:25 +04:00
|
|
|
def error405(error=None):
|
2012-12-14 06:52:31 +04:00
|
|
|
return "Method not allowed"
|
|
|
|
|
2012-12-14 06:54:16 +04:00
|
|
|
@error(500) # Internal Server Error
|
2012-12-14 17:40:25 +04:00
|
|
|
def error500(error=None):
|
2012-12-14 06:52:31 +04:00
|
|
|
return "Internal server error"
|
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
#############################
|
|
|
|
# Task management functions #
|
|
|
|
#############################
|
2012-12-14 06:52:31 +04:00
|
|
|
|
|
|
|
# Users' methods
|
2012-12-14 17:40:25 +04:00
|
|
|
@get("/task/new")
|
|
|
|
def task_new():
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
Create new task ID
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
global tasks
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
taskid = hexencode(os.urandom(16))
|
2012-12-20 20:53:43 +04:00
|
|
|
tasks[taskid] = init_options()
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
return jsonize({"taskid": taskid})
|
2012-12-14 06:52:31 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
@get("/task/<taskid>/destroy")
|
|
|
|
def task_destroy(taskid):
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
Destroy own task ID
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 22:13:21 +04:00
|
|
|
if taskid in tasks and not is_admin(taskid):
|
|
|
|
tasks.pop(taskid)
|
2012-12-14 16:15:04 +04:00
|
|
|
return jsonize({"success": True})
|
2012-12-14 06:52:31 +04:00
|
|
|
else:
|
2012-12-14 17:40:25 +04:00
|
|
|
abort(500, "Invalid task ID")
|
2012-12-14 06:52:31 +04:00
|
|
|
|
|
|
|
# Admin's methods
|
2012-12-14 17:40:25 +04:00
|
|
|
@get("/task/<taskid>/list")
|
|
|
|
def task_list(taskid):
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
List all active tasks
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
if is_admin(taskid):
|
|
|
|
return jsonize({"tasks": tasks})
|
2012-12-14 06:52:31 +04:00
|
|
|
else:
|
|
|
|
abort(401)
|
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
@get("/task/<taskid>/flush")
|
|
|
|
def task_flush(taskid):
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
Flush task spool (destroy all tasks except admin)
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
global adminid
|
2012-12-14 17:40:25 +04:00
|
|
|
global tasks
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
if is_admin(taskid):
|
2012-12-15 02:00:42 +04:00
|
|
|
admin_task = tasks[adminid]
|
|
|
|
tasks = AttribDict()
|
|
|
|
tasks[adminid] = admin_task
|
|
|
|
|
2012-12-14 16:15:04 +04:00
|
|
|
return jsonize({"success": True})
|
2012-12-14 06:52:31 +04:00
|
|
|
else:
|
|
|
|
abort(401)
|
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
##################################
|
|
|
|
# sqlmap core interact functions #
|
|
|
|
##################################
|
2012-12-14 18:51:01 +04:00
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
# Admin's methods
|
2012-12-14 20:18:45 +04:00
|
|
|
@get("/status/<taskid>")
|
|
|
|
def status(taskid):
|
|
|
|
"""
|
|
|
|
Verify the status of the API as well as the core
|
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 20:18:45 +04:00
|
|
|
if is_admin(taskid):
|
|
|
|
busy = kb.get("busyFlag")
|
|
|
|
tasks_num = len(tasks)
|
|
|
|
return jsonize({"busy": busy, "tasks": tasks_num})
|
|
|
|
else:
|
|
|
|
abort(401)
|
|
|
|
|
|
|
|
@get("/cleanup/<taskid>")
|
|
|
|
def cleanup(taskid):
|
|
|
|
"""
|
|
|
|
Destroy all sessions except admin ID and all output directories
|
|
|
|
"""
|
|
|
|
global tasks
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 20:18:45 +04:00
|
|
|
if is_admin(taskid):
|
2012-12-15 04:12:22 +04:00
|
|
|
for task, options in tasks.items():
|
|
|
|
if "oDir" in options and options.oDir is not None:
|
|
|
|
shutil.rmtree(options.oDir)
|
2012-12-15 02:00:42 +04:00
|
|
|
|
|
|
|
admin_task = tasks[adminid]
|
|
|
|
tasks = AttribDict()
|
|
|
|
tasks[adminid] = admin_task
|
|
|
|
|
2012-12-14 20:18:45 +04:00
|
|
|
return jsonize({"success": True})
|
|
|
|
else:
|
|
|
|
abort(401)
|
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
# Functions to handle options
|
2012-12-14 18:51:01 +04:00
|
|
|
@get("/option/<taskid>/list")
|
|
|
|
def option_list(taskid):
|
|
|
|
"""
|
|
|
|
List options for a certain task ID
|
|
|
|
"""
|
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
return jsonize(tasks[taskid])
|
2012-12-14 18:51:01 +04:00
|
|
|
|
|
|
|
@post("/option/<taskid>/get")
|
|
|
|
def option_get(taskid):
|
|
|
|
"""
|
|
|
|
Get the value of an option (command line switch) for a certain task ID
|
|
|
|
"""
|
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
|
|
|
option = request.json.get("option", "")
|
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
if option in tasks[taskid]:
|
|
|
|
return jsonize({option: tasks[taskid][option]})
|
2012-12-14 18:51:01 +04:00
|
|
|
else:
|
|
|
|
return jsonize({option: None})
|
|
|
|
|
|
|
|
@post("/option/<taskid>/set")
|
|
|
|
def option_set(taskid):
|
|
|
|
"""
|
|
|
|
Set an option (command line switch) for a certain task ID
|
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
global tasks
|
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
|
|
|
for key, value in request.json.items():
|
2012-12-15 04:12:22 +04:00
|
|
|
tasks[taskid][key] = value
|
2012-12-14 18:51:01 +04:00
|
|
|
|
|
|
|
return jsonize({"success": True})
|
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
# Function to handle scans
|
2012-12-14 19:52:35 +04:00
|
|
|
@post("/scan/<taskid>/start")
|
2012-12-15 04:29:35 +04:00
|
|
|
def scan_start(taskid):
|
2012-12-14 17:40:25 +04:00
|
|
|
"""
|
2012-12-14 18:51:01 +04:00
|
|
|
Launch a scan
|
2012-12-14 17:40:25 +04:00
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
global tasks
|
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
2012-12-14 06:52:31 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
# Initialize sqlmap engine's options with user's provided options
|
|
|
|
# within the JSON request
|
|
|
|
for key, value in request.json.items():
|
2012-12-15 04:12:22 +04:00
|
|
|
tasks[taskid][key] = value
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
# Overwrite output directory (oDir) value to a temporary directory
|
|
|
|
tasks[taskid].oDir = tempfile.mkdtemp(prefix="sqlmap-")
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
# Launch sqlmap engine in a separate thread
|
2012-12-20 21:56:53 +04:00
|
|
|
logger.debug("starting a scan for task ID %s" % taskid)
|
|
|
|
|
|
|
|
if _multiprocessing:
|
|
|
|
#_multiprocessing.log_to_stderr(logging.DEBUG)
|
|
|
|
p = _multiprocessing.Process(name=taskid, target=start_scan)
|
|
|
|
p.daemon = True
|
|
|
|
p.start()
|
|
|
|
p.join()
|
2012-12-14 17:40:25 +04:00
|
|
|
|
|
|
|
return jsonize({"success": True})
|
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
@get("/scan/<taskid>/output")
|
|
|
|
def scan_output(taskid):
|
|
|
|
"""
|
|
|
|
Read the standard output of sqlmap core execution
|
|
|
|
"""
|
2012-12-14 22:13:21 +04:00
|
|
|
global tasks
|
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
sys.stdout.seek(0)
|
|
|
|
output = sys.stdout.read()
|
|
|
|
sys.stdout.flush()
|
2012-12-14 19:52:35 +04:00
|
|
|
sys.stdout.truncate(0)
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
return jsonize({"output": output})
