2012-12-14 06:52:31 +04:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
"""
|
|
|
|
Copyright (c) 2006-2012 sqlmap developers (http://sqlmap.org/)
|
|
|
|
See the file 'doc/COPYING' for copying permission
|
|
|
|
"""
|
|
|
|
|
|
|
|
import os
|
2012-12-15 02:00:42 +04:00
|
|
|
import shutil
|
2012-12-14 19:52:35 +04:00
|
|
|
import tempfile
|
2012-12-14 16:04:44 +04:00
|
|
|
|
2013-01-07 15:10:33 +04:00
|
|
|
from subprocess import PIPE
|
2012-12-20 21:56:53 +04:00
|
|
|
|
2012-12-20 20:53:43 +04:00
|
|
|
from lib.core.common import unArrayizeValue
|
2013-01-09 16:34:45 +04:00
|
|
|
from lib.core.convert import base64pickle
|
2013-01-10 02:09:50 +04:00
|
|
|
from lib.core.convert import base64unpickle
|
2012-12-14 16:04:44 +04:00
|
|
|
from lib.core.convert import hexencode
|
2013-01-10 02:09:50 +04:00
|
|
|
from lib.core.convert import jsonize
|
2012-12-14 16:15:04 +04:00
|
|
|
from lib.core.data import paths
|
2012-12-14 16:04:44 +04:00
|
|
|
from lib.core.data import logger
|
2013-01-10 02:09:50 +04:00
|
|
|
from lib.core.datatype import AttribDict
|
2012-12-20 20:53:43 +04:00
|
|
|
from lib.core.defaults import _defaults
|
|
|
|
from lib.core.optiondict import optDict
|
2013-01-10 04:01:28 +04:00
|
|
|
from lib.core.subprocessng import Popen as execute
|
|
|
|
from lib.core.subprocessng import send_all
|
|
|
|
from lib.core.subprocessng import recv_some
|
2012-12-22 03:34:37 +04:00
|
|
|
from thirdparty.bottle.bottle import abort
|
|
|
|
from thirdparty.bottle.bottle import error
|
|
|
|
from thirdparty.bottle.bottle import get
|
|
|
|
from thirdparty.bottle.bottle import hook
|
|
|
|
from thirdparty.bottle.bottle import post
|
|
|
|
from thirdparty.bottle.bottle import request
|
|
|
|
from thirdparty.bottle.bottle import response
|
|
|
|
from thirdparty.bottle.bottle import run
|
|
|
|
from thirdparty.bottle.bottle import static_file
|
2012-12-20 18:35:02 +04:00
|
|
|
|
|
|
|
RESTAPI_SERVER_HOST = "127.0.0.1"
|
|
|
|
RESTAPI_SERVER_PORT = 8775
|
2012-12-14 06:52:31 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
# Local global variables
|
|
|
|
adminid = ""
|
2013-01-10 02:09:50 +04:00
|
|
|
pipes = dict()
|
2013-01-09 16:34:45 +04:00
|
|
|
procs = dict()
|
2012-12-15 02:00:42 +04:00
|
|
|
tasks = AttribDict()
|
2012-12-14 06:52:31 +04:00
|
|
|
|
|
|
|
# Generic functions
|
2012-12-14 17:40:25 +04:00
|
|
|
def is_admin(taskid):
|
|
|
|
global adminid
|
|
|
|
if adminid != taskid:
|
2012-12-14 06:52:31 +04:00
|
|
|
return False
|
|
|
|
else:
|
|
|
|
return True
|
|
|
|
|
2012-12-20 20:53:43 +04:00
|
|
|
def init_options():
|
2012-12-20 21:05:44 +04:00
|
|
|
dataype = {"boolean": False, "string": None, "integer": None, "float": None}
|
2012-12-20 20:53:43 +04:00
|
|
|
options = AttribDict()
|
|
|
|
|
|
|
|
for _ in optDict:
|
|
|
|
for name, type_ in optDict[_].items():
|
|
|
|
type_ = unArrayizeValue(type_)
|
|
|
|
options[name] = _defaults.get(name, dataype[type_])
|
|
|
|
|
|
|
|
# Enforce batch mode and disable coloring
|
|
|
|
options.batch = True
|
|
|
|
options.disableColoring = True
|
|
|
|
|
|
|
|
return options
|
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
@hook("after_request")
|
2012-12-14 16:15:04 +04:00
|
|
|
def security_headers():
|
|
|
|
"""
|
|
|
|
Set some headers across all HTTP responses
|
|
|
|
"""
|
|
|
|
response.headers["Server"] = "Server"
|
2012-12-14 17:40:25 +04:00
|
|
|
response.headers["X-Content-Type-Options"] = "nosniff"
