{ "info": { "author": "Javier Nieto", "author_email": "javier.nieto@behindthefirewalls.com", "bugtrack_url": null, "classifiers": [ "Development Status :: 5 - Production/Stable", "Environment :: Console", "Intended Audience :: End Users/Desktop", "Intended Audience :: System Administrators", "License :: OSI Approved :: GNU General Public License v2 or later (GPLv2+)", "Operating System :: POSIX", "Programming Language :: Python :: 3.3", "Topic :: Internet :: WWW/HTTP", "Topic :: Internet :: WWW/HTTP :: Indexing/Search" ], "description": "What's Parsero?\r\n===============\r\nParsero is a free script written in Python which reads the Robots.txt\r\nfile of a web server and looks at the Disallow entries. The Disallow\r\nentries tell the search engines what directories or files hosted on a\r\nweb server mustn't be indexed. For example, \"Disallow: /portal/login\"\r\nmeans that the content on www.example.com/portal/login it's not allowed\r\nto be indexed by crawlers like Google, Bing, Yahoo... This is the way\r\nthe administrator have to not share sensitive or private information\r\nwith the search engines.\r\n\r\nBut sometimes these paths typed in the Disallows entries are directly\r\naccessible by the users without using a search engine, just visiting\r\nthe URL and the Path, and sometimes they are not available to be visited\r\nby anybody. Because it is really common that the administrators write\r\na lot of Disallows and some of them are available and some of them are\r\nnot, you can use Parsero in order to check the HTTP status code of each\r\nDisallow entry in order to check automatically if these directories are\r\navailable or not.\r\n\r\nAlso, the fact the administrator write a robots.txt, it doesn't mean\r\nthat the files or directories typed in the Dissallow entries will not\r\nbe indexed by Bing, Google, Yahoo, etc. For this reason, Parsero is\r\ncapable of searching in Bing to locate content indexed without the web\r\nadministrator authorization. Parsero will check the HTTP status code in\r\nthe same way for each Bing result.\r\n\r\nWhen you execute Parsero, you can see the HTTP status codes. For example,\r\nthe codes bellow:\r\n\r\n 200 OK The request has succeeded.\r\n 403 Forbidden The server understood the request, but is refusing to fulfill it.\r\n 404 Not Found The server hasn't found anything matching the Request-URI.\r\n 302 Found The requested resource resides temporarily under a different URI.\r\n ...\r\n\r\nYou can get all the latest info about Parsero from \r\nhttp://www.behindthefirewalls.com/search/?q=parsero\r\n\r\nInstalling\r\n==========\r\nThere are three ways to install Parsero easily. \r\n\r\nBy using setup.py script\r\n\r\n\tsudo setup.py install\r\n\t\r\nBy using pip3\r\n\r\n\tsudo apt-get install python3-pip\r\n\tsudo pip3 install parsero\r\n\t\r\nIn Kali Linux\r\n\r\n\tsudo apt-get update\r\n\tsudo apt-get install parsero\r\n\r\n\r\nUsage\r\n=====\r\n\r\n $ parsero -h\r\n \r\n usage: parsero.py [-h] [-u URL] [-o] [-sb]\r\n\t\r\n optional arguments:\r\n -h, --help show this help message and exit\r\n -u URL Type the URL which will be analyzed\r\n -o Show only the \"HTTP 200\" status code\r\n -sb Search in Bing indexed Disallows\r\n -f FILE Scan a list of domains from a list\r\n\r\nExample\r\n=======\r\n\t \r\n root@kali:~# parsero -u www.example.com -sb\r\n\r\n ____ \r\n | _ \\ __ _ _ __ ___ ___ _ __ ___ \r\n | |_) / _` | '__/ __|/ _ \\ '__/ _ \\ \r\n | __/ (_| | | \\__ \\ __/ | | (_) |\r\n |_| \\__,_|_| |___/\\___|_| \\___/ \r\n\r\n\tStarting Parsero v0.75 (https://github.com/behindthefirewalls/Parsero) at 05/22/14 11:12:55\r\n\tParsero scan report for example.com\r\n\thttp://example.com/download.php 302 Moved Temporarily\r\n\thttp://example.com/raw.php 302 Moved Temporarily\r\n\thttp://example.com/embed_js.php 200 OK\r\n\thttp://example.com/embed.php 200 OK\r\n\thttp://example.com/print.php 302 Moved Temporarily\r\n\thttp://example.com/diff.php 302 Moved Temporarily\r\n\thttp://example.com/share.php 404 Not Found\r\n\thttp://example.com/report.php 302 Moved Temporarily\r\n\thttp://example.com/embed_iframe.php 200 OK\r\n \r\n\t[+] 9 links have been analyzed and 3 of them are available!!!