76
76
attacks .add_option ("-p" , "--port-scan" , dest = "runPortScan" , action = "store_true" ,
77
77
help = "Run a Nmap port scan on the discovered URL's" )
78
78
attacks .add_option ("-i" , "--intel-check" , dest = "intelCheck" , action = "store_true" ,
79
- help = "Check if a URL's host is exploitable via Intel ME AMT (CVE-2017-5689) "
80
- "scans will be deprecated by version 1.2" )
79
+ help = optparse .SUPPRESS_HELP ) # TODO:/ completely remove
81
80
attacks .add_option ("-a" , "--admin-panel" , dest = "adminPanelFinder" , action = "store_true" ,
82
81
help = "Search for the websites admin panel" )
83
82
attacks .add_option ("-x" , "--xss-scan" , dest = "runXssScan" , action = "store_true" ,
101
100
attacks .add_option ("--tamper" , dest = "tamperXssPayloads" , metavar = "TAMPER-SCRIPT" ,
102
101
help = "Send the XSS payloads through tampering before sending to the target" )
103
102
attacks .add_option ("--run-ip-address" , dest = "runAgainstIpAddress" , action = "store_true" ,
104
- help = "Run the Intel ME AMT exploit against the found host IP address instead of the hostname" )
103
+ help = optparse . SUPPRESS_HELP ) # TODO:/ completely remove
105
104
attacks .add_option ("--thread" , dest = "threadPanels" , action = "store_true" ,
106
105
help = optparse .SUPPRESS_HELP )
107
106
attacks .add_option ("--auto" , dest = "autoStartSqlmap" , action = "store_true" ,
@@ -290,13 +289,15 @@ def __run_attacks_main():
290
289
run_attacks (
291
290
url .strip (),
292
291
sqlmap = opt .runSqliScan , nmap = opt .runPortScan ,
293
- intel = opt .intelCheck , xss = opt .runXssScan ,
292
+ intel = opt .intelCheck , # TODO:/ completely remove
293
+ xss = opt .runXssScan ,
294
294
whois = opt .performWhoisLookup , admin = opt .adminPanelFinder ,
295
295
clickjacking = opt .performClickjackingScan ,
296
296
verbose = opt .runInVerbose , batch = opt .runInBatch ,
297
297
auto_start = opt .autoStartSqlmap , xforward = opt .forwardedForRandomIP ,
298
298
sqlmap_args = opt .sqlmapArguments , nmap_args = opt .nmapArguments ,
299
- run_ip = opt .runAgainstIpAddress , show_all = opt .showAllConnections ,
299
+ run_ip = opt .runAgainstIpAddress , # TODO:/ completely remove
300
+ show_all = opt .showAllConnections ,
300
301
do_threading = opt .threadPanels , tamper_script = opt .tamperXssPayloads ,
301
302
timeout = opt .controlTimeout , proxy = proxy_to_use , agent = agent_to_use
302
303
)
@@ -322,7 +323,7 @@ def __run_attacks_main():
322
323
search .parse_search_results (
323
324
opt .dorkToUse , search_engine , verbose = opt .runInVerbose , proxy = proxy_to_use ,
324
325
agent = agent_to_use , pull_all = opt .noExclude , parse_webcache = opt .parseWebcache ,
325
- forward_for = opt .forwardedForRandomIP , tor = opt .useTor
326
+ forward_for = opt .forwardedForRandomIP , tor = opt .useTor , batch = opt . runInBatch
326
327
)
327
328
except InvalidProxyType :
328
329
supported_proxy_types = ["socks5" , "socks4" , "https" , "http" ]
@@ -383,7 +384,7 @@ def __run_attacks_main():
383
384
search .parse_search_results (
384
385
dork , search_engine , verbose = opt .runInVerbose , proxy = proxy_to_use ,
385
386
agent = agent_to_use , pull_all = opt .noExclude , parse_webcache = opt .parseWebcache ,
386
- tor = opt .useTor
387
+ tor = opt .useTor , batch = opt . runInBatch
387
388
)
388
389
except Exception as e :
389
390
logger .exception (set_color (
@@ -408,7 +409,7 @@ def __run_attacks_main():
408
409
search .parse_search_results (
409
410
random_dork , search_engine , verbose = opt .runInVerbose ,
410
411
proxy = proxy_to_use , agent = agent_to_use , pull_all = opt .noExclude , parse_webcache = opt .parseWebcache ,
411
- tor = opt .useTor
412
+ tor = opt .useTor , batch = opt . runInBatch
412
413
)
413
414
__run_attacks_main ()
414
415
@@ -435,10 +436,18 @@ def __run_attacks_main():
435
436
)
436
437
else :
437
438
if URL_QUERY_REGEX .match (opt .spiderWebSite ):
438
- is_sure = prompt (
439
+ question_msg = (
439
440
"it is recommended to not use a URL that has a GET(query) parameter in it, "
440
- "would you like to continue" , "yN"
441
+ "would you like to continue"
441
442
)
443
+ if not opt .runInBatch :
444
+ is_sure = prompt (
445
+ question_msg , opts = "yN"
446
+ )
447
+ else :
448
+ is_sure = prompt (
449
+ question_msg , opts = "yN" , default = "y"
450
+ )
442
451
if is_sure .lower ().startswith ("y" ):
443
452
pass
444
453
else :
0 commit comments