Content-type: text/html Manpage of Hackbot

Hackbot

Section: Scanning tools (1)
Updated: 2.15
Index Return to Main Contents
 

NAME

Hackbot - Host exploration and bannergrab tool  

SYNOPSIS

hackbot.pl [-OAitfmsSdrX[-P <proxy:port>][-a <NN>][-z <NN>][-l <c|v|d>] [-w avociun]] [<host|ip|net|range>|-F <targetfile>]

 

DESCRIPTION

Hackbot is a vulnerability and bannergrabber meant as auditory tool for remote and local hosts. Hackbot requires PERL (http://www.perl.org), IO::Socket, Net::hostent and Getopt::Std which should come with your default PERL installation.  

PLATFORMS

Hackbot should work on all UNIX platforms which have perl and the necessary modules installed. If you want to get it to work with Windows fix it yourself, I simply refuse to support it. Microsoft is evil and should be removed from this planet.  

OPTIONS

-O log to output file.

-A All scan types.

-i Ident scan.

-t Telnet fingerprinting.

-f FTP scan, grabs FTP banner and checks for
   anonymous user login.

-m MTA scan, grabs MTA banner and checks for
   open relay, EXPN and VRFY.

-s SSH scan, grabs SSH banner.

-S Check target host with spamcop's database.

-d DNS scan, grabs DNS version.

-r Registrar whois lookup.

-V Print Version and exit.

-P Scan via proxy.

-l loglevel sets loglevel state, see LOGLEVEL OPTIONS below.

-w Webserver scan, various options, see the
   WEBSERVER OPTIONS section below.

-z NN Set time in seconds between each CGI poll (to be less conspicuous).

-a NN Set alternative webserver port.

-X X allow check.

-F Reads hostnames or IP's from a targetfile.  

WEBSERVER OPTIONS

Webserver scan types:

a All webserver scans.

v Check webserver version.

o Check for webserver PUBLIC and ALLOW options.

c CGI scan, scans for commonly exploitable CGI's.

i IDA, IDC, IDQ scan, scans for path revealing NT
   problems.

u Unicode scan, scans for NT unicode vulnerabilities.

n Nimda scan, scans for eml files in website html.
   source, works best combined with -c option.    

LOGLEVEL OPTIONS

Loglevel states:
                c  critical (default)
                v  verbose
                d  debug 

c Critical only list information that is important.

v Verbose same as above + might-be-interesting-stuff.

d Show all normal scaninfo, All socketinfo, data and show additional 'tagpoints'.

 

SCANOUTPUT

The output of the scan is placed in output.host files or, when the -O option is used, it is placed in the given output file.  

SCANOUTPUT EXAMPLE

output.127.0.0.1
output.www.yourdomain.name
or, when -O option is defined, output is placed in the given output file.

 

EXAMPLES

FTP, MTA and webserver options, CGI and IDA scan

$ hackbot.pl -f -m -w oci localhost

ALL scans

$ hackbot.pl -A localhost

or from a file

$ hackbot.pl -A -F file_with_hosts

or with ranges and output file

$ hackbot.pl -O logfile -A 192.168.1.1 192.168.1.255

or with CIDR's

$ hackbot.pl -A 192.168.1.0/24

NOTE: CIDR masks < /24 are currently unsupported.

 

AUTHORS

Marco van Berkum - m.v.berkum@obit.nl
Kristian Vlaardingerbroek - kris@obit.nl
Pepijn Vissers - zoef@zoefdehaas.nl
Martijn Mooijman - foobar@obit.nl
Herman Poortermans - herman@ofzo.nl
Guido Barosio - gbarosio@uolsinectis.com.ar  

BUGS

All bugs can be reported to m.v.berkum@obit.nl, before reporting bugs please refer to the KNOWN_BUGS file first.  

LICENSE

Hackbot is licensed under the LGPL License, see LICENSE for more information.  

DISCLAIMER

The author of this program _CANNOT_ be held responsible for any illegal scanning activities initiated by an user or unauthorised party. This program is meant as tool to determine your OWN network security. Any unauthorised probes with this program should be reported to local authorities and/or to the attacker himself. Complaints to my address regarding the unauthorised use of this program will be moved unseen to /dev/null.


 

Index

NAME
SYNOPSIS
DESCRIPTION
PLATFORMS
OPTIONS
WEBSERVER OPTIONS
LOGLEVEL OPTIONS
SCANOUTPUT
SCANOUTPUT EXAMPLE
EXAMPLES
AUTHORS
BUGS
LICENSE
DISCLAIMER

This document was created by man2html, using the manual pages.
Time: 09:11:40 GMT, October 29, 2002