Skip to content

Commit b31fe77

Browse files
authored
Update README.md
1 parent 8f06dc7 commit b31fe77

File tree

1 file changed

+13
-2
lines changed

1 file changed

+13
-2
lines changed

README.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,15 +33,26 @@ A virtual host scanner that can pivot over hosts, detect catch-all scenarios, al
3333
![VHOSTScan Feature Map](https://github.com/codingo/codingo.github.io/blob/master/assets/featureMap.PNG)
3434

3535
## Examples
36-
36+
### Quick Example
3737
The most straightforward example runs the default wordlist against example.com using the default of port 80:
3838

3939
```bash
4040
$ VHostScan.py -t example.com
4141
```
42-
42+
### Port forwarding
4343
Say you have an SSH port forward listening on port 4444 fowarding traffic to port 80 on example.com's development machine. You could use the following to make VHostScan connect through your SSH tunnel via localhost:4444 but format the header requests to suit connecting straight to port 80:
4444

4545
```bash
4646
$ VHostScan.py -t localhost -b example.com -p 4444 -r 80
4747
```
48+
49+
### STDIN
50+
If you want to pipe information into VHostScan you can use the following:
51+
```bash
52+
$ cat vhostname | VHostScan.py -t localhost
53+
```
54+
### STDIN and WordList
55+
You can still specify a wordlist to use along with stdin. In these cases wordlist information will be appended to stdin. For example:
56+
```bash
57+
$ cat vhostname | VhostScan.py -t localhost -w ./wordlists/wordlist.txt
58+
```

0 commit comments

Comments
 (0)