Seccubus – Easy Automated Vulnerability Scanning, Reporting And Analysis

Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the first scan and on repeated scans.On repeated scan delta reporting ensures that findings only need to be judged when they first appear in the scan results or when their output changes.Seccubus 2.x is the only actively developed and maintained branch and all support for Seccubus V1 has officially been dropped.Seccubus V2 works with the following scanners:NessusOpenVASSkipfishMedusa (local and remote)Nikto (local and remote)NMap (local and remote)OWASP-ZAP (local and remote)SSLyzeMedusaQualys SSL labstestssl.sh (local and remote)For more information visit [www.seccubus.com]Default password, changinge it!!!!!After installation the default username and paswword for seccubus is:admin / GiveMeVulns!It is highly recommended you change this after installation./bin/seccubus_passwd -u adminChange logChanges of this branch vs the latest/previous releasex-x-2019 – v2.53 Development releaseThis is work in progressDifferences with 2.52Download Seccubus

Link: http://feedproxy.google.com/~r/PentestTools/~3/V6X3rDBzIjs/seccubus-easy-automated-vulnerability.html

PhoneInfoga – Advanced Information Gathering & OSINT Tool For Phone Numbers

PhoneInfoga is one of the most advanced tools to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with very good accuracy. Then search for footprints on search engines to try to find the VoIP provider or identify the owner.FeaturesCheck if phone number exists and is possibleGather standard information such as country, line type, and carrierOSINT footprinting using external APIs, Google Hacking, phone books & search enginesCheck for reputation reports, social media, disposable numbers and moreScan several numbers at onceUse custom formatting for more effective OSINT reconnaissanceAutomatic footprinting on several custom formatsDownload PhoneInfoga

Link: http://www.kitploit.com/2019/06/phoneinfoga-advanced-information.html

RapidScan – The Multi-Tool Web Vulnerability Scanner

Evolution:It is quite a fuss for a pentester to perform binge-tool-scanning (running security scanning tools one after the other) sans automation. Unless you are a pro at automating stuff, it is a herculean task to perform binge-scan for each and every engagement. The ultimate goal of this program is to solve this problem through automation; viz. running multiple scanning tools to discover vulnerabilities, effectively judge false-positives, collectively correlate results and saves precious time; all these under one roof.Enter RapidScan.Featuresone-step installation.executes a multitude of security scanning tools, does other custom coded checks and prints the results spontaneously.some of the tools include nmap, dnsrecon, wafw00f, uniscan, sslyze, fierce, lbd, theharvester, dnswalk, golismero etc executes under one entity.saves a lot of time, indeed a lot time!.checks for same vulnerabilities with multiple tools to help you zero-in on false positives effectively.legends to help you understand which tests may take longer time, so you can Ctrl+C to skip if needed.association with OWASP Top 10 2017 on the list of vulnerabilities discovered. (under development)critical, high, medium, low and informational classification of vulnerabilities.vulnerability definitions guides you what the vulnerability actually is and the threat it can pose. (under development)remediations tells you how to plug/fix the found vulnerability. (under development)executive summary gives you an overall context of the scan performed with critical, high, low and informational issues discovered. (under development)artificial intelligence to deploy tools automatically depending upon the issues found. for eg; automates the launch of wpscan and plecost tools when a wordpress installation is found. (under development)detailed comprehensive report in a portable document format (*.pdf) with complete details of the scans and tools used. (under development)FYI:program is still under development, works and currently supports 80 vulnerability tests.parallel processing is not yet implemented, may be coded as more tests gets introduced.Vulnerability ChecksDNS/HTTP Load Balancers & Web Application Firewalls.Checks for Joomla, WordPress and DrupalSSL related Vulnerabilities (HEARTBLEED, FREAK, POODLE, CCS Injection, LOGJAM, OCSP Stapling).Commonly Opened Ports.DNS Zone Transfers using multiple tools (Fierce, DNSWalk, DNSRecon, DNSEnum).Sub-Domains Brute Forcing.Open Directory/File Brute Forcing.Shallow XSS, SQLi and BSQLi Banners.Slow-Loris DoS Attack, LFI (Local File Inclusion), RFI (Remote File Inclusion) & RCE (Remote Code Execution).& more coming up…RequirementsPython 2.7Kali OS (Preferred, as it is shipped with almost all the tools) For other OS flavours, working on a docker support. Hang on.UsageDownload the script and give executable permissionswget -O rapidscan.py https://raw.githubusercontent.com/skavngr/rapidscan/master/rapidscan.py && chmod +x rapidscan.pyHelpOutputContributionhttps://gist.github.com/MarcDiethelm/7303312Download Rapidscan

Link: http://feedproxy.google.com/~r/PentestTools/~3/hfz-4xWFw40/rapidscan-multi-tool-web-vulnerability.html

WhatWeb v0.5.0 – Next Generation Web Scanner

Developed by Andrew Horton urbanadventurer and Brendan Coles bcolesLatest Release: v0.5.0. June 9th, 2019License: GPLv2This product is subject to the terms detailed in the license agreement. For more information about WhatWeb visit:Homepage: https://www.morningstarsecurity.com/research/whatwebWiki: https://github.com/urbanadventurer/WhatWeb/wiki/If you have any questions, comments or concerns regarding WhatWeb, please consult the documentation prior to contacting one of the developers. Your feedback is always welcome.About WhatWebWhatWeb identifies websites. Its goal is to answer the question, “What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.WhatWeb can be stealthy and fast, or thorough but slow. WhatWeb supports an aggression level to control the trade off between speed and reliability. When you visit a website in your browser, the transaction includes many hints of what web technologies are powering that website. Sometimes a single webpage visit contains enough information to identify a website but when it does not, WhatWeb can interrogate the website further. The default level of aggression, called ‘stealthy’, is the fastest and requires only one HTTP request of a website. This is suitable for scanning public websites. More aggressive modes were developed for use in penetration tests.Most WhatWeb plugins are thorough and recognise a range of cues from subtle to obvious. For example, most WordPress websites can be identified by the meta HTML tag, e.g. ”, but a minority of WordPress websites remove this identifying tag but this does not thwart WhatWeb. The WordPress WhatWeb plugin has over 15 tests, which include checking the favicon, default installation files, login pages, and checking for "/wp-content/" within relative links.FeaturesOver 1800 pluginsControl the trade off between speed/stealth and reliabilityPerformance tuning. Control how many websites to scan concurrently.Multiple log formats: Brief (greppable), Verbose (human readable), XML, JSON, MagicTree, RubyObject, MongoDB, ElasticSearch, SQL.Proxy support including TORCustom HTTP headersBasic HTTP authenticationControl over webpage redirectionIP address rangesFuzzy matchingResult certainty awarenessCustom plugins defined on the command lineIDN (International Domain Name) supportExample UsageUsing WhatWeb on a couple of websites (standard WhatWeb output is in colour):$ ./whatweb slashdot.org reddit.comhttp://reddit.com [302] HTTPServer[AkamaiGHost], RedirectLocation[http://www.reddit.com/], Via-Proxy[1.1 bc1], IP[173.223.232.64], Akamai-Global-Host, Country[UNITED STATES][US]http://slashdot.org [200] Script, HTTPServer[Unix][Apache/1.3.42 (Unix) mod_perl/1.31], Google-Analytics[GA][32013], Via-Proxy[1.1 bc5], UncommonHeaders[x-fry,x-varnish,x-xrds-location,slash_log_data], Apache[1.3.42][mod_perl/1.31], HTML5, IP[216.34.181.45], OpenGraphProtocol[100000696822412], X-Powered-By[Slash 2.005001], Title[Slashdot: News for nerds, stuff that matters], Email[canadaboy@nOspam.gmail.com,jbort@nww.com], Country[UNITED STATES][US]http://www.reddit.com/ [200] Frame, PasswordField[passwd,passwd2], Script, HTTPServer[‘; DROP TABLE servertypes; –], IP[203.97.86.202], JQuery, Cookies[reddit_first], Title[reddit: the voice of the internet — news before it happens], Country[NEW ZEALAND][NZ]Usage.$$$ $. .$$$ $. $$$$ $$. .$$$ $$$ .$$$$$$. .$$$$$$$$$$. $$$$ $$. .$$$$$$$. .$$$$$$. $ $$ $$$ $ $$ $$$ $ $$$$$$. $$$$$ $$$$$$ $ $$ $$$ $ $$ $$ $ $$$$$$.$ `$ $$$ $ `$ $$$ $ `$ $$$ $$’ $ `$ `$$ $ `$ $$$ $ `$ $ `$ $$$’$. $ $$$ $. $$$$$$ $. $$$$$$ `$ $. $ :’ $. $ $$$ $. $$$$ $. $$$$$.$::$ . $$$ $::$ $$$ $::$ $$$ $::$ $::$ . $$$ $::$ $::$ $$$$$;;$ $$$ $$$ $;;$ $$$ $;;$ $$$ $;;$ $;;$ $$$ $$$ $;;$ $;;$ $$$$$$$$$$ $$$$$ $$$$ $$$ $$$$ $$$ $$$$ $$$$$$ $$$$$ $$$$$$$$$ $$$$$$$$$’WhatWeb – Next generation web scanner version 0.5.0.Developed by Andrew Horton (urbanadventurer) and Brendan Coles (bcoles)Homepage: https://www.morningstarsecurity.com/research/whatwebUsage: whatweb [options] TARGET SELECTION: <TARGETs> Enter URLs, hostn ames, IP adddresses, filenames or IP ranges in CIDR, x.x.x-x, or x.x.x.x-x.x.x.x format. –input-file=FILE, -i Read targets from a file. You can pipe hostnames or URLs directly with -i /dev/stdin.TARGET MODIFICATION: –url-prefix Add a prefix to target URLs. –url-suffix Add a suffix to target URLs. –url-pattern Insert the targets into a URL. Requires –input-file, eg. www.example.com/%insert%/robots.txt AGGRESSION: The aggression level controls the trade-off between speed/stealth and reliability. –aggression, -a=LEVEL Set the aggression level. Default: 1. Aggression levels are: 1. Stealthy Makes one HTTP request per target. Also follows redirects. 3. Aggressive If a level 1 plugin is matched, additional requests will be made. 4. Heavy Makes a lot of HTTP requests per target. Aggressive tests from all plugins are used for all URLs.HTTP OPTIONS: –user-agent, -U=AGENT Identify as AGENT instead of WhatWeb/0.5.0. –header, -H Add an HTTP header. eg "Foo:Bar". Specifying a default header will replace it. Specifying an empty value, eg. "User-Agent:" will remove the header. –follow-redirect=WHEN Control when to follow redirects. WHEN may be `never’, `http-only’, `meta-only’, `same-site’, or `always’. Default: always. –max-redirects=NUM Maximum number of contiguous redirects. Default: 10.AUTHENTICATION: –user, -u=<user:password> HTTP basic authentication. –cookie, -c=COOKIES Provide cookies, e.g. ‘name=value; name2=value2′. –cookiejar=FILE Read cookies from a file.PROXY: –proxy <hostname[:po rt]> Set proxy hostname and port. Default: 8080. –proxy-user <username:password> Set proxy user and password.PLUGINS: –list-plugins, -l List all plugins. –info-plugins, -I=[SEARCH] List all plugins with detailed information. Optionally search with keywords in a comma delimited list. –search-plugins=STRING Search plugins for a keyword. –plugins, -p=LIST Select plugins. LIST is a comma delimited set of selected plugins. Default is all. Each element can be a directory, file or plugin name and can optionally have a modifier, eg. + or – Examples: +/tmp/moo.rb,+/tmp/foo.rb title,md5,+./plugins-disabled/ ./plugins-disabled,-md5 -p + is a shortcut for -p +plugins-disabled. –grep, -g=STRING|REGEXP Search for STRING or a Regular Expression. Shows only the results that match. Examples: –grep "hello" –grep "/he[l]*o/" –custom-plugin=DEFINITION\tDefine a custom plugin named Custom-Plugin, –custom-plugin=DEFINITION Define a custom plugin named Custom-Plugin, Examples: ":text=>’powered by abc’" ":version=>/powered[ ]?by ab[0-9]/" ":ghdb=>’intitle:abc \"powered by abc\"’" ":md5=>’8666257030b94d3bdb46e05945f60b42’" –dorks=PLUGIN List Google dorks for the selected plugin.OUTPUT: –verbose, -v Verbose output includes plugin descriptions. Use twice for debugging. –colour,–color=WHEN control whe ther colour is used. WHEN may be `never’, `always’, or `auto’. –quiet, -q Do not display brief logging to STDOUT. –no-errors Suppress error messages.LOGGING: –log-brief=FILE Log brief, one-line output. –log-verbose=FILE Log verbose output. –log-errors=FILE Log errors. –log-xml=FILE Log XML format. –log-json=FILE Log JSON format. –log-sql=FILE Log SQL INSERT statements. –log-sql-create=FILE Create SQL database tables. –log-json-verbose=FILE Log JSON Verbose format. –log-magictree=FILE Log MagicTree XML format. –log-object=FILE Log Ruby object inspection format. –log-mongo-database Name of the MongoDB database. –log-mongo-collection Name of the MongoDB collection. Default: whatweb. –log-mongo-host MongoDB hostname or IP address. Default: 0.0.0.0. –log-m ongo-username MongoDB username. Default: nil. –log-mongo-password MongoDB password. Default: nil. –log-elastic-index Name of the index to store results. Default: whatweb –log-elastic-host Host:port of the elastic http interface. Default: 127.0.0.1:9200 PERFORMANCE & STABILITY: –max-threads, -t Number of simultaneous threads. Default: 25. –open-timeout Time in seconds. Default: 15. –read-timeout Time in seconds. Default: 30. –wait=SECONDS Wait SECONDS between connections. This is useful when using a single thread.HELP & MISCELLANEOUS: –short-help Short usage help. –help, -h Complete usage help. –debug Raise errors in plugins. –version Display version information. (WhatWeb 0.5.0).EXAMPLE USAGE:* Scan example.com. ./whatweb exam ple.com* Scan reddit.com slashdot.org with verbose plugin descriptions. ./whatweb -v reddit.com slashdot.org* An aggressive scan of wired.com detects the exact version of WordPress. ./whatweb -a 3 www.wired.com* Scan the local network quickly and suppress errors. whatweb –no-errors 192.168.0.0/24* Scan the local network for https websites. whatweb –no-errors –url-prefix https:// 192.168.0.0/24* Scan for crossdomain policies in the Alexa Top 1000. ./whatweb -i plugin-development/alexa-top-100.txt \ –url-suffix /crossdomain.xml -p crossdomain_xmlLogging & OutputThe following types of logging are supported:–log-brief=FILE Brief, one-line, greppable format–log-verbose=FILE Verbose–log-xml=FILE XML format. XSL stylesheet is provided–log-json=FILE JSON format–log-json-verbose=FILE JSON verbose format–log-magictree=FILE MagicTree XML format–log-object=FILE Ruby object inspection format–log-mongo-database Name of the MongoDB database–log-mongo-collection Name of the MongoDB collection. Default: whatweb–log-mongo-host MongoDB hostname or IP address. Default: 0.0.0.0–log-mongo-username MongoDB username. Default: nil–log-mongo-password MongoDB password. Default: nil–log-elastic-index Name of the index to store results. Default: whatweb–log-elastic-host Host:port of the elastic http interface. Default: 127.0.0.1:9200–log-errors=FILE Log errors. This is usually printed to the screen in red.You can output to multiple logs simultaneously by specifying multiple command line logging options. Advanced users who want SQL output should read the source code to see unsupported features.PluginsMatches are made with:Text strings (case sensitive)Regular expressionsGoogle Hack Database queries (limited set of keywords)MD5 hashesURL recognitionHTML tag patternsCustom ruby code for passive and aggressive operationsTo list the plugins supported:$ ./whatweb -lWhatWeb Plugin ListPlugin Name – Description——————————————————————————–1024-CMS – 1024 is one of a few CMS’s leading the way with the implementation…360-Web-Manager – 360-Web-Manager3COM-NBX – 3COM NBX phone system. The NBX NetSet utility is a web interface i…3dcart – 3dcart – The 3dcart Shopping Cart Software is a complete ecommerce s…4D – 4D web application deployment server4images – 4images is a powerful web-based image gallery management system. Fe…… (truncated)Search PluginsTo view more detail about a plugin or search plugins for a keyword:$ ./whatweb -I phpBBWhatWeb Detailed Plugin ListSearching for phpBB================================================================================Plugin: phpBB——————————————————————————–Description: phpBB is a free forum Website: http://phpbb.org/Author: Andrew HortonVersion: 0.3Features: [Yes] Pattern Matching (7) [Yes] Version detection from pattern matching [Yes] Function for passive matches [Yes] Function for aggressive matches [Yes] Google Dorks (1)Google Dorks:[1] "Powered by phpBB"================================================================================Plugin SelectionAll plugins are loaded by default.Plugins can be selected by directories, files or plugin names as a comma delimited list with the -p or –plugin command line option.Each list item may have a modifier: + adds to the full set, – removes from the full set and no modifier overrides the defaults.Examples–plugins +plugins-disabled,-foobar–plugins +/tmp/moo.rb–plugins foobar (only select foobar)-p title,md5,+./plugins-disabled/-p ./plugins-disabled,-md5The –dorks command line option returns google dorks for the selected plugin. For example, –dorks wordpress returns "is proudly powered by WordPress"The –grep, -g command line option searches the target page for the selected string and returns a match in a plugin called Grep if it is found.AggressionWhatWeb features several levels of aggression. By default the aggression level is set to 1 (stealthy) which sends a single HTTP GET request and also follows redirects.–aggression, -a 1. Stealthy Makes one HTTP request per target. Also follows redirects. 2. Unused 3. Aggressive Can make a handful of HTTP requests per target. This triggers aggressive plugins for targets only when those plugins are identified with a level 1 request first. 4. Heavy Makes a lot of HTTP requests per target. Aggressive tests from all plugins are used for all URLs.Level 3 aggressive plugins will guess more URLs and perform actions that are potentially unsuitable without permission. WhatWeb currently does not support any intrusion/exploit level tests in plugins.An example of the different results between level 1 and level 3:A level 1, stealthy scan identifes that smartor.is-root.com/forum/ uses phpBB version 2:$ ./whatweb smartor.is-root.com/forum/http://smartor.is-root.com/forum/ [200] PasswordField[password], HTTPServer[Apache/2.2.15], PoweredBy[phpBB], Apache[2.2.15], IP[88.198.177.36], phpBB[2], PHP[5.2.13], X-Powered-By[PHP/5.2.13], Cookies[phpbb2mysql_data,phpbb2mysql_sid], Title[Smartors Mods Forums – Reloaded], Country[GERMANY][DE]A level 3, aggressive scan triggers additional tests in the phpBB plugin which identifies that the website uses phpBB version 2.0.20 or higher:$ ./whatweb -p plugins/phpbb.rb -a 3 smartor.is-root.com/forum/http://smartor.is-root.com/forum/ [200] phpBB[2,>2.0.20]Note the use of the -p argument to select only the phpBB plugin. It is advisable, but not mandatory, to select a specific plugin when attempting to fingerprint software versions in aggressive mode. This approach is far more stealthy as it will limit the number of requests.WhatWeb has no caching so if you use aggressive plugins on redirecting URLs you may fetch the same files multiple times.Performance & StabilityWhatWeb features several options to increase performance and stability.–max-threads, -t Number of simultaneous threads. Default: 25.–open-timeout Time in seconds. Default: 15–read-timeout Time in seconds. Default: 30–wait=SECONDS Wait SECONDS between connections This is useful when using a single thread.The –wait and –max-threads commands can be used to assist in IDS evasion.Changing the user-agent using the -U or –user-agent command line option will avoid the Snort IDS rule for WhatWeb.If you are scanning ranges of IP addresses, it is much more efficient to use a port scanner like massscan to discover which have port 80 open before scanning with WhatWeb.Character set detection, with the Charset plugin dramatically decreases performance by requiring more CPU. This is required by JSON and MongoDB logging.Optional DependenciesTo enable MongoDB logging install the mongo gem. gem install mongoTo enable character set detection and MongoDB logging install the rchardet gem. gem install rchardet cp plugins-disabled/charset.rb my-plugins/Writing PluginsPlugins are easy to write. Start by going through the plugin tutorials in the my-plugins/ folder.Plugin Tutorials.After progressing through the tutorials read through the Development section of the wiki.Sources for Plugin WritingHow to Develop WhatWeb Plugins (not up to date)Updates & Additional InformationThe WhatWeb development build features regular updates.Check the development branches for unreleased updates.Browse the wiki for more documentation and advanced usage techniques.Wiki: https://github.com/urbanadventurer/WhatWeb/wiki/Release HistoryVersion 0.5.0 Released June 9th, 2019Version 0.4.9 Released November 23rd, 2017Version 0.4.8-dev (Continuous release from 2012 to 2017)Version 0.4.7 Released April 5th, 2011Version 0.4.6 Released March 25th, 2011Version 0.4.5 Released August 17th, 2010Version 0.4.4 Released June 29th, 2010Version 0.4.3 Released May 24th, 2010Version 0.4.2 Released April 30th, 2010Version 0.4.1 Released April 28th, 2010Version 0.4 Released March 14th, 2010Version 0.3 Released at Kiwicon III (kiwicon.org), November 2nd, 2009CreditsDevelopersAndrew Horton (@urbanadventurer)Brendan Coles (@bcoles)ContributorsThank you to the following people who have contributed to WhatWeb.Emilio CasbasLouis NyffeneggerPatrik Wallström (@pawal)Caleb Anderson (@dirtyfilthy)Tonmoy SaikiaAung Khant (@yehgdotnet)Erik Inge Bolsønk@dsigned.grSteve Milner (@ashcrow)Michal AmbrozGremwellSagar Prakash Junnarkar (@sagarjunnarkar)GertBergerQuintin PoirierEric Sesterhenndengjw (@jawa)Pedro Worcel (@droop)Matthieu Keller (@maggick)Peter (2pvdl)Napz (@RootCon)@nilx042Fabian Affolter (@fabaff)Andrew Silvernail (@buff3r)Andre Ricardo (@andrericardo)nikoskPatrick Thomas (@coffeetocode)Guillaume Delcaour (@guikcd)Sean (@wiifm69)Matthieu Keller (@maggick)Raul (@raurodse)Andrew Petro (@apetro)Artem Taranyuk (@610)Matti Paksula (@matti)Tim Smith (@tas50)Sarthak Munshi (@saru95)@rdubourguais@SlivTaMere@Code0x58@iGeek098@andreas-becker@csalazar@golewski@Allactaga@lins05@eliasdorneles@sigitdewanto@elcodigok@SlivTaMere@anozoozianBhavin Senjaliya (@bhavin1223)Janosch Maier (@Phylu)@rmaksimovNaglis Jonaitis (@naglis)Igor Rzegocki (@ajgon)Please let me know if I need to add any more names.Download WhatWeb

