Originally wanted to write a screenshot class script, found that already has this PY script name: Peeping Tom
To learn more, Poke: https://bitbucket.org/LaNMaSteR53/peepingtom/
Verbose use method stamp: Https://www.youtube.com/watch?v=kP-G5P7rTzU
Next I'll use the Awvs sweep a C segment for example: 210.51.191.0/24
The AWVS scan to the open web side of the IP information right-click Save CSV file.
Found too much useless information on the sample.csv.
I used the script I wrote below to filter out useful information.
1<?PHP2 3$contents ="';4$temp ="';5$array ="';6$matches ="';7 8$contents = file_get_contents ("Sample.csv");9 Ten$array = Preg_match_all ('/http:\/\/\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}:\d*/', $contents, $matches); One A foreach($matches [0] as$k =$value) { -$temp. = $value."\ n"; - } the -$fp = fopen ("Csvresult.txt","w+"); - fwrite ($fp, $temp); - fclose ($fp); +
-?>
Get the following results:
Then watch me operate peepingtom.py (Test.txt for the above saved results)
The page view information that was spied on is sweeping. Hey, did you find the same landing box? We quickly find a backstage without a manual turn on the Awvs
Landing box There is still suspected injection, good luck, quickly found loopholes.
~over
Peeping Tom's role in infiltrating information before it is collected.