![]() System : Linux absol.cf 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.33 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, Directory : /proc/self/root/usr/share/nmap/scripts/ |
Upload File : |
local http = require "http" local ipOps = require "ipOps" local stdnse = require "stdnse" local table = require "table" description = [[ Obtains up to 100 forward DNS names for a target IP address by querying the Robtex service (https://www.robtex.com/ip-lookup/). ]] --- -- @usage -- nmap --script http-robtex-reverse-ip --script-args http-robtex-reverse-ip.host='<ip>' -- -- @output -- Pre-scan script results: -- | http-robtex-reverse-ip: -- | *.insecure.org -- | *.nmap.com -- | *.nmap.org -- | *.seclists.org -- | insecure.com -- | insecure.org -- | lists.insecure.org -- | nmap.com -- | nmap.net -- | nmap.org -- | seclists.org -- | sectools.org -- | web.insecure.org -- | www.insecure.org -- | www.nmap.com -- | www.nmap.org -- | www.seclists.org -- |_ images.insecure.org -- -- @args http-robtex-reverse-ip.host IPv4 address of the host to lookup -- author = "riemann" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "external"} --- Scrape reverse ip information from robtex website -- @param data string containing the retrieved web page -- @return table containing the resolved host names function parse_robtex_response(data) local data = data:match("<h2>Shared</h2>(.-)<h2>History</h2>") local result = {} if data then for domain in data:gmatch('/dns%-lookup/(.-)"') do table.insert(result, domain) end end return result end prerule = function() return stdnse.get_script_args("http-robtex-reverse-ip.host") ~= nil end action = function(host, port) local target = stdnse.get_script_args("http-robtex-reverse-ip.host") local ip = ipOps.ip_to_str(target) if ( not(ip) or #ip ~= 4 ) then return stdnse.format_output(false, "The argument \"http-robtex-reverse-ip.host\" did not contain a valid IPv4 address") end local htmldata = http.get_url("https://www.robtex.com/ip-lookup/"..target, {any_af=true}) local domains = parse_robtex_response(htmldata.body) if ( #domains > 0 ) then return stdnse.format_output(true, domains) end end