Link: http://feedproxy.google.com/~r/PentestTools/~3/47Pvc2gPpgM/whatweb-v050-next-generation-web-scanner.html

Vulners Scanner for Android – Passive Vulnerability Scanning Based On Software Version Fingerprint

Vulners Scanner is developed by Vulners Team, the founders and maintainers of one of the world largest security databases.It implements technology of passive vulnerability scanning based on software version fingerprint.Is it legal?Absolutely.The application does not perform any malicious requests, fuzzing or any other interactions that differ from the common browser behavior.Is it accurate?Vulners Scanner is using passive method of vulnerability detection, that’s why there is a risk of false positives.Its report cannot be used as evidence of the vulnerability present or as a compliance check.For the best result found vulnerabilities should be validated with user interaction using advanced software like PortSwigger Burp Suite with Vulners plugin.Download Vulners Scanner for Android

Link: http://feedproxy.google.com/~r/PentestTools/~3/jjXLZCER0Bk/vulners-scanner-for-android-passive.html

Versionscan – A PHP Version Scanner For Reporting Possible Vulnerabilities

Versionscan is a tool for evaluating your currently installed PHP version and checking it against known CVEs and the versions they were fixed in to report back potential issues.PLEASE NOTE: Work is still in progress to adapt the tool to linux distributions that backport security fixes. As of right now, this only reports back for the straight up version reported.InstallationUsing Composer{ “require": { "psecio/versionscan": "dev-master" }}The only current dependency is the Symfony console.UsageTo run the scan against your current PHP version, use:bin/versionscanThe script will check the PHP_VERSION for the current instance and generate the pass/fail results. The output looks similar to:Executing against version: 5.4.24+——–+—————+——+——————————————————————————————————+| Status | CVE ID | Risk | Summary |+——–+—————+——+——————————————————————————————————+| FAIL | CVE-2014-3597 | 6.8 | Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 … || FAIL | CVE-2014-3587 | 4.3 | Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in… |Results will be reported back colorized as well to easily show the pass/fail of the check.ParametersThere are several parameters that can be given to the tool to configure its scans and results:PHP VersionIf you’d like to define a PHP version to check other than the one the script finds itself, you can use the php-version parameter:bin/versionscan scan –php-version=4.3.2Report Only FailuresYou can also tell the versionscan to only report back the failures and not the passing tests:bin/versionscan scan –fail-onlySorting resultsYou can also sort the results either by the CVE ID or by severity (risk rating), with the sort parameter and either the "cve" or "risk" value:bin/versionscan scan –sort=riskOutput formatsBy default versionscan will output information directly to the console in a human-readable result. You can also specify other output formats that may be easier to parse programatically (like JSON). Use the –format option to change the output:vendor/bin/versionscan scan –php-version=5.5 –format=jsonSupported output formats are console, json, xml and html.The HTML output format requires an –output option of the directory to write the file:vendor/bin/versionscan scan –php-version=5.5 –format=html –output=/var/www/outputThe result will be written to a file named something like versionscan-output-20150808.htmlDownload Versionscan