|
|
|
|
response.headers["X-Frame-Options"] = "DENY"
|
2012-12-14 16:15:04 +04:00
|
|
|
response.headers["X-XSS-Protection"] = "1; mode=block"
|
2012-12-14 17:40:25 +04:00
|
|
|
response.headers["Pragma"] = "no-cache"
|
|
|
|
response.headers["Cache-Control"] = "no-cache"
|
|
|
|
response.headers["Expires"] = "0"
|
|
|
|
response.content_type = "application/json; charset=UTF-8"
|
2012-12-14 16:15:04 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
##############################
|
|
|
|
# HTTP Status Code functions #
|
|
|
|
##############################
|
2012-12-14 16:15:04 +04:00
|
|
|
|
2013-01-10 16:18:44 +04:00
|
|
|
@error(401) # Access Denied
|
2012-12-14 17:40:25 +04:00
|
|
|
def error401(error=None):
|
2012-12-14 06:52:31 +04:00
|
|
|
return "Access denied"
|
|
|
|
|
2013-01-10 16:18:44 +04:00
|
|
|
@error(404) # Not Found
|
2012-12-14 17:40:25 +04:00
|
|
|
def error404(error=None):
|
2012-12-14 06:52:31 +04:00
|
|
|
return "Nothing here"
|
|
|
|
|
2013-01-10 16:18:44 +04:00
|
|
|
@error(405) # Method Not Allowed (e.g. when requesting a POST method via GET)
|
2012-12-14 17:40:25 +04:00
|
|
|
def error405(error=None):
|
2012-12-14 06:52:31 +04:00
|
|
|
return "Method not allowed"
|
|
|
|
|
2013-01-10 16:18:44 +04:00
|
|
|
@error(500) # Internal Server Error
|
2012-12-14 17:40:25 +04:00
|
|
|
def error500(error=None):
|
2012-12-14 06:52:31 +04:00
|
|
|
return "Internal server error"
|
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
#############################
|
|
|
|
# Task management functions #
|
|
|
|
#############################
|
2012-12-14 06:52:31 +04:00
|
|
|
|
|
|
|
# Users' methods
|
2012-12-14 17:40:25 +04:00
|
|
|
@get("/task/new")
|
|
|
|
def task_new():
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
Create new task ID
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
global tasks
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
taskid = hexencode(os.urandom(16))
|
2012-12-20 20:53:43 +04:00
|
|
|
tasks[taskid] = init_options()
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
return jsonize({"taskid": taskid})
|
2012-12-14 06:52:31 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
@get("/task/<taskid>/destroy")
|
|
|
|
def task_destroy(taskid):
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
Destroy own task ID
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 22:13:21 +04:00
|
|
|
if taskid in tasks and not is_admin(taskid):
|
|
|
|
tasks.pop(taskid)
|
2012-12-14 16:15:04 +04:00
|
|
|
return jsonize({"success": True})
|
2012-12-14 06:52:31 +04:00
|
|
|
else:
|
2012-12-14 17:40:25 +04:00
|
|
|
abort(500, "Invalid task ID")
|
2012-12-14 06:52:31 +04:00
|
|
|
|
|
|
|
# Admin's methods
|
2012-12-14 17:40:25 +04:00
|
|
|
@get("/task/<taskid>/list")
|
|
|
|
def task_list(taskid):
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
List all active tasks
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
if is_admin(taskid):
|
|
|
|
return jsonize({"tasks": tasks})
|
2012-12-14 06:52:31 +04:00
|
|
|
else:
|
|
|
|
abort(401)
|
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
@get("/task/<taskid>/flush")
|
|
|
|
def task_flush(taskid):
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
Flush task spool (destroy all tasks except admin)
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
global adminid
|
2012-12-14 17:40:25 +04:00
|
|
|
global tasks
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
if is_admin(taskid):
|
2012-12-15 02:00:42 +04:00
|
|
|
admin_task = tasks[adminid]
|
|
|
|
tasks = AttribDict()
|
|
|
|
tasks[adminid] = admin_task
|
|
|
|
|
2012-12-14 16:15:04 +04:00
|
|
|
return jsonize({"success": True})
|
2012-12-14 06:52:31 +04:00
|
|
|
else:
|
|
|
|
abort(401)
|
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
##################################
|
|
|
|
# sqlmap core interact functions #
|
|
|
|
##################################
|
2012-12-14 18:51:01 +04:00
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
# Admin's methods
|
2012-12-14 20:18:45 +04:00
|
|
|
@get("/status/<taskid>")
|
|
|
|
def status(taskid):
|
|
|
|
"""
|
|
|
|
Verify the status of the API as well as the core
|
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 20:18:45 +04:00
|
|
|
if is_admin(taskid):
|
|
|
|
tasks_num = len(tasks)
|
2013-01-07 15:10:33 +04:00
|
|
|
return jsonize({"tasks": tasks_num})
|
2012-12-14 20:18:45 +04:00
|
|
|
else:
|
|
|
|
abort(401)
|
|
|
|
|
|
|
|
@get("/cleanup/<taskid>")
|
|
|
|
def cleanup(taskid):
|
|
|
|
"""
|
|
|
|
Destroy all sessions except admin ID and all output directories
|
|
|
|
"""
|
|
|
|
global tasks
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 20:18:45 +04:00
|
|
|
if is_admin(taskid):
|
2012-12-15 04:12:22 +04:00
|
|
|
for task, options in tasks.items():
|
|
|
|
if "oDir" in options and options.oDir is not None:
|
|
|
|
shutil.rmtree(options.oDir)
|
2012-12-15 02:00:42 +04:00
|
|
|
|
|
|
|
admin_task = tasks[adminid]
|
|
|
|
tasks = AttribDict()
|
|
|
|
tasks[adminid] = admin_task
|
|
|
|
|
2012-12-14 20:18:45 +04:00
|
|
|
return jsonize({"success": True})
|
|
|
|
else:
|
|
|
|
abort(401)
|
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
# Functions to handle options
|
2012-12-14 18:51:01 +04:00
|
|
|
@get("/option/<taskid>/list")
|
|
|
|
def option_list(taskid):
|
|
|
|
"""
|
|
|
|
List options for a certain task ID
|
|
|
|
"""
|
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
return jsonize(tasks[taskid])
|
2012-12-14 18:51:01 +04:00
|
|
|
|
|
|
|
@post("/option/<taskid>/get")
|
|
|
|
def option_get(taskid):
|
|
|
|
"""
|
|
|
|
Get the value of an option (command line switch) for a certain task ID
|
|
|
|
"""
|
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
|
|
|
option = request.json.get("option", "")
|
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
if option in tasks[taskid]:
|
|
|
|
return jsonize({option: tasks[taskid][option]})
|
2012-12-14 18:51:01 +04:00
|
|
|
else:
|
|
|
|
return jsonize({option: None})
|
|
|
|
|
|
|
|
@post("/option/<taskid>/set")
|
|
|
|
def option_set(taskid):
|
|
|
|
"""
|
|
|
|
Set an option (command line switch) for a certain task ID
|
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
global tasks
|
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
|
|
|
for key, value in request.json.items():
|
2012-12-15 04:12:22 +04:00
|
|
|
tasks[taskid][key] = value
|
2012-12-14 18:51:01 +04:00
|
|
|
|
|
|
|
return jsonize({"success": True})
|
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
# Function to handle scans
|
2012-12-14 19:52:35 +04:00
|
|
|
@post("/scan/<taskid>/start")
|
2012-12-15 04:29:35 +04:00
|
|
|
def scan_start(taskid):
|
2012-12-14 17:40:25 +04:00
|
|
|
"""
|
2012-12-14 18:51:01 +04:00
|
|
|
Launch a scan
|
2012-12-14 17:40:25 +04:00
|
|
|
"""
|
2012-12-15 02:00:42 +04:00
