New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details
Socket
Book a DemoSign in
Socket

paskto

Package Overview
Dependencies
Maintainers
1
Versions
5
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

paskto

A passive web scanner

latest
Source
npmnpm
Version
1.0.11
Version published
Weekly downloads
17
325%
Maintainers
1
Weekly downloads
 
Created
Source

Paskto - Passive Web Scanner

Paskto will passively scan the web using the Common Crawl internet index either by downloading the indexes on request or parsing data from your local system. URLs are then processed through Nikto and known URL lists to identify interesting content. Hash signatures are also used to identify known default content for some IoT devices or web applications.

  Options

    -d, --dir-input directory      Directory with common crawl index files with .gz extension. Ex: -d "/tmp/cc/"
    -v, --ia-dir-input directory   Directory with internet archive index files with .gz extension. Ex: -v         "/tmp/ia/"                                                                    
    -o, --output-file file         Save test results to file. Ex: -o /tmp/results.csv                            
    -u, --update-db                Build/Update Paskto DB from Nikto databases.                                  
    -n, --use-nikto                Use Nikto DBs. Default: true                                                  
    -e, --use-extras               Use EXTRAS DB. Default: true                                                  
    -s, --scan domain name         Domain to scan. Ex: -s "www.google.ca" or -s "*.google.ca"                    
    -i, --cc-index index           Common Crawl index for scan. Ex: -i "CC-MAIN-2017-34-index"                   
    -a, --save-all-urls file       Save CSV List of all URLS. Ex: -a /tmp/all_urls.csv                           
    -h, --help                     Print this usage guide.                                                       

  Examples

    Scan domain, save results and URLs   $ node paskto.js -s "www.msn.com" -o /tmp/rest-results.csv -a /tmp/all-urls.csv                                                                       
    Scan domain with CC wildcards.       $ node paskto.js -s "*.msn.com" -o /tmp/rest-results.csv -a /tmp/all-urls.csv  
    Scan domain, only save URLs.         $ node paskto.js -s "www.msn.com" -o /tmp/rest-results.csv                     
    Scan dir with indexes.               $ node paskto.js -d "/tmp/CC-MAIN-2017-39-index/" -o /tmp/rest-results.csv -a  /tmp/all-urls.csv                                                              

Create Custom Digest signatures

A quick way to create new digest signatures for default content is to use WARCPinch which is a Chrome Extension I hacked together based off of WARCreate except it creates digital signatures as well as WARC files. (Also adds highlight and right click functionality, which is useful to just highlight any identifying text to use as the name of the signatures).

News & Updates

Follow @ThreatPinch on twitter.

Make sure to check out ThreatPinch Lookup as well, our OSINT and Threat Intel Chrome / Firefox browser extension.

Keywords

CommonCrawl

FAQs

Package last updated on 30 Mar 2018

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts