Hi all, long time from the last post. This time is a short post about a new updated version of the Metagoofil
The problem was that Google changed the source code of the results page, so the parser failed to catch the files. I guess that the structure of the HTML is changed often, to render useless the tools that use google in an automated way outside the API (all the tools right now).
Recently Roelof talked about the problems he had in Maltego using google as an input and core part of a tool, i want to confirm what he said, it's really a mess to maintain a tool that uses google as input :(
Enough for today.
Thanks to Chris Gates for pointing out the problem.
Edge-security blog about Penetration testing, OSINT, security tools, and other interesting stuff.
Subscribe to:
Post Comments (Atom)
Wfuzz 2.2.0 released
I'm pleased to announce a new version of WFuzz! Wfuzz has been created to facilitate the task in web applications assessments and it...
-
In the last few weeks everyone has been talking about Shellshock, the vulnerability affecting bash and having security ramifications everyw...
-
I'm pleased to announce a new version of WFuzz! Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for findi...
-
In one of the latest penetration tests we faced a SSH server that was based in Maverick SSHTOOLS. The funny thing is that this server was ...
No comments:
Post a Comment