Build precise queries to find exactly what you need
Press ESC to close
Your review has been submitted and is pending approval.
This plugin check for a potential website defacement. The script curl the provided url and compare it with the previous curl. Several tests can be made, the default one is calculating how many pecentage of code have been changed since last check.
Current Version
1.0
Last Release Date
2015-11-30
Owner
ensmm
License
GPL
Compatible With
Script language : Bash
Usage : ./check_defacement.sh -u [URL] -{OPTIONS}
[URL] (STRING - required) Url must be provided without http:// or https://
{OPTIONS} -w WARNING -c CRITICAL (INTEGER) Default check, calculating a percentage of changed code since last check, based on code lines changed. Default values: 5 for WARNING and 10 for CRITICAL
-m MD5 checksum test, if checksum of curled url have changed since last check, CRITICAL state.
-k KEYWORD (STRING) If provided keyword is not present in website code, CRITICAL state.
-l FILE (STRING) File with defacement words/phrases (one per line). You can create a file with words and phrases with defacement vocabulary (hack, money,...). CRITICAL state if defacement vocabulary found in code.
-p PROXY:PORT (STRING) -s Use SSL for connection (https) -h Help -V Version
In case of WARNING or CRITICAL states, a time stamped backup of curled url is created in dump directory (default /tmp) for investigations.
You must be logged in to submit a review.
To:
From:
We’ve completely redesigned the world’s largest repository of Nagios plugins and monitoring tools. Join thousands of users sharing monitoring solutions for servers, applications, and everything in between.
Due to our redesign, all existing accounts require a password reset to access your account again.
Ready to explore 6,100+ projects and contribute to the community?
Reset Password Create Account
Happy Monitoring!