|
2012-12-14 18:51:01 +04:00
|
|
|
|
2012-12-15 02:00:42 +04:00
|
|
|
@get("/scan/<taskid>/delete")
|
|
|
|
def scan_delete(taskid):
|
|
|
|
"""
|
|
|
|
Delete a scan and corresponding temporary output directory
|
|
|
|
"""
|
|
|
|
global tasks
|
|
|
|
|
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
if "oDir" in tasks[taskid] and tasks[taskid].oDir is not None:
|
|
|
|
shutil.rmtree(tasks[taskid].oDir)
|
2012-12-15 02:00:42 +04:00
|
|
|
|
|
|
|
return jsonize({"success": True})
|
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
# Function to handle scans' logs
|
2012-12-15 04:12:22 +04:00
|
|
|
@get("/scan/<taskid>/log")
|
|
|
|
def scan_log(taskid):
|
2012-12-14 21:21:19 +04:00
|
|
|
"""
|
2012-12-17 15:28:03 +04:00
|
|
|
Retrieve the log messages
|
2012-12-14 21:21:19 +04:00
|
|
|
"""
|
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
LOGGER_OUTPUT.seek(0)
|
|
|
|
output = LOGGER_OUTPUT.read()
|
|
|
|
LOGGER_OUTPUT.flush()
|
|
|
|
LOGGER_OUTPUT.truncate(0)
|
|
|
|
|
|
|
|
return jsonize({"log": output})
|
2012-12-14 21:21:19 +04:00
|
|
|
|
|
|
|
# Function to handle files inside the output directory
|
2012-12-14 19:52:35 +04:00
|
|
|
@get("/download/<taskid>/<target>/<filename:path>")
|
2012-12-14 17:40:25 +04:00
|
|
|
def download(taskid, target, filename):
|
2012-12-14 16:01:13 +04:00
|
|
|
"""
|
|
|
|
Download a certain file from the file system
|
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2012-12-14 20:18:45 +04:00
|
|
|
# Prevent file path traversal - the lame way
|
|
|
|
if target.startswith("."):
|
|
|
|
abort(500)
|
|
|
|
|
2012-12-14 16:01:13 +04:00
|
|
|
path = os.path.join(paths.SQLMAP_OUTPUT_PATH, target)
|
|
|
|
if os.path.exists(path):
|
|
|
|
return static_file(filename, root=path)
|
|
|
|
else:
|
|
|
|
abort(500)
|
|
|
|
|
2012-12-20 19:29:23 +04:00
|
|
|
def server(host="0.0.0.0", port=RESTAPI_SERVER_PORT):
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-20 18:35:02 +04:00
|
|
|
REST-JSON API server
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
global adminid
|
|
|
|
global tasks
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
adminid = hexencode(os.urandom(16))
|
2012-12-20 20:53:43 +04:00
|
|
|
tasks[adminid] = init_options()
|
2012-12-15 04:12:22 +04:00
|
|
|
|
|
|
|
logger.info("running REST-JSON API server at '%s:%d'.." % (host, port))
|
|
|
|
logger.info("the admin task ID is: %s" % adminid)
|
2012-12-14 18:51:01 +04:00
|
|
|
|
2012-12-20 18:35:02 +04:00
|
|
|
# Run RESTful API
|
2012-12-14 22:13:21 +04:00
|
|
|
run(host=host, port=port, quiet=False, debug=False)
|
2012-12-14 06:52:31 +04:00
|
|
|
|
2012-12-20 18:35:02 +04:00
|
|
|
def client(host=RESTAPI_SERVER_HOST, port=RESTAPI_SERVER_PORT):
|
2012-12-15 04:29:35 +04:00
|
|
|
"""
|
|
|
|
REST-JSON API client
|
|
|
|
"""
|
2012-12-14 16:01:13 +04:00
|
|
|
addr = "http://%s:%d" % (host, port)
|
2012-12-20 18:35:02 +04:00
|
|
|
logger.info("starting debug REST-JSON client to '%s'..." % addr)
|
2012-12-14 16:01:13 +04:00
|
|
|
|
2012-12-20 18:35:02 +04:00
|
|
|
# TODO: write a simple client with requests, for now use curl from command line
|
|
|
|
logger.error("not yet implemented, use curl from command line instead for now, for example:")
|
|
|
|
print "\n\t$ curl http://%s:%d/task/new" % (host, port)
|
|
|
|
print "\t$ curl -H \"Content-Type: application/json\" -X POST -d '{\"url\": \"http://testphp.vulnweb.com/artists.php?artist=1\"}' http://%s:%d/scan/:taskid/start" % (host, port)
|
|
|
|
print "\t$ curl http://%s:%d/scan/:taskid/output" % (host, port)
|
|
|
|
print "\t$ curl http://%s:%d/scan/:taskid/log\n" % (host, port)
|