#!/usr/bin/env python import argparse, sys from libpathod import pathoc, version, language from netlib import tcp, http_uastrings if __name__ == "__main__": preparser = argparse.ArgumentParser(add_help=False) preparser.add_argument( "--show-uas", dest="showua", action="store_true", default=False, help="Print user agent shortcuts and exit." ) pa = preparser.parse_known_args()[0] if pa.showua: print "User agent strings:" for i in http_uastrings.UASTRINGS: print " ", i[1], i[0] sys.exit(0) parser = argparse.ArgumentParser(description='A perverse HTTP client.', parents=[preparser]) parser.add_argument( "-i", dest="sni", type=str, default=False, help="SSL Server Name Indication" ) parser.add_argument( "-n", dest='repeat', default=1, type=int, metavar="N", help='Repeat requests N times' ) parser.add_argument( "-p", dest="port", type=int, default=None, help="Port. Defaults to 80, or 443 if SSL is active" ) parser.add_argument( "-s", dest="ssl", action="store_true", default=False, help="Connect with SSL" ) parser.add_argument( "-t", dest="timeout", type=int, default=None, help="Connection timeout" ) parser.add_argument( 'host', type=str, help='Host to connect to' ) parser.add_argument( 'request', type=str, nargs="+", help='Request specification' ) group = parser.add_argument_group( 'Controlling Output', """ Some of these options expand generated values for logging - if you're generating large data, use them with caution. """ ) group.add_argument( "-C", dest="ignorecodes", type=str, default="", help="Comma-separated list of response codes to ignore" ) group.add_argument( "-e", dest="explain", action="store_true", default=False, help="Explain requests" ) group.add_argument( "-o", dest="oneshot", action="store_true", default=False, help="Oneshot - exit after first non-ignored response" ) group.add_argument( "-q", dest="showreq", action="store_true", default=False, help="Print full request" ) group.add_argument( "-r", dest="showresp", action="store_true", default=False, help="Print full response" ) group.add_argument( "-T", dest="ignoretimeout", action="store_true", default=False, help="Ignore timeouts" ) group.add_argument( "-x", dest="hexdump", action="store_true", default=False, help="Output in hexdump format" ) args = parser.parse_args() if args.port is None: port = 443 if args.ssl else 80 else: port = args.port try: codes = [int(i) for i in args.ignorecodes.split(",") if i] except ValueError: parser.error("Invalid return code specification: %s"%args.ignorecodes) try: for i in range(args.repeat): p = pathoc.Pathoc(args.host, port) try: p.connect() except tcp.NetLibError, v: print >> sys.stderr, str(v) sys.exit(1) if args.ssl: try: p.convert_to_ssl(sni=args.sni) except tcp.NetLibError, v: print "\n>> %s"%v continue if args.timeout: p.settimeout(args.timeout) for spec in args.request: ret = p.print_request( spec, showreq=args.showreq, showresp=args.showresp, explain=args.explain, hexdump=args.hexdump, ignorecodes=codes, ignoretimeout=args.ignoretimeout ) sys.stdout.flush() if ret and args.oneshot: sys.exit(0) except KeyboardInterrupt: pass