WebService::Google-Hack Web Installation Guide

SYNOPSIS

The WebService::Google-Hack web interface provides an easy to use interface for some of the features of WebService::Google-Hack.

DESCRIPTION

To install the interface please follow these steps:

The web interface for WebService::Google-Hack has been implemented such that, there needs to be a WebService::Google-Hack Server running in the background, so that the client file index.cgi can connect to the server on a specific port, and retrieve results.

Installation Guide

1) Create a directory named ghack in your cgi-bin directory (Where all your cgi files reside). So it should be something like:

/webspace/cgi-bin/ghack

2) Next, copy the file named index.cgi, which is given with the distribution of the google-hack package into your cgi-bin/ghack/ directory.

3) Open the index.cgi file (The index.cgi file is in the WebInterface directory of GoogleHack. For eg: WebService/GoogleHack/WebInterface), and change the lib path to the path where WebService::GoogleHack has been installed on your machine.

4) Now, open the ghack_server.pl file (which is also given in the WebInterface directory of GoogleHack),

5) In the ghack_server.pl file, change the following variables accordingly:

Basedir should be the path to the cgi-bin directory in which index.cgi resides.

$BASEDIR = '/webspace/cgi-bin/ghack';

The localport should be a number above 1024, and less than around 66,000. Make sure that localport number is the same on both the client and server side.

$localport ="";

6) Now, open the index.cgi file (which is also given in the WebInterface directory of GoogleHack),

Set the remote_host, and remote_port variables to the correct values.

The remote host will be the IP address of the machine where the google_hack server will be running.

$remote_host = '';

The remote port needs to be the same as the $localport variable in ghack_server.pl $remote_port = '';

7)If your ghack server is running behind a firewall, you will need to edit the file /etc/sysconfig/iptables to allow clients to connect to the machine through the port you had given. There is a line that looks like this:

-A RH-Firewall-1-INPUT -p tcp --dport XXXXX -j ACCEPT

Where XXXXX is the port that your client will be connecting to (the value of $localport in ghack_server.pl).

The change would not take effect until the host machine is rebooted. If you do not have permissions to reboot, please issue the following command:

/sbin/iptables -I RH-Firewall-1-INPUT 10 -p tcp --dport XXXXX -j ACCEPT

Where XXXXX is the port that your client will be connecting to (the value of $localport in ghack_server.pl).

Now start the server by running the ghack_server.pl as you would run a regular perl file.

You should now be able to use the web interface.

AUTHOR

Ted Pedersen, <tpederse@d.umn.edu>

Pratheepan Raveendranathan, <rave0029@d.umn.edu>

Date 11/08/2004

COPYRIGHT AND LICENSE

Copyright (c) 2003 by Pratheepan Raveendranathan, Ted Pedersen

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program; if not, write to

The Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.