Showing posts with label Vulnerability Analysis. Show all posts
Showing posts with label Vulnerability Analysis. Show all posts

Wednesday, July 24, 2019

Whatweb web app vulnerability Scanner 0.4.9

welcome to hacking a rise in this post i will show u how to use whatweb a simple vulnerability scanner pre installed on kali linux

What is Whatsweb

WhatWeb is a next generation web scanner. WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1000 plugins, each to recognise something different. Find more here

Whatweb can identify all sorts of information about a live website, like:

Platform
CMS platform
Type of Script
Google Analytics
Web server Platform
IP address, Country
900+ Plugins & their libraries used
Server Headers, Cookies and a lot more.

Whatweb offers both passive scanning and aggressive testing. Passive scanning just extracts data from HTTP headers simulating a normal visit. Aggressive options get deeper with recursion & various types of queries & identify all technologies just like a vulnerability scanner.
Options

Syntax of whatweb

Options is deprecated. Only major options or listed. Visit tool homepage for complete options

TARGET SELECTION:
Enter URLs, filenames or nmap-format IP ranges.
–input-file=FILE, -i Identify URLs found in FILE, eg. -i /dev/stdin

TARGET MODIFICATION:
–url-prefix Add a prefix to target URLs
–url-suffix Add a suffix to target URLs
–url-pattern Insert the targets into a URL. Requires –input-file,

AGGRESSION:
The aggression level controls the trade-off between speed/stealth and reliability.
–aggression, -a=LEVEL Set the aggression level. Default: 1
Aggression levels are: 1,2,3 & 4

HTTP OPTIONS:
–user-agent, -U=AGENT Identify as AGENT instead of WhatWeb/0.4.8-dev.
–follow-redirect=WHEN Control when to follow redirects.Default: always
–max-redirects=NUM Maximum number of contiguous redirects. Default: 10

AUTHENTICATION:
–user, -u= HTTP basic authentication
Add session cookies with –header, e.g. –header “Cookie: SESSID=1a2b3c;”

PROXY:
–proxy Set proxy hostname and port Default: 8080
–proxy-user Set proxy user and password

PLUGINS:
–list-plugins, -l List all plugins

OUTPUT:
–verbose, -v Verbose output includes plugin descriptions. Use twice for debugging.
–colour,–color=WHEN control whether colour is used. WHEN=’always’, ‘never’ or ‘auto’
–quiet, -q Do not display brief logging to STDOUT
–no-errors Suppress error messages

LOGGING:
–log-brief=FILE Log brief, one-line output
–log-verbose=FILE Log verbose output
–log-xml=FILE Log XML format

PERFORMANCE & STABILITY:
–max-threads, -t Number of simultaneous threads. Default: 25.
–open-timeout Time in seconds. Default: 15
–read-timeout Time in seconds. Default: 30
–wait=SECONDS Wait SECONDS between connections

HELP & MISCELLANEOUS:
–help, -h This help
–debug Raise errors in plugins
–version Display version information. (WhatWeb 0.4.8-dev)

How to use Whatsweb

open terminal and type whatweb https://hackingarise20.home.blog/
Hacking A Rise whatwebscan1-300x43

what see a little more detail use the -v Display version information whatweb -v https://hackingarise20.home.blog
Hacking A Rise whatwebscan2-153x300

There ya have it lads nice and easy see when using what web it automatic use all the plug ins for this scanner to work to see the plug ins type whatweb -l
WhatWeb Plugin List

Plugin Name – Description
——————————————————————————–

Tuesday, July 9, 2019

How to use raccoon-scanner

Introduction

Hello and welcome to another post and in this one we will be going over raccoon-scanner. This is a high performance offensive security tool that is made for recon and vuln scanning, as they explain it. We’ll be going over how to install it and use it + an overview of my experience with it. Lets get into the post!!

Installing raccoon-scanner

So you have to have python3 and pip3 installed on ur system if not just type “apt install python3” and done! So now we go into the terminal and type “pip3 install raccoon-scanner” and your done with installing it!! We can install it through github, here is the method for that –

git clone https://github.com/evyatarmeged/Raccoon.git

cd Raccoon

python setup.py install

Using raccoon-scanner

Coolio, we now have raccoon scanner installed!! So lets look at the commands for this amazing tool by typing “raccoon –help” cool lets have a look –

Hacking A Rise Screenshot_2019-07-10_00-41-34

Woah thats quite a bit, now we’ll run “raccoon –no-sub-enum hackingarise.com” because I don’t wanna brute subdomains yet…lets have a look at the results –

Hacking A Rise Screenshot_2019-07-10_00-51-17

Cool as you can see this scanner pulls allot of info. Lets run “raccoon –no-sub-enum –vulners-nmap-scan hackingarise.com” and see what we get, basically –vulners-nmap-scan just run a different nmap scan to the regular nmap -Pn hackingarise.com so it takes longer. You can also change the flags in nmap with the commands -sc, -sv, -f, -p you can also skip the nmap scan with –skip-nmap-scan

overview of raccoon-scanner

Overall I think is a good recon tool and deffo one to add to the hackers toolbox indeed. Just incase you were wondering what distro I am on, its backbox 6 as I’m doing a project on there lol. Lets have a look at the features of this tool –

 

  • DNS details
  • DNS visual mapping using DNS dumpster
  • WHOIS information
  • TLS Data – supported ciphers, TLS versions, certificate details and SANs
  • Port Scan
  • Services and scripts scan
  • URL fuzzing and dir/file detection
  • Subdomain enumeration – uses Google dorking, DNS dumpster queries, SAN discovery and bruteforce
  • Web application data retrieval:
    • CMS detection
    • Web server info and X-Powered-By
    • robots.txt and sitemap extraction
    • Cookie inspection
    • Extracts all fuzzable URLs
    • Discovers HTML forms
    • Retrieves all Email addresses
    • Scans target for vulnerable S3 buckets and enumerates them for sensitive files
  • Detects known WAFs
  • Supports anonymous routing through Tor/Proxies
  • Uses asyncio for improved performance
  • Saves output to files – separates targets by folders and modules by files

 

Now the description of the tool –

Raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity.
It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data, detecting WAF presence and up to threaded dir busting and subdomain enumeration. Every scan outputs to a corresponding file.

As most of Raccoon’s scans are independent and do not rely on each other’s results, it utilizes Python’s asyncio to run most scans asynchronously.

Raccoon supports Tor/proxy for anonymous routing. It uses default wordlists (for URL fuzzing and subdomain discovery) from the amazing SecLists repository but different lists can be passed as arguments.

This is all from the github repo you can publicly access here: https://github.com/evyatarmeged/Raccoon

This post has been fun to make and maybe the tool was even better than the post itself, but in the end using this tool was great and shows how easy some hackers can utilize it to gain recon on your website and perform an attack so make sure you keep updated and patched to prevent all those nasty hackers from getting in! Thanks for reading another post, subscribe to our newsletter for more hacker tutorials and check out the other posts! Enjoy your day!!

DISCLAIMER

Hackingarise does not take responsibility for any actions you may perform with this tool and/or knowledge!! Your actions are your choices so please make wise ones!! Hackingarise makes these tutorials for educational purposes only and they are used to teach the public how hackers can use tools to break into their devices!!