\r\n \r\n\tSearching the Disallows entries in Bing\r\n \r\n\thttp://www.bing.com/search?q=site:http://example.com/download.php\r\n\thttp://www.bing.com/search?q=site:http://example.com/raw.php\r\n \t- example.com/raw.php/contact?i=KR9c2erd 200 OK\r\n \t- example.com/raw.php/legal.aspx 302 Moved Temporarily\r\n \t- example.com/raw.php/points?i=KR9c2erd 200 OK\r\n\t- example.com/raw.php/image/sqrn11sp3C/zayn-tshirt-one-direction?i=... 302 Moved Temporarily\r\n\thttp://www.bing.com/search?q=site:http://example.com/embed_js.php\r\n\thttp://www.bing.com/search?q=site:http://example.com/embed.php\r\n\thttp://www.bing.com/search?q=site:http://example.com/print.php\r\n\thttp://www.bing.com/search?q=site:http://example.com/diff.php\r\n\thttp://www.bing.com/search?q=site:http://example.com/share.php\r\n\thttp://www.bing.com/search?q=site:http://example.com/report.php\r\n\thttp://www.bing.com/search?q=site:http://example.com/embed_iframe.php\r\n \r\n\tFinished in 7.290362596511841 seconds \r\n\r\nDisclaimer\r\n==========\r\nThe use of this tool is your responsability. Use parsero to audit your\r\nown servers or servers you are allowed to scan. I hereby disclaim any\r\nresponsibility for actions taken with this tool.\r\n\r\nAuthor\r\n======\r\n\r\n* Javier Nieto \r\n* Twitter: @behindfirewalls\r\n* Web: http://www.behindthefirewalls.com\r\n\r\nCredits\r\n=======\r\nI'd like thank to @cor3dump3d from http://www.devconsole.info for his support\r\nand help.", "description_content_type": null, "docs_url": null, "download_url": "UNKNOWN", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "https://github.com/behindthefirewalls/Parsero", "keywords": "Robots.txt Audit Webserver", "license": "GPLv2+", "maintainer": "Fabian Affolter, C0r3dump, fikoborquez", "maintainer_email": "fabian@affolter-engineering.ch, coredump@autistici.org", "name": "parsero", "package_url": "https://pypi.org/project/parsero/", "platform": "Linux", "project_url": "https://pypi.org/project/parsero/", "project_urls": { "Download": "UNKNOWN", "Homepage": "https://github.com/behindthefirewalls/Parsero" }, "release_url": "https://pypi.org/project/parsero/0.81/", "requires_dist": null, "requires_python": null, "summary": "A Python based Robots.txt audit tool", "version": "0.81" }, "last_serial": 1241552, "releases": { "0.80": [ { "comment_text": "", "digests": { "md5": "acf1e5b1a2a4a28ffa916a0175bcb21e", "sha256": "29317b0ea90fde2af013c622645107ddb4b83347171b021104b7e79d8c6485a0" }, "downloads": -1, "filename": "parsero-0.80.tar.gz", "has_sig": false, "md5_digest": "acf1e5b1a2a4a28ffa916a0175bcb21e", "packagetype": "bdist_egg", "python_version": "3.3", "requires_python": null, "size": 6366, "upload_time": "2014-09-23T11:06:42", "url": "https://files.pythonhosted.org/packages/14/3c/e47809e10413d6d134fce0543d9ebd2c25f94c3ea2dc022c6100e8f5bbeb/parsero-0.80.tar.gz" } ], "0.81": [ { "comment_text": "", "digests": { "md5": "42fb84c5ef3886f68e7f36fb86fce5dc", "sha256": "193d58bafa55140614cd1eefced82d88642ebf6bcc1a8deab642ec34633b797a" }, "downloads": -1, "filename": "parsero-0.81.tar.gz", "has_sig": false, "md5_digest": "42fb84c5ef3886f68e7f36fb86fce5dc", "packagetype": "bdist_egg", "python_version": "3.3", "requires_python": null, "size": 13000, "upload_time": "2014-09-29T11:29:41", "url": "https://files.pythonhosted.org/packages/31/0e/38a649be16f5eae54e18120fe5d791570067693c227f692499400f1c04db/parsero-0.81.tar.gz" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "42fb84c5ef3886f68e7f36fb86fce5dc", "sha256": "193d58bafa55140614cd1eefced82d88642ebf6bcc1a8deab642ec34633b797a" }, "downloads": -1, "filename": "parsero-0.81.tar.gz", "has_sig": false, "md5_digest": "42fb84c5ef3886f68e7f36fb86fce5dc", "packagetype": "bdist_egg", "python_version": "3.3", "requires_python": null, "size": 13000, "upload_time": "2014-09-29T11:29:41", "url": "https://files.pythonhosted.org/packages/31/0e/38a649be16f5eae54e18120fe5d791570067693c227f692499400f1c04db/parsero-0.81.tar.gz" } ] }