Link: http://www.kitploit.com/2019/05/versionscan-php-version-scanner-for.html

Scavenger – Crawler Searching For Credential Leaks On Different Paste Sites

Just the code of my OSINT bot searching for sensitive data leaks on different paste sites.Search terms:credentialsprivate RSA keysWordpress configuration filesMySQL connect stringsonion linkslinks to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX)Keep in mind: This bot is not beautiful. The code is not complete so far. Some parts like integrating the credentials in a database are missing in this online repository. If you want to use this code, feel free to do so. Keep in mind you have to customize things to make it run on your system.IMPORTANTThe bot can be run in two major modes:API modeScraping mode (using TOR)Is highly recommend using the API mode. It is the intended method of scraping pastes from Pastebin.com and it is just fair to do so. The only thing you need is a Pastebin.com PRO account and whitelist your public IP on their site.To start the bot in API mode just run the program in the following way:python run.py -0However, it is not always possible to use this intended method, as you might be in NAT mode and therefore you do not have an IP exclusively (whitelisting your IP is not reasonable here). That is the reason beacuse is implemented a scraping mode where fast TOR cycles in combination with reasonable user agents are used to avoid IP blocking and Cloudflare captchas.To start the bot in scraping mode run it in the following way:python run.py -1Important note: you need the TOR service installed on your system listening on port 9050. Additionally you need to add the following line to your /etc/tor/torrc file.MaxCircuitDirtiness 30This sets the maximum cycle time of TOR to 30 seconds.UsageTo learn how to use the software you just need to call the run.py script with the -h/–help argument.python run.py -hOutput: _________ / _____/ ____ _____ ___ __ ____ ____ ____ ___________ \_____ \_/ ___\\__ \\ \/ // __ \ / \ / ___\_/ __ \_ __ \ / \ \___ / __ \\ /\ ___/| | \/ /_/ > ___/| | \//_______ /\___ >____ /\_/ \___ >___| /\___ / \___ >__| \/ \/ \/ \/ \//_____/ \/usage: run.py [-h] [-0] [-1] [-2] [-ps]Control software for the different modules of this paste crawler.optional arguments: -h, –help show this help message and exit -0, –pastebinCOMapi Activate Pastebin.com module (using API) -1, –pastebinCOMtor Activate Pastebin.com module (standard scraping using TOR to avoid IP blocking) -2, –pasteORG Activate Paste.org module -ps, –pStatistic Show a simple statistic.So far I only implemented the Pastebin.com module and I am working on Paste.org. I will add more modules and update this script over time.Just start the Pastebin.com module separately…python P_bot.pyPastes are stored in data/raw_pastes until they are more then 48000. When they are more then 48000 they get filtered, ziped and moved to the archive folder. All pastes which contain credentials are stored in data/files_with_passwordsKeep in mind that at the moment only combinations like USERNAME:PASSWORD and other simple combinations are detected. However, there is a tool to search for proxy logs containing credentials.You can search for proxy logs (URLs with username and password combinations) by using getProxyLogs.py filepython getProxyLogs.py data/raw_pastesIf you want to search the raw data for specific strings you can do it using searchRaw.py (really slow).python searchRaw.py SEARCHSTRINGTo see statistics of the bot just callpython status.py The file findSensitiveData.py searches a folder (with pastes) for sensitive data like credit cards, RSA keys or mysqli_connect strings. Keep in mind that this script uses grep and therefore is really slow on a big amount of paste files. If you want to analyze a big amount of pastes I recommend an ELK-Stack.python findSensitiveData.py data/raw_pastes There are two scripts stalk_user.py/stalk_user_wrapper.py which can be used to monitor a specific twitter user. This means every tweet he posts gets saved and every containing URL gets downloaded. To start the stalker just execute the wrapper.python stalk_user_wrapper.pyDownload Scavenger

Link: http://feedproxy.google.com/~r/PentestTools/~3/TibOQ-WmQVE/scavenger-crawler-searching-for.html

