@@ -16,7 +16,14 @@ python-wappalyzer
16
16
requests
17
17
```
18
18
19
- Recommended one-time installation steps using virtualenv:
19
+ The script ` analyze_hosts ` can execute other scans, based on their fingerprint:
20
+ ```
21
+ droopescan
22
+ WPscan
23
+ ```
24
+
25
+
26
+ Recommended one-time installation steps using virtualenv (note that virtualenv needs to be installed for this):
20
27
```
21
28
git clone https://github.com/PeterMosmans/security-scripts
22
29
cd security-scripts
@@ -26,6 +33,13 @@ virtualenv .
26
33
pip install -r requirements.txt
27
34
```
28
35
36
+
37
+ Recommended one-time installation steps without virtualenv:
38
+ ```
39
+ git clone https://github.com/PeterMosmans/security-scripts
40
+ pip install -r requirements.txt
41
+ ```
42
+
29
43
### usage
30
44
```
31
45
usage: analyze_hosts.py [-h] [--dry-run] [-i INPUTFILE] [-o OUTPUT_FILE]
@@ -36,7 +50,7 @@ usage: analyze_hosts.py [-h] [--dry-run] [-i INPUTFILE] [-o OUTPUT_FILE]
36
50
[--timeout TIMEOUT] [-v]
37
51
[target]
38
52
39
- analyze_hosts.py version 0.8 - scans one or more hosts for security misconfigurations
53
+ analyze_hosts.py version 0.13 - scans one or more hosts for security misconfigurations
40
54
41
55
Please note that this is NOT a stealthy scan tool: By default, a TCP and UDP
42
56
portscan will be launched, using some of nmap's interrogation scripts.
@@ -78,7 +92,6 @@ optional arguments:
78
92
--maxtime MAXTIME timeout for scans in seconds (default 600)
79
93
--timeout TIMEOUT timeout for requests in seconds (default 10)
80
94
-v, --verbose Be more verbose
81
-
82
95
```
83
96
84
97
## analyze-hosts.sh
@@ -90,6 +103,7 @@ The main objectives for the script is to make it as easy as possible to perform
90
103
* nmap
91
104
* [ openssl-1.0.2-chacha] ( https://github.com/PeterMosmans/openssl/tree/1.0.2-chacha/ )
92
105
* [ whatweb] ( https://github.com/urbanadventurer/WhatWeb )
106
+ + whois
93
107
94
108
95
109
### Examples
0 commit comments