On Sat, Feb 07, 2004 at 06:21:48PM -0800, john fleming wrote:
I prefer pyton but is there a gizmo that will translate a url into an
isp so I can run nmap on it and take it's os fingerprint?
nmap can do name resolution all by itself.
nmap -O microsoft.com
However, the problem with this
Cory Petkovsek wrote:
On Sat, Feb 07, 2004 at 06:21:48PM -0800, john fleming wrote:
I prefer pyton but is there a gizmo that will translate a url into an
isp so I can run nmap on it and take it's os fingerprint?
nmap can do name resolution all by itself.
nmap -O microsoft.com
However,
I fear you might get a mis-signature, so to speak, in this case.
Prolly their web load balancer, at best, and a mixed bag or no signature,
say, from a firewall or similar.
Ben
On Sun, 08 Feb 2004 17:27:51 -0800
john fleming [EMAIL PROTECTED] wrote:
| Thanx for the code Bob and the tips
John - IIRC, Microsoft uses Akamai to serve its web
content to the masses. Thus, if this is the case, MS
is not using linux to host its master content.
Instead, the content is delivered to the end-user via
Akamai's linux servers.
Jason
--- john fleming [EMAIL PROTECTED] wrote:
snip
Thanx for
Jason wrote:
John - IIRC, Microsoft uses Akamai to serve its web
content to the masses. Thus, if this is the case, MS
is not using linux to host its master content.
Instead, the content is delivered to the end-user via
Akamai's linux servers.
Jason
Bummmer I wanted to tell everyone that ohwell
I prefer pyton but is there a gizmo that will translate a url into an
isp so I can run nmap on it and take it's os fingerprint?
John
john fleming wrote:
I prefer pyton but is there a gizmo that will translate a url into an
isp so I can run nmap on it and take it's os fingerprint?
import socket
socket.gethostbyname('www.microsoft.com')
'207.46.244.188'
Is that what you wanted?
--
Bob Miller
Bob Miller wrote:
john fleming wrote:
I prefer pyton but is there a gizmo that will translate a url into an
isp so I can run nmap on it and take it's os fingerprint?
import socket
socket.gethostbyname('www.microsoft.com')
'207.46.244.188'
Is that what you wanted?
That
If you had the first part setup as a python script that just outputted the
IP, you could tack on |xargs nmap -allMyOptions to the command where you
start that from. man xargs, yada yada; this puts the IP at the end of the
nmap command, with -allMuOptions being whatever you feel comfortable and
or you could use the commands module
s = commands.getoutput('nmap -O 67.171.238.246')
s
'\nStarting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2004-02-07
19:36 PST\nNote: Host seems down. If it is really up, but blocking our
ping probes, try -P0\nNmap run completed -- 1 IP address (0
john fleming wrote:
That is good but how do I get it to hand it to nmap to run the scan?
Oh. Why didn't you say, Please write my program for me? (-:
import socket
import os
ip = socket.gethostbyname('bmiller')
cmd = 'nmap -sP %s' % ip
cmd
'nmap -sP
11 matches
Mail list logo