Bandit – Tool Designed To Find Common Security Issues In Python Code

Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit has finished scanning all the files it generates a report.Bandit was originally developed within the OpenStack Security Project and later rehomed to PyCQA.InstallationBandit is distributed on PyPI. The best way to install it is with pip:Create a virtual environment (optional):virtualenv bandit-envInstall Bandit:pip install bandit# Or if you’re working with a Python 3 projectpip3 install banditRun Bandit:bandit -r path/to/your/codeBandit can also be installed from source. To do so, download the source tarball from PyPI, then install it:python setup.py install UsageExample usage across a code tree:bandit -r ~/your_repos/projectExample usage across the examples/ directory, showing three lines of context and only reporting on the high-severity issues:bandit examples/*.py -n 3 -lllBandit can be run with profiles. To run Bandit against the examples directory using only the plugins listed in the ShellInjection profile:bandit examples/*.py -p ShellInjectionBandit also supports passing lines of code to scan using standard input. To run Bandit with standard input:cat examples/imports.py | bandit -Usage:$ bandit -husage: bandit [-h] [-r] [-a {file,vuln}] [-n CONTEXT_LINES] [-c CONFIG_FILE] [-p PROFILE] [-t TESTS] [-s SKIPS] [-l] [-i] [-f {csv,custom,html,json,screen,txt,xml,yaml}] [–msg-template MSG_TEMPLATE] [-o [OUTPUT_FILE]] [-v] [-d] [-q] [–ignore-nosec] [-x EXCLUDED_PATHS] [-b BASELINE] [–ini INI_PATH] [–version] [targets [targets …]]Bandit – a Python source code security analyzerpositional arguments: targets source file(s) or directory(s) to be testedoptional arguments: -h, –help show this help message and exit -r, –recursive find and process files in subdirectories -a {file,vuln}, –aggregate {file,vuln} aggregate output by vulnerability (default) or by filename -n CONTEXT_LINES, –number CONTEXT_LINES maximum number of code lines to output for each issue -c CONFIG_FILE, –configfile CONFIG_FILE optional config file to use for selecting plugins and overriding defaults -p PROFILE, –profile PROFILE profile to use (defaults to executing all tests) -t TESTS, –tests TESTS comma-separated list of test IDs to run -s SKIPS, –skip SKIPS comma-separated list of test IDs to skip -l, –level report only issues of a given severity level or higher (-l for LOW, -ll for MEDIUM, -lll for HIGH) -i, –confidence report only issues of a given confidence level or higher (-i for LOW, -ii for MEDIUM, -iii for HIGH) -f {cs v,custom,html,json,screen,txt,xml,yaml}, –format {csv,custom,html,json,screen,txt,xml,yaml} specify output format –msg-template MSG_TEMPLATE specify output message template (only usable with –format custom), see CUSTOM FORMAT section for list of available values -o [OUTPUT_FILE], –output [OUTPUT_FILE] write report to filename -v, –verbose output extra information like excluded and included files -d, –debug turn on debug mode -q, –quiet, –silent only show output in the case of an error –ignore-nosec do not skip lines with # nosec comments -x EXCLUDED_PATHS, –exclude EXCLUDED_PATHS comma-separated list of paths (glob patterns supported) to exclude from scan (not e that these are in addition to the excluded paths provided in the config file) -b BASELINE, –baseline BASELINE path of a baseline report to compare against (only JSON-formatted files are accepted) –ini INI_PATH path to a .bandit file that supplies command line arguments –version show program’s version number and exitCUSTOM FORMATTING—————–Available tags: {abspath}, {relpath}, {line}, {test_id}, {severity}, {msg}, {confidence}, {range}Example usage: Default template: bandit -r examples/ –format custom –msg-template \ “{abspath}:{line}: {test_id}[bandit]: {severity}: {msg}" Provides same output as: bandit -r examples/ –format custom Tags can also be formatted in python string.format() style: ban dit -r examples/ –format custom –msg-template \ "{relpath:20.20s}: {line:03}: {test_id:^8}: DEFECT: {msg:>20}" See python documentation for more information about formatting style: https://docs.python.org/3.4/library/string.htmlThe following tests were discovered and loaded:———————————————– B101 assert_used B102 exec_used B103 set_bad_file_permissions B104 hardcoded_bind_all_interfaces B105 hardcoded_password_string B106 hardcoded_password_funcarg B107 hardcoded_password_default B108 hardcoded_tmp_directory B110 try_except_pass B112 try_except_continue B201 flask_debug_true B301 pickle B302 marshal B303 md5 B304 ciphers B305 cipher_modes B306 mktemp_q B307 eval B308 mark_safe B309 httpsconnection B310 urllib_urlopen B311 random B312 telnetli b B313 xml_bad_cElementTree B314 xml_bad_ElementTree B315 xml_bad_expatreader B316 xml_bad_expatbuilder B317 xml_bad_sax B318 xml_bad_minidom B319 xml_bad_pulldom B320 xml_bad_etree B321 ftplib B322 input B323 unverified_context B324 hashlib_new_insecure_functions B325 tempnam B401 import_telnetlib B402 import_ftplib B403 import_pickle B404 import_subprocess B405 import_xml_etree B406 import_xml_sax B407 import_xml_expat B408 import_xml_minidom B409 import_xml_pulldom B410 import_lxml B411 import_xmlrpclib B412 import_httpoxy B413 import_pycrypto B501 request_with_no_cert_validation B502 ssl_with_bad_version B503 ssl_with_bad_defaults B504 ssl_with_no_version B505 weak_cryptographic_key B506 yaml_load B507 ssh_no_host_key_verification B601 paramiko_ calls B602 subprocess_popen_with_shell_equals_true B603 subprocess_without_shell_equals_true B604 any_other_function_with_shell_equals_true B605 start_process_with_a_shell B606 start_process_with_no_shell B607 start_process_with_partial_path B608 hardcoded_sql_expressions B609 linux_commands_wildcard_injection B610 django_extra_used B611 django_rawsql_used B701 jinja2_autoescape_false B702 use_of_mako_templates B703 django_mark_safe BaselineBandit allows specifying the path of a baseline report to compare against using the base line argument (i.e. -b BASELINE or –baseline BASELINE).bandit -b BASELINEThis is useful for ignoring known vulnerabilities that you believe are non-issues (e.g. a cleartext password in a unit test). To generate a baseline report simply run Bandit with the output format set to json (only JSON-formatted files are accepted as a baseline) and output file path specified:bandit -f json -o PATH_TO_OUTPUT_FILE Version control integrationUse pre-commit. Once you have it installed, add this to the .pre-commit-config.yaml in your repository (be sure to update rev to point to a real git tag/revision!):repos:- repo: https://github.com/PyCQA/bandit rev: ” # Update me! hooks: – id: banditThen run pre-commit install and you’re ready to go. ConfigurationAn optional config file may be supplied and may include:lists of tests which should or shouldn’t be runexclude_dirs – sections of the path, that if matched, will be excluded from scanning (glob patterns supported)overridden plugin settings – may provide different settings for some plugins Per Project Command Line ArgsProjects may include a .bandit file that specifies command line arguments that should be supplied for that project. The currently supported arguments are:targets: comma separated list of target dirs/files to run bandit onexclude: comma separated list of excluded pathsskips: comma separated list of tests to skiptests: comma separated list of tests to runTo use this, put a .bandit file in your project’s directory. For example:[bandit]exclude: /test[bandit]tests: B101,B102,B301 ExclusionsIn the event that a line of code triggers a Bandit issue, but that the line has been reviewed and the issue is a false positive or acceptable for some other reason, the line can be marked with a # nosec and any results associated with it will not be reported.For example, although this line may cause Bandit to report a potential security issue, it will not be reported:self.process = subprocess.Popen(‘/bin/echo’, shell=True) # nosec Vulnerability TestsVulnerability tests or "plugins" are defined in files in the plugins directory.Tests are written in Python and are autodiscovered from the plugins directory. Each test can examine one or more type of Python statements. Tests are marked with the types of Python statements they examine (for example: function call, string, import, etc).Tests are executed by the BanditNodeVisitor object as it visits each node in the AST.Test results are maintained in the BanditResultStore and aggregated for output at the completion of a test run. Writing TestsTo write a test:Identify a vulnerability to build a test for, and create a new file in examples/ that contains one or more cases of that vulnerability.Consider the vulnerability you’re testing for, mark the function with one or more of the appropriate decorators: – @checks(‘Call’) – @checks(‘Import’, ‘ImportFrom’) – @checks(‘Str’)Create a new Python source file to contain your test, you can reference existing tests for examples.The function that you create should take a parameter "context" which is an instance of the context class you can query for information about the current element being examined. You can also get the raw AST node for more advanced use cases. Please see the context.py file for more.Extend your Bandit configuration file as needed to support your new test.Execute Bandit against the test file you defined in examples/ and ensure that it detects the vulnerability. Consider variations on how this vulnerability might present itself and extend the example file and the test function accordingly. Extending BanditBandit allows users to write and register extensions for checks and formatters. Bandit will load plugins from two entry-points:bandit.formattersbandit.pluginsFormatters need to accept 4 things:result_store: An instance of bandit.core.BanditResultStorefile_list: The list of files which were inspected in the scopescores: The scores awarded to each file in the scopeexcluded_files: The list of files that were excluded from the scopePlugins tend to take advantage of the bandit.checks decorator which allows the author to register a check for a particular type of AST node. For example@bandit.checks(‘Call’)def prohibit_unsafe_deserialization(context): if ‘unsafe_load’ in context.call_function_name_qual: return bandit.Issue( severity=bandit.HIGH, confidence=bandit.HIGH, text="Unsafe deserialization detected." )To register your plugin, you have two options:If you’re using setuptools directly, add something like the following to your setup call: # If you have an imaginary bson formatter in the bandit_bson module# and a function called `formatter`.entry_points={‘bandit.formatters’: [‘bson = bandit_bson:formatter’]}# Or a check for using mako templates in bandit_mako thatentry_points={‘bandit.plugins’: [‘mako = bandit_mako’]}If you’re using pbr, add something like the following to your setup.cfg file: [entry_points]bandit.formatters = bson = bandit_bson:formatterbandit.plugins = mako = bandit_mako ContributingContributions to Bandit are always welcome!The best way to get started with Bandit is to grab the source:git clone https://github.com/PyCQA/bandit.gitYou can test any changes with tox:pip install toxtox -e pep8tox -e py27tox -e py35tox -e docstox -e coverPlease make PR requests using your own branch, and not master:git checkout -b mychangegit push origin mychange Reporting BugsBugs should be reported on github. To file a bug against Bandit, visit: https://github.com/PyCQA/bandit/issues Under Which Version of Python Should I Install Bandit?The answer to this question depends on the project(s) you will be running Bandit against. If your project is only compatible with Python 2.7, you should install Bandit to run under Python 2.7. If your project is only compatible with Python 3.5, then use 3.5 respectively. If your project supports both, you could run Bandit with both versions but you don’t have to.Bandit uses the ast module from Python’s standard library in order to analyze your Python code. The ast module is only able to parse Python code that is valid in the version of the interpreter from which it is imported. In other words, if you try to use Python 2.7’s ast module to parse code written for 3.5 that uses, for example, yield from with asyncio, then you’ll have syntax errors that will prevent Bandit from working properly. Alternatively, if you are relying on 2.7’s octal notation of 0777 then you’ll have a syntax error if you run Bandit on 3.x. ReferencesBandit docs: https://bandit.readthedocs.io/en/latest/Python AST module documentation: https://docs.python.org/2/library/ast.htmlGreen Tree Snakes – the missing Python AST docs: https://greentreesnakes.readthedocs.org/en/latest/Documentation of the various types of AST nodes that Bandit currently covers or could be extended to cover: https://greentreesnakes.readthedocs.org/en/latest/nodes.htmlDownload Bandit

Link: http://feedproxy.google.com/~r/PentestTools/~3/wb0Wk6QXXFo/bandit-tool-designed-to-find-common.html

Trigmap – A Wrapper For Nmap To Automate The Pentest

Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms.DetailsTrigmap can performs several tasks using Nmap scripting engine (NSE):Port ScanService and Version DetectionWeb Resources EnumerationVulnerability AssessmentCommon Vulnerabilities TestCommon Exploits TestDictionary Attacks Against Active ServicesDefault Credentials TestUsageTrigmap can be used in two ways:Interactive mode:trigmap [ENTER], and the script does the restNON-interactive mode:trigmap -h|–host [-tp|–tcp TCP ports] [-up|–udp UDP ports] [-f|–file file path] [-s|–speed time profile] [-n|–nic NIC] [-p|–phase phases]If you want to see the help: trigmap –help to print this helperFor more screenshots see the relative directory of the repository.Dir HierarchyCustomizationIt’s possible to customize the script by changing the value of variables at the beginning of the file. In particularly you can choose the wordlists used by the Nmap scripts and the most important Nmap scan parameters (ping, scan, timing and script).################################################# PARAMETERS #################################################GENERAL_USER_LIST=’general_user_wordlist_short.txt’WIN_USER_LIST=’win_user_wordlist_short.txt’UNIX_USER_LIST=’unix_user_wordlist_short.txt’SHORT_PASS_LIST=’fasttrack.txt’LONG_PASS_LIST=’rockyou.txt’################################################# NMAP SETTING ################################################## PE (echo req), PP (timestamp-request)# you can add a port on every ping scanNMAP_PING=’-PE -PS80,443,22,25,110,445 -PU -PP -PA80,443,22,25,110,445’NMAP_OTHER=’-sV –allports -O –fuzzy –min-hostgroup 256’SCRIPT_VA='(auth or vuln or exploit or http-* and not dos)’SCRIPT_BRUTE='(auth or vuln or exploit or http-* or brute and not dos)’SCRIPT_ARGS=”userdb=$GENERAL_USER_LIST,passdb=$SHORT_PAS S_LIST"CUSTOM_SCAN=’–max-retries 3 –min-rate 250′ # LIKE UNICORNSCANTwin BrotherThis project is very similar to Kaboom, but it has a different philosophy; infact, it uses only Nmap, while Kaboom uses different tools, one for each task. The peculiarity of Trigmap is the portability and the efficient, but it’s recommended to use both the tools to scan the targets in a such way to gather more evidence with different tools (redundancy and reliability).Download Trigmap

Link: http://feedproxy.google.com/~r/PentestTools/~3/4v03LmjMcd4/trigmap-wrapper-for-nmap-to-automate.html

Sn1per v7.0 – Automated Pentest Framework For Offensive Security Experts

Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security’s premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes. For more information regarding Sn1per Professional, go to https://xerosecurity.com.SN1PER PROFESSIONAL FEATURES:Professional reporting interfaceSlideshow for all gathered screenshotsSearchable and sortable DNS, IP and open port databaseDetailed host reportsNMap HTML host reportsQuick links to online recon tools and Google hacking queriesTakeovers and Email SecurityHTML5 NotepadORDER SN1PER PROFESSIONAL:To obtain a Sn1per Professional license, go to https://xerosecurity.com.DEMO VIDEO:SN1PER COMMUNITY FEATURES:Automatically collects basic recon (ie. whois, ping, DNS, etc.)Automatically launches Google hacking queries against a target domainAutomatically enumerates open ports via NMap port scanningAutomatically brute forces sub-domains, gathers DNS info and checks for zone transfersAutomatically checks for sub-domain hijackingAutomatically runs targeted NMap scripts against open portsAutomatically runs targeted Metasploit scan and exploit modulesAutomatically scans all web applications for common vulnerabilitiesAutomatically brute forces ALL open servicesAutomatically test for anonymous FTP accessAutomatically runs WPScan, Arachni and Nikto for all web servicesAutomatically enumerates NFS sharesAutomatically test for anonymous LDAP accessAutomatically enumerate SSL/TLS ciphers, protocols and vulnerabilitiesAutomatically enumerate SNMP community strings, services and usersAutomatically list SMB users and shares, check for NULL sessions and exploit MS08-067Automatically exploit vulnerable JBoss, Java RMI and Tomcat serversAutomatically tests for open X11 serversAuto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat CredsPerforms high level enumeration of multiple hosts and subnetsAutomatically integrates with Metasploit Pro, MSFConsole and Zenmap for reportingAutomatically gathers screenshots of all web sitesCreate individual workspaces to store all scan outputEXPLOITS:Drupal RESTful Web Services unserialize() SA-CORE-2019-003Apache Struts: S2-057 (CVE-2018-11776): Security updates available for Apache StrutsDrupal: CVE-2018-7600: Remote Code Execution – SA-CORE-2018-002GPON Routers – Authentication Bypass / Command Injection CVE-2018-10561MS17-010 EternalBlue SMB Remote Windows Kernel Pool CorruptionApache Tomcat: Remote Code Execution (CVE-2017-12617)Oracle WebLogic wls-wsat Component Deserialization Remote Code Execution CVE-2017-10271Apache Struts Content-Type arbitrary command execution (CVE-2017-5638)Apache Struts 2 Framework Checks – REST plugin with XStream handler (CVE-2017-9805)Apache Struts Content-Type arbitrary command execution (CVE-2017-5638)Microsoft IIS WebDav ScStoragePathFromUrl Overflow CVE-2017-7269ManageEngine Desktop Central 9 FileUploadServlet ConnectionId Vulnerability CVE-2015-8249Shellshock Bash Shell remote code execution CVE-2014-6271HeartBleed OpenSSL Detection CVE-2014-0160MS12-020: Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387)Tomcat Application Manager Default Ovwebusr Password Vulnerability CVE-2009-3843MS08-067 Microsoft Server Service Relative Path Stack CorruptionWebmin File Disclosure CVE-2006-3392VsFTPd 2.3.4 BackdoorProFTPd 1.3.3C BackdoorMS03-026 Microsoft RPC DCOM Interface OverflowDistCC Daemon Command ExecutionJBoss Java De-SerializationHTTP Writable Path PUT/DELETE File AccessApache Tomcat User EnumerationTomcat Application Manager Login BruteforceJenkins-CI EnumerationHTTP WebDAV ScannerAndroid Insecure ADBAnonymous FTP AccessPHPMyAdmin BackdoorPHPMyAdmin Auth BypassOpenSSH User EnumerationLibSSH Auth BypassSMTP User EnumerationPublic NFS MountsKALI LINUX INSTALL:bash install.shUBUNTU/DEBIAN/PARROT INSTALL:bash install_debian_ubuntu.shDOCKER INSTALL:docker build DockerfileUSAGE:[*] NORMAL MODEsniper -t|–target [*] NORMAL MODE + OSINT + RECON + FULL PORT SCAN + BRUTE FORCEsniper -t|–target <TARGET> -o|–osint -re|–recon -fp|–fullportonly -b|–bruteforce[*] STEALTH MODE + OSINT + RECONsniper -t|–target <TARGET> -m|–mode stealth -o|–osint -re|–recon[*] DISCOVER MODEsniper -t|–target <CIDR> -m|–mode discover -w|–workspace <WORSPACE_ALIAS>[*] FLYOVER MODEsniper -t|–target <TARGET> -m|–mode flyover -w|–workspace <WORKSPACE_ALIAS>[*] AIRSTRIKE MODEsniper -f|–file /full/path/to/targets.txt -m|–mode airstrike[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLEDsniper -f–file /full/path/to/targets.txt -m|–mode nuke -w|–workspace <WORKSPACE_ALIAS>[*] SCAN ONLY SPECIFIC PORTsniper -t|–target <TA RGET> -m port -p|–port <portnum>[*] FULLPORTONLY SCAN MODEsniper -t|–target <TARGET> -fp|–fullportonly[*] PORT SCAN MODEsniper -t|–target <TARGET> -m|–mode port -p|–port <PORT_NUM>[*] WEB MODE – PORT 80 + 443 ONLY!sniper -t|–target <TARGET> -m|–mode web[*] HTTP WEB PORT HTTP MODEsniper -t|–target <TARGET> -m|–mode webporthttp -p|–port <port>[*] HTTPS WEB PORT HTTPS MODEsniper -t|–target <TARGET> -m|–mode webporthttps -p|–port <port>[*] WEBSCAN MODEsniper -t|–target <TARGET> -m|–mode webscan[*] ENABLE BRUTEFORCEsniper -t|–target <TARGET> -b|–bruteforce[*] ENABLE LOOT IMPORTING INTO METASPLOITsniper -t|–target <TARGET>[*] LOOT REIMPORT FUNCTIONsniper -w <WORKSPACE_ALIAS> –reimport[*] LOOT REIMPORTALL FUNCTIONsniper -w <WORKSPACE_ALIAS& gt; –reimportall[*] DELETE WORKSPACEsniper -w <WORKSPACE_ALIAS> -d[*] DELETE HOST FROM WORKSPACEsniper -w <WORKSPACE_ALIAS> -t <TARGET> -dh[*] SCHEDULED SCANS’sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly'[*] SCAN STATUSsniper –status[*] UPDATE SNIPERsniper -u|–updateMODES:NORMAL: Performs basic scan of targets and open ports using both active and passive checks for optimal performance.STEALTH: Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking.FLYOVER: Fast multi-threaded high level scans of multiple targets (useful for collecting high level data on many hosts quickly).AIRSTRIKE: Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning.NUKE: Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke.DISCOVER: Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.PORT: Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.FULLPORTONLY: Performs a full detailed port scan and saves results to XML.WEB: Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly.WEBPORTHTTP: Launches a full HTTP web application scan against a specific host and port.WEBPORTHTTPS: Launches a full HTTPS web application scan against a specific host and port.WEBSCAN: Launches a full HTTP & HTTPS web application scan against via Burpsuite and Arachni.SAMPLE REPORT:https://gist.github.com/1N3/8214ec2da2c91691bcbcDownload Sn1per

Link: http://feedproxy.google.com/~r/PentestTools/~3/IoUOymJezTw/sn1per-v70-automated-pentest-framework.html