Nmap NSE와 wkhtmltopdf 활용
nmap NSE와 wkhtmltopdf 를 이용한 네트워크 진단
- 설치
root@bt:~# wget http://wkhtmltopdf.googlecode.com/files/wkhtmltoimage-0.11.0_rc1-static-i386.tar.bz2
root@bt:~# tar -jxvf wkhtmltoimage-0.11.0_rc1-static-i386.tar.bz2
tar: Record size = 8 blocks
wkhtmltoimage-i386
root@bt:~# cp wkhtmltoimage-i386 /usr/local/bin/
root@bt:~# git clone git://github.com/SpiderLabs/Nmap-Tools.git
Initialized empty Git repository in /root/Nmap-Tools/.git/
remote: Counting objects: 24, done.
remote: Total 24 (delta 0), reused 0 (delta 0)
Receiving objects: 100% (24/24), done.
Resolving deltas: 100% (7/7), done.
root@bt:~# cd Nmap-Tools/NSE/
root@bt:~/Nmap-Tools/NSE# cp http-screenshot.nse /usr/local/share/nmap/scripts/
root@bt:~/Nmap-Tools/NSE# nmap --script-updatedb
Starting Nmap 6.01 ( http://nmap.org ) at 2015-01-20 09:10 EST
NSE: Updating rule database.
NSE: Script Database updated successfully.
Nmap done: 0 IP addresses (0 hosts up) scanned in 18.08 seconds
- 실행
root@bt:/usr/local/share/nmap/scripts# nmap -A --script=default,http-screenshot 192.168.0.1 -oA nmap-local
- 결과
엔맵 스크립트를 통해 해당 웹 사이트에 접근 후 화면 캡처를 해준다.
참고 : 백트랙을 활용한 모의해킹