|
|
|
global tasks
|
2013-01-09 16:34:45 +04:00
|
|
|
global procs
|
2013-01-10 02:09:50 +04:00
|
|
|
global pipes
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
2012-12-14 06:52:31 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
# Initialize sqlmap engine's options with user's provided options
|
|
|
|
# within the JSON request
|
|
|
|
for key, value in request.json.items():
|
2012-12-15 04:12:22 +04:00
|
|
|
tasks[taskid][key] = value
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
# Overwrite output directory (oDir) value to a temporary directory
|
|
|
|
tasks[taskid].oDir = tempfile.mkdtemp(prefix="sqlmap-")
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 17:40:25 +04:00
|
|
|
# Launch sqlmap engine in a separate thread
|
2012-12-20 21:56:53 +04:00
|
|
|
logger.debug("starting a scan for task ID %s" % taskid)
|
|
|
|
|
2013-01-10 02:09:50 +04:00
|
|
|
pipes[taskid] = os.pipe()
|
|
|
|
|
|
|
|
# Provide sqlmap engine with the writable pipe for logging
|
|
|
|
tasks[taskid]["fdLog"] = pipes[taskid][1]
|
|
|
|
|
|
|
|
# Launch sqlmap engine
|
2013-01-10 04:52:44 +04:00
|
|
|
procs[taskid] = execute("python sqlmap.py --pickled-options %s" % base64pickle(tasks[taskid]), shell=True, stdin=PIPE, stdout=PIPE, stderr=PIPE, close_fds=False)
|
2012-12-14 17:40:25 +04:00
|
|
|
|
|
|
|
return jsonize({"success": True})
|
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
@get("/scan/<taskid>/output")
|
|
|
|
def scan_output(taskid):
|
|
|
|
"""
|
|
|
|
Read the standard output of sqlmap core execution
|
|
|
|
"""
|
2013-01-10 02:09:50 +04:00
|
|
|
global pipes
|
2012-12-14 22:13:21 +04:00
|
|
|
global tasks
|
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2013-01-10 04:52:44 +04:00
|
|
|
stdout = recv_some(procs[taskid], t=1, e=0, stderr=0)
|
|
|
|
stderr = recv_some(procs[taskid], t=1, e=0, stderr=1)
|
2013-01-10 02:09:50 +04:00
|
|
|
|
2013-01-10 04:52:44 +04:00
|
|
|
return jsonize({"stdout": stdout, "stderr": stderr})
|
2012-12-14 18:51:01 +04:00
|
|
|
|
2012-12-15 02:00:42 +04:00
|
|
|
@get("/scan/<taskid>/delete")
|
|
|
|
def scan_delete(taskid):
|
|
|
|
"""
|
|
|
|
Delete a scan and corresponding temporary output directory
|
|
|
|
"""
|
|
|
|
global tasks
|
|
|
|
|
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
if "oDir" in tasks[taskid] and tasks[taskid].oDir is not None:
|
|
|
|
shutil.rmtree(tasks[taskid].oDir)
|
2012-12-15 02:00:42 +04:00
|
|
|
|
|
|
|
return jsonize({"success": True})
|
|
|
|
|
2013-01-10 04:01:28 +04:00
|
|
|
# Functions to handle scans' logs
|
|
|
|
@get("/scan/<taskid>/log/<start>/<end>")
|
|
|
|
def scan_log_limited(taskid, start, end):
|
|
|
|
"""
|
|
|
|
Retrieve the log messages
|
|
|
|
"""
|
|
|
|
log = None
|
|
|
|
|
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
|
|
|
if not start.isdigit() or not end.isdigit() or end <= start:
|
|
|
|
abort(500, "Invalid start or end value, must be digits")
|
|
|
|
|
2013-01-10 16:18:44 +04:00
|
|
|
start = max(0, int(start) - 1)
|
2013-01-10 04:01:28 +04:00
|
|
|
end = max(1, int(end))
|
|
|
|
pickledLog = os.read(pipes[taskid][0], 100000)
|
|
|
|
|
|
|
|
try:
|
|
|
|
log = base64unpickle(pickledLog)
|
|
|
|
log = log[slice(start, end)]
|
|
|
|
except (KeyError, IndexError, TypeError), e:
|
|
|
|
logger.error("handled exception when trying to unpickle logger dictionary in scan_log_limited(): %s" % str(e))
|
|
|
|
|
|
|
|
return jsonize({"log": log})
|
|
|
|
|
2012-12-15 04:12:22 +04:00
|
|
|
@get("/scan/<taskid>/log")
|
|
|
|
def scan_log(taskid):
|
2012-12-14 21:21:19 +04:00
|
|
|
"""
|
2012-12-17 15:28:03 +04:00
|
|
|
Retrieve the log messages
|
2012-12-14 21:21:19 +04:00
|
|
|
"""
|
2013-01-10 04:01:28 +04:00
|
|
|
log = None
|
|
|
|
|
2012-12-14 21:21:19 +04:00
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2013-01-10 04:01:28 +04:00
|
|
|
pickledLog = os.read(pipes[taskid][0], 100000)
|
|
|
|
|
|
|
|
try:
|
|
|
|
log = base64unpickle(pickledLog)
|
|
|
|
except (KeyError, IndexError, TypeError), e:
|
|
|
|
logger.error("handled exception when trying to unpickle logger dictionary in scan_log(): %s" % str(e))
|
|
|
|
|
|
|
|
return jsonize({"log": log})
|
2012-12-14 21:21:19 +04:00
|
|
|
|
|
|
|
# Function to handle files inside the output directory
|
2012-12-14 19:52:35 +04:00
|
|
|
@get("/download/<taskid>/<target>/<filename:path>")
|
2012-12-14 17:40:25 +04:00
|
|
|
def download(taskid, target, filename):
|
2012-12-14 16:01:13 +04:00
|
|
|
"""
|
|
|
|
Download a certain file from the file system
|
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
if taskid not in tasks:
|
|
|
|
abort(500, "Invalid task ID")
|
|
|
|
|
2012-12-14 20:18:45 +04:00
|
|
|
# Prevent file path traversal - the lame way
|
|
|
|
if target.startswith("."):
|
|
|
|
abort(500)
|
|
|
|
|
2012-12-14 16:01:13 +04:00
|
|
|
path = os.path.join(paths.SQLMAP_OUTPUT_PATH, target)
|
|
|
|
if os.path.exists(path):
|
|
|
|
return static_file(filename, root=path)
|
|
|
|
else:
|
|
|
|
abort(500)
|
|
|
|
|
2012-12-20 19:29:23 +04:00
|
|
|
def server(host="0.0.0.0", port=RESTAPI_SERVER_PORT):
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-20 18:35:02 +04:00
|
|
|
REST-JSON API server
|
2012-12-14 06:52:31 +04:00
|
|
|
"""
|
2012-12-14 17:40:25 +04:00
|
|
|
global adminid
|
|
|
|
global tasks
|
2012-12-15 02:00:42 +04:00
|
|
|
|
2012-12-14 18:51:01 +04:00
|
|
|
adminid = hexencode(os.urandom(16))
|
2012-12-20 20:53:43 +04:00
|
|
|
tasks[adminid] = init_options()
|
2012-12-15 04:12:22 +04:00
|
|
|
|
|
|
|
logger.info("running REST-JSON API server at '%s:%d'.." % (host, port))
|
|
|
|
logger.info("the admin task ID is: %s" % adminid)
|
2012-12-14 18:51:01 +04:00
|
|
|
|
2012-12-20 18:35:02 +04:00
|
|
|
# Run RESTful API
|
2012-12-14 22:13:21 +04:00
|
|
|
run(host=host, port=port, quiet=False, debug=False)
|
2012-12-14 06:52:31 +04:00
|
|
|
|
2012-12-20 18:35:02 +04:00
|
|
|
def client(host=RESTAPI_SERVER_HOST, port=RESTAPI_SERVER_PORT):
|
2012-12-15 04:29:35 +04:00
|
|
|
"""
|
|
|
|
REST-JSON API client
|
|
|
|
"""
|
2012-12-14 16:01:13 +04:00
|
|
|
addr = "http://%s:%d" % (host, port)
|
2012-12-20 18:35:02 +04:00
|
|
|
logger.info("starting debug REST-JSON client to '%s'..." % addr)
|
2012-12-14 16:01:13 +04:00
|
|
|
|
2012-12-20 18:35:02 +04:00
|
|
|
# TODO: write a simple client with requests, for now use curl from command line
|
|
|
|
logger.error("not yet implemented, use curl from command line instead for now, for example:")
|
|
|
|
print "\n\t$ curl http://%s:%d/task/new" % (host, port)
|
|
|
|
print "\t$ curl -H \"Content-Type: application/json\" -X POST -d '{\"url\": \"http://testphp.vulnweb.com/artists.php?artist=1\"}' http://%s:%d/scan/:taskid/start" % (host, port)
|
|
|
|
print "\t$ curl http://%s:%d/scan/:taskid/output" % (host, port)
|
|
|
|
print "\t$ curl http://%s:%d/scan/:taskid/log\n" % (host, port)
|