def do_nmap(self, args): """Import Nmap results""" print() file = os.path.expanduser(args.file[0]) if not FileUtils.can_read(file): logger.error('Cannot read specified file') return logger.info('Importing Nmap results from {file}'.format(file=file)) if not args.no_http_recheck: logger.info('Each service will be re-checked to detect HTTP services. Use --no-http-recheck if you want to disable it (faster import)') parser = NmapResultsParser(file, self.settings.services) results = parser.parse(not args.no_http_recheck) if results is not None: if len(results) == 0: logger.warning('No new service has been added into current mission') else: req = HostsRequester(self.sqlsess) req.select_mission(self.current_mission) for host in results: req.add_or_merge_host(host) logger.success('Nmap results imported with success into current mission') print()
def __check_args_attack_bruteforce(self): """Check arguments for subcommand Attack > Bruteforce options""" #for f in self.args.userlist, self.args.passlist, self.args.weblist: for f in self.args.userlist, self.args.passlist: if f: if not FileUtils.can_read(f): logger.error('File {file} does not exist or cannot be read'.format( file=f)) return False return True