[WEB SECURITY] [new tool announcement] host-extract
YGN Ethical Hacker Group
lists at yehg.net
Sun Mar 13 12:46:18 EDT 2011
Host-Extract | Host/IP Pattern Extractor
useful area: blackbox testing
This little ruby script tries to extract all IP/Host patterns in page
With it, you can quickly identify internal IPs/Hostnames, development
IPs/ports, cdn, load balancers, additional attack entries related to
your target that are revealed in inline js, css, html comment areas
and js/css files.
This is unlike web crawler which looks for new links only in anchor
tags (<a) or the like.
In some cases, host-extract may give you false positives when there
are some words like - main-site_ver_10.2.1.3.swf.
With -v option, you can ask the tool to output html view-source
snippets for each IP/Domain extracted. This will shorten your manual
Please go to http://host-extract.googlecode.com/ for more info.
svn co http://host-extract.googlecode.com/svn/trunk/ host-extract
Sebastien Damaye from aldeid.com has prepared a thorough host-extract
tutorial with real-world famous web sites.
Please report bugs/suggestions to host-extract at yehg.net.
Thanks for your contribution.
More information